Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(System security). Showing records 1 – 30 of 879 total matches.

[1] [2] [3] [4] [5] … [30]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Penn State University

1. Kamath, Radhesh Muralidhara. Applying Netlabel to Network Access Control in a Virtualized Environment.

Degree: MS, Computer Science and Engineering, 2008, Penn State University

 We consider the problem of transmitting authorization data in a distributed environment comprised of applications hosted on paravirtualized Virtual Machines. The current mechanism, called Labeled… (more)

Subjects/Keywords: network security; virtualization; security; system security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kamath, R. M. (2008). Applying Netlabel to Network Access Control in a Virtualized Environment. (Masters Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/8454

Chicago Manual of Style (16th Edition):

Kamath, Radhesh Muralidhara. “Applying Netlabel to Network Access Control in a Virtualized Environment.” 2008. Masters Thesis, Penn State University. Accessed July 22, 2019. https://etda.libraries.psu.edu/catalog/8454.

MLA Handbook (7th Edition):

Kamath, Radhesh Muralidhara. “Applying Netlabel to Network Access Control in a Virtualized Environment.” 2008. Web. 22 Jul 2019.

Vancouver:

Kamath RM. Applying Netlabel to Network Access Control in a Virtualized Environment. [Internet] [Masters thesis]. Penn State University; 2008. [cited 2019 Jul 22]. Available from: https://etda.libraries.psu.edu/catalog/8454.

Council of Science Editors:

Kamath RM. Applying Netlabel to Network Access Control in a Virtualized Environment. [Masters Thesis]. Penn State University; 2008. Available from: https://etda.libraries.psu.edu/catalog/8454


Virginia Tech

2. Deng, Yipan. DeviceGuard: External Device-Assisted System And Data Security.

Degree: MS, Computer Science, 2011, Virginia Tech

 This thesis addresses the threat that personal computer faced from malware when the personal computer is connected to the Internet. Traditional host-based security approaches, such… (more)

Subjects/Keywords: Host Security; System Security; Data Security; Smartphone

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deng, Y. (2011). DeviceGuard: External Device-Assisted System And Data Security. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/76767

Chicago Manual of Style (16th Edition):

Deng, Yipan. “DeviceGuard: External Device-Assisted System And Data Security.” 2011. Masters Thesis, Virginia Tech. Accessed July 22, 2019. http://hdl.handle.net/10919/76767.

MLA Handbook (7th Edition):

Deng, Yipan. “DeviceGuard: External Device-Assisted System And Data Security.” 2011. Web. 22 Jul 2019.

Vancouver:

Deng Y. DeviceGuard: External Device-Assisted System And Data Security. [Internet] [Masters thesis]. Virginia Tech; 2011. [cited 2019 Jul 22]. Available from: http://hdl.handle.net/10919/76767.

Council of Science Editors:

Deng Y. DeviceGuard: External Device-Assisted System And Data Security. [Masters Thesis]. Virginia Tech; 2011. Available from: http://hdl.handle.net/10919/76767


Anna University

3. Gowrison G. Study and analysis of network intrusion detection system by designing rule based filter.

Degree: Information and Communication, 2011, Anna University

The world is linked and interconnected by means of computer networks in various extents of processes, events and applications. The networks must be scalable to… (more)

Subjects/Keywords: Network security system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

G, G. (2011). Study and analysis of network intrusion detection system by designing rule based filter. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/9850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

G, Gowrison. “Study and analysis of network intrusion detection system by designing rule based filter.” 2011. Thesis, Anna University. Accessed July 22, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/9850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

G, Gowrison. “Study and analysis of network intrusion detection system by designing rule based filter.” 2011. Web. 22 Jul 2019.

Vancouver:

G G. Study and analysis of network intrusion detection system by designing rule based filter. [Internet] [Thesis]. Anna University; 2011. [cited 2019 Jul 22]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/9850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

G G. Study and analysis of network intrusion detection system by designing rule based filter. [Thesis]. Anna University; 2011. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/9850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

4. Ge, Xinyang. Enforcing Execution Integrity for Software Systems.

Degree: PhD, Computer Science and Engineering, 2016, Penn State University

 Memory corruption bugs have been the most common cause of security vulnerabilities for decades. Adversaries exploit such program flaws to launch code-injection and code-reuse attacks.… (more)

Subjects/Keywords: Security; Operating System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ge, X. (2016). Enforcing Execution Integrity for Software Systems. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/13332xxg113

Chicago Manual of Style (16th Edition):

Ge, Xinyang. “Enforcing Execution Integrity for Software Systems.” 2016. Doctoral Dissertation, Penn State University. Accessed July 22, 2019. https://etda.libraries.psu.edu/catalog/13332xxg113.

MLA Handbook (7th Edition):

Ge, Xinyang. “Enforcing Execution Integrity for Software Systems.” 2016. Web. 22 Jul 2019.

Vancouver:

Ge X. Enforcing Execution Integrity for Software Systems. [Internet] [Doctoral dissertation]. Penn State University; 2016. [cited 2019 Jul 22]. Available from: https://etda.libraries.psu.edu/catalog/13332xxg113.

Council of Science Editors:

Ge X. Enforcing Execution Integrity for Software Systems. [Doctoral Dissertation]. Penn State University; 2016. Available from: https://etda.libraries.psu.edu/catalog/13332xxg113


Syracuse University

5. Aafer, Yousra. SYSTEMATIC DISCOVERY OF ANDROID CUSTOMIZATION HAZARDS.

Degree: PhD, Electrical Engineering and Computer Science, 2016, Syracuse University

  The open nature of Android ecosystem has naturally laid the foundation for a highly fragmented operating system. In fact, the official AOSP versions have… (more)

Subjects/Keywords: Android Customization; Android Security; Mobile Security; Security; System Security; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aafer, Y. (2016). SYSTEMATIC DISCOVERY OF ANDROID CUSTOMIZATION HAZARDS. (Doctoral Dissertation). Syracuse University. Retrieved from https://surface.syr.edu/etd/635

Chicago Manual of Style (16th Edition):

Aafer, Yousra. “SYSTEMATIC DISCOVERY OF ANDROID CUSTOMIZATION HAZARDS.” 2016. Doctoral Dissertation, Syracuse University. Accessed July 22, 2019. https://surface.syr.edu/etd/635.

MLA Handbook (7th Edition):

Aafer, Yousra. “SYSTEMATIC DISCOVERY OF ANDROID CUSTOMIZATION HAZARDS.” 2016. Web. 22 Jul 2019.

Vancouver:

Aafer Y. SYSTEMATIC DISCOVERY OF ANDROID CUSTOMIZATION HAZARDS. [Internet] [Doctoral dissertation]. Syracuse University; 2016. [cited 2019 Jul 22]. Available from: https://surface.syr.edu/etd/635.

Council of Science Editors:

Aafer Y. SYSTEMATIC DISCOVERY OF ANDROID CUSTOMIZATION HAZARDS. [Doctoral Dissertation]. Syracuse University; 2016. Available from: https://surface.syr.edu/etd/635

6. Rawat, Umashankar. Secure and efficient distributed cryptographic file systems;.

Degree: Computer Science Engineering, 2013, Jaypee University of Engineering and Technology, Guna

The need for data security emerges from the widespread deployment of shared file systems, greater mobility of computers and the rapid miniaturization of storage devices.… (more)

Subjects/Keywords: Cryptography; Data Security; Distributed System; Linux Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rawat, U. (2013). Secure and efficient distributed cryptographic file systems;. (Thesis). Jaypee University of Engineering and Technology, Guna. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/10894

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rawat, Umashankar. “Secure and efficient distributed cryptographic file systems;.” 2013. Thesis, Jaypee University of Engineering and Technology, Guna. Accessed July 22, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/10894.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rawat, Umashankar. “Secure and efficient distributed cryptographic file systems;.” 2013. Web. 22 Jul 2019.

Vancouver:

Rawat U. Secure and efficient distributed cryptographic file systems;. [Internet] [Thesis]. Jaypee University of Engineering and Technology, Guna; 2013. [cited 2019 Jul 22]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/10894.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rawat U. Secure and efficient distributed cryptographic file systems;. [Thesis]. Jaypee University of Engineering and Technology, Guna; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/10894

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade de Lisboa

7. Martins, Rui Miguel Coelho. Security features using a distributed file system.

Degree: 2011, Universidade de Lisboa

 Sensitive information such as firewall logs or data from intrusion detection systems, has to be stored for long periods of time for legal reasons or… (more)

Subjects/Keywords: distributed; performance; security; file system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Martins, R. M. C. (2011). Security features using a distributed file system. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13929

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Martins, Rui Miguel Coelho. “Security features using a distributed file system.” 2011. Thesis, Universidade de Lisboa. Accessed July 22, 2019. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13929.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Martins, Rui Miguel Coelho. “Security features using a distributed file system.” 2011. Web. 22 Jul 2019.

Vancouver:

Martins RMC. Security features using a distributed file system. [Internet] [Thesis]. Universidade de Lisboa; 2011. [cited 2019 Jul 22]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13929.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Martins RMC. Security features using a distributed file system. [Thesis]. Universidade de Lisboa; 2011. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13929

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Louisiana State University

8. Penubaku, Lohit. Smart access control system with behavioral profiling and dynamic PIN concept.

Degree: MSEE, Electrical and Computer Engineering, 2011, Louisiana State University

 Since ancient time, an access control device has been used for securing valuable properties as well as lives from threatening peoples. The most representative security(more)

Subjects/Keywords: SAC system; security; access point

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Penubaku, L. (2011). Smart access control system with behavioral profiling and dynamic PIN concept. (Masters Thesis). Louisiana State University. Retrieved from etd-07082011-113804 ; https://digitalcommons.lsu.edu/gradschool_theses/1898

Chicago Manual of Style (16th Edition):

Penubaku, Lohit. “Smart access control system with behavioral profiling and dynamic PIN concept.” 2011. Masters Thesis, Louisiana State University. Accessed July 22, 2019. etd-07082011-113804 ; https://digitalcommons.lsu.edu/gradschool_theses/1898.

MLA Handbook (7th Edition):

Penubaku, Lohit. “Smart access control system with behavioral profiling and dynamic PIN concept.” 2011. Web. 22 Jul 2019.

Vancouver:

Penubaku L. Smart access control system with behavioral profiling and dynamic PIN concept. [Internet] [Masters thesis]. Louisiana State University; 2011. [cited 2019 Jul 22]. Available from: etd-07082011-113804 ; https://digitalcommons.lsu.edu/gradschool_theses/1898.

Council of Science Editors:

Penubaku L. Smart access control system with behavioral profiling and dynamic PIN concept. [Masters Thesis]. Louisiana State University; 2011. Available from: etd-07082011-113804 ; https://digitalcommons.lsu.edu/gradschool_theses/1898


Universidade Nova

9. Pires, Mário Rui Dias. A type system for access control in an object-oriented language.

Degree: 2009, Universidade Nova

Trabalho apresentado no âmbito do Mestrado em Engenharia Informática, como requisito parcial para obtenção do grau de Mestre em Engenharia Informática

The need for a… (more)

Subjects/Keywords: Security; Access control; Type system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pires, M. R. D. (2009). A type system for access control in an object-oriented language. (Thesis). Universidade Nova. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pires, Mário Rui Dias. “A type system for access control in an object-oriented language.” 2009. Thesis, Universidade Nova. Accessed July 22, 2019. http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pires, Mário Rui Dias. “A type system for access control in an object-oriented language.” 2009. Web. 22 Jul 2019.

Vancouver:

Pires MRD. A type system for access control in an object-oriented language. [Internet] [Thesis]. Universidade Nova; 2009. [cited 2019 Jul 22]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pires MRD. A type system for access control in an object-oriented language. [Thesis]. Universidade Nova; 2009. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/2308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Vanderbilt University

10. Davis, Thomas Andrew Jr. Developing SCADA Simulations with C2WindTunnel.

Degree: MS, Computer Science, 2011, Vanderbilt University

 Industrial control systems are used in countless industries, from electric power distribution to the production of pharmaceuticals. These large networked computer systems, often called SCADA… (more)

Subjects/Keywords: security; control system; ICS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Davis, T. A. J. (2011). Developing SCADA Simulations with C2WindTunnel. (Masters Thesis). Vanderbilt University. Retrieved from http://etd.library.vanderbilt.edu/available/etd-04052011-071956/ ;

Chicago Manual of Style (16th Edition):

Davis, Thomas Andrew Jr. “Developing SCADA Simulations with C2WindTunnel.” 2011. Masters Thesis, Vanderbilt University. Accessed July 22, 2019. http://etd.library.vanderbilt.edu/available/etd-04052011-071956/ ;.

MLA Handbook (7th Edition):

Davis, Thomas Andrew Jr. “Developing SCADA Simulations with C2WindTunnel.” 2011. Web. 22 Jul 2019.

Vancouver:

Davis TAJ. Developing SCADA Simulations with C2WindTunnel. [Internet] [Masters thesis]. Vanderbilt University; 2011. [cited 2019 Jul 22]. Available from: http://etd.library.vanderbilt.edu/available/etd-04052011-071956/ ;.

Council of Science Editors:

Davis TAJ. Developing SCADA Simulations with C2WindTunnel. [Masters Thesis]. Vanderbilt University; 2011. Available from: http://etd.library.vanderbilt.edu/available/etd-04052011-071956/ ;


Delft University of Technology

11. Senobua, S. Evaluating the security related decision behaviour of employees in an airport security system. Case Study: Soekarno – Hatta International Airport, Jakarta :.

Degree: 2013, Delft University of Technology

 This project aims to analyze any factor which influence the security related decision behaviour of the employees at Soekarno-Hatta International Airport security system and analyze… (more)

Subjects/Keywords: employee's security awareness; airport security system; security related decision behaviour

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Senobua, S. (2013). Evaluating the security related decision behaviour of employees in an airport security system. Case Study: Soekarno – Hatta International Airport, Jakarta :. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:9cb7e413-4b8e-4ae7-9f04-8501a0f3f297

Chicago Manual of Style (16th Edition):

Senobua, S. “Evaluating the security related decision behaviour of employees in an airport security system. Case Study: Soekarno – Hatta International Airport, Jakarta :.” 2013. Masters Thesis, Delft University of Technology. Accessed July 22, 2019. http://resolver.tudelft.nl/uuid:9cb7e413-4b8e-4ae7-9f04-8501a0f3f297.

MLA Handbook (7th Edition):

Senobua, S. “Evaluating the security related decision behaviour of employees in an airport security system. Case Study: Soekarno – Hatta International Airport, Jakarta :.” 2013. Web. 22 Jul 2019.

Vancouver:

Senobua S. Evaluating the security related decision behaviour of employees in an airport security system. Case Study: Soekarno – Hatta International Airport, Jakarta :. [Internet] [Masters thesis]. Delft University of Technology; 2013. [cited 2019 Jul 22]. Available from: http://resolver.tudelft.nl/uuid:9cb7e413-4b8e-4ae7-9f04-8501a0f3f297.

Council of Science Editors:

Senobua S. Evaluating the security related decision behaviour of employees in an airport security system. Case Study: Soekarno – Hatta International Airport, Jakarta :. [Masters Thesis]. Delft University of Technology; 2013. Available from: http://resolver.tudelft.nl/uuid:9cb7e413-4b8e-4ae7-9f04-8501a0f3f297


Addis Ababa University

12. Mekonnen, Feyissa. MONITORING DISTRIBUTED SYSTEMS FOR ADAPTIVE SECURITY .

Degree: 2008, Addis Ababa University

 In today’s Information Society, distributed systems have a significant impact on how information communication between social, industrial, governmental and non governmental institutions is achieved. Dealing… (more)

Subjects/Keywords: Adaptation; Adapting; distributed system; Security; Adaptive security; monitoring system; Adaptive monitoring system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mekonnen, F. (2008). MONITORING DISTRIBUTED SYSTEMS FOR ADAPTIVE SECURITY . (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/2749

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mekonnen, Feyissa. “MONITORING DISTRIBUTED SYSTEMS FOR ADAPTIVE SECURITY .” 2008. Thesis, Addis Ababa University. Accessed July 22, 2019. http://etd.aau.edu.et/dspace/handle/123456789/2749.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mekonnen, Feyissa. “MONITORING DISTRIBUTED SYSTEMS FOR ADAPTIVE SECURITY .” 2008. Web. 22 Jul 2019.

Vancouver:

Mekonnen F. MONITORING DISTRIBUTED SYSTEMS FOR ADAPTIVE SECURITY . [Internet] [Thesis]. Addis Ababa University; 2008. [cited 2019 Jul 22]. Available from: http://etd.aau.edu.et/dspace/handle/123456789/2749.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mekonnen F. MONITORING DISTRIBUTED SYSTEMS FOR ADAPTIVE SECURITY . [Thesis]. Addis Ababa University; 2008. Available from: http://etd.aau.edu.et/dspace/handle/123456789/2749

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

13. Kuo, Jui-hsiang. Study on the Integration of Information Security Management System and Personal Information Management System.

Degree: Master, Information Management, 2013, NSYSU

 With the formally carrying out of the Personal Information Protection Act, the Party is going to realize his own rights to his personal information. Therefore,… (more)

Subjects/Keywords: Personal Information Management System; Information Security Management System; Information Security and Personal Information Management System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuo, J. (2013). Study on the Integration of Information Security Management System and Personal Information Management System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuo, Jui-hsiang. “Study on the Integration of Information Security Management System and Personal Information Management System.” 2013. Thesis, NSYSU. Accessed July 22, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuo, Jui-hsiang. “Study on the Integration of Information Security Management System and Personal Information Management System.” 2013. Web. 22 Jul 2019.

Vancouver:

Kuo J. Study on the Integration of Information Security Management System and Personal Information Management System. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Jul 22]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuo J. Study on the Integration of Information Security Management System and Personal Information Management System. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Loughborough University

14. Al-Hamar, Aisha. Enhancing information security in organisations in Qatar.

Degree: PhD, 2018, Loughborough University

 Due to the universal use of technology and its pervasive connection to the world, organisations have become more exposed to frequent and various threats. Therefore,… (more)

Subjects/Keywords: Information security; Information security policy; Information security awareness; Information security management system; Information security culture; Qatar National Information Assurance policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Hamar, A. (2018). Enhancing information security in organisations in Qatar. (Doctoral Dissertation). Loughborough University. Retrieved from https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959

Chicago Manual of Style (16th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Doctoral Dissertation, Loughborough University. Accessed July 22, 2019. https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959.

MLA Handbook (7th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Web. 22 Jul 2019.

Vancouver:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2019 Jul 22]. Available from: https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959.

Council of Science Editors:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Doctoral Dissertation]. Loughborough University; 2018. Available from: https://dspace.lboro.ac.uk/2134/33541 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.747959


Univerzitet u Beogradu

15. Теpavac, Dejan N., 1976-. Заштита пословних информација у функцији националне безбедности.

Degree: Fakultet bezbednosti, 2018, Univerzitet u Beogradu

Društvene nauke / Studije bezbednosti Social sciences / security studies

Поуздане информације представљају основ смисленог људског деловања, успостављања међуљудских, међународних и пословних односа. Информације посебно… (more)

Subjects/Keywords: National security; business information; information security; information and communication system; human security; indicators; protection.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Теpavac, Dejan N., 1. (2018). Заштита пословних информација у функцији националне безбедности. (Thesis). Univerzitet u Beogradu. Retrieved from https://fedorabg.bg.ac.rs/fedora/get/o:18442/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Теpavac, Dejan N., 1976-. “Заштита пословних информација у функцији националне безбедности.” 2018. Thesis, Univerzitet u Beogradu. Accessed July 22, 2019. https://fedorabg.bg.ac.rs/fedora/get/o:18442/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Теpavac, Dejan N., 1976-. “Заштита пословних информација у функцији националне безбедности.” 2018. Web. 22 Jul 2019.

Vancouver:

Теpavac, Dejan N. 1. Заштита пословних информација у функцији националне безбедности. [Internet] [Thesis]. Univerzitet u Beogradu; 2018. [cited 2019 Jul 22]. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:18442/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Теpavac, Dejan N. 1. Заштита пословних информација у функцији националне безбедности. [Thesis]. Univerzitet u Beogradu; 2018. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:18442/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Glogovšek Šumlaj, Nina. LOGISTIČNA PODPORA NA PODROČJU VARNOSTI V REGIJI POSAVJE.

Degree: 2012, Univerza v Mariboru

Varnost je pomemben del našega življenja in od nje je odvisno, kako bomo živeli, kako se bomo počutili in kako bomo delovali znotraj sistema. Za… (more)

Subjects/Keywords: varnost; varnostni sistem; policijsko delo; varnostne službe; security; security system; police work; security service

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Glogovšek Šumlaj, N. (2012). LOGISTIČNA PODPORA NA PODROČJU VARNOSTI V REGIJI POSAVJE. (Masters Thesis). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=38540 ; https://dk.um.si/Dokument.php?id=51549&dn=

Chicago Manual of Style (16th Edition):

Glogovšek Šumlaj, Nina. “LOGISTIČNA PODPORA NA PODROČJU VARNOSTI V REGIJI POSAVJE.” 2012. Masters Thesis, Univerza v Mariboru. Accessed July 22, 2019. https://dk.um.si/IzpisGradiva.php?id=38540 ; https://dk.um.si/Dokument.php?id=51549&dn=.

MLA Handbook (7th Edition):

Glogovšek Šumlaj, Nina. “LOGISTIČNA PODPORA NA PODROČJU VARNOSTI V REGIJI POSAVJE.” 2012. Web. 22 Jul 2019.

Vancouver:

Glogovšek Šumlaj N. LOGISTIČNA PODPORA NA PODROČJU VARNOSTI V REGIJI POSAVJE. [Internet] [Masters thesis]. Univerza v Mariboru; 2012. [cited 2019 Jul 22]. Available from: https://dk.um.si/IzpisGradiva.php?id=38540 ; https://dk.um.si/Dokument.php?id=51549&dn=.

Council of Science Editors:

Glogovšek Šumlaj N. LOGISTIČNA PODPORA NA PODROČJU VARNOSTI V REGIJI POSAVJE. [Masters Thesis]. Univerza v Mariboru; 2012. Available from: https://dk.um.si/IzpisGradiva.php?id=38540 ; https://dk.um.si/Dokument.php?id=51549&dn=


Texas A&M University

17. Song, Hongbiao. The detection, prevention and mitigation of cascading outages in the power system.

Degree: 2009, Texas A&M University

 This dissertation studies the causes and mechanism of power system cascading outages and develops new methods and new tools to help detect, prevent and mitigate… (more)

Subjects/Keywords: Power System; Cascading Outage; Security; Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, H. (2009). The detection, prevention and mitigation of cascading outages in the power system. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-1109

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Song, Hongbiao. “The detection, prevention and mitigation of cascading outages in the power system.” 2009. Thesis, Texas A&M University. Accessed July 22, 2019. http://hdl.handle.net/1969.1/ETD-TAMU-1109.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Song, Hongbiao. “The detection, prevention and mitigation of cascading outages in the power system.” 2009. Web. 22 Jul 2019.

Vancouver:

Song H. The detection, prevention and mitigation of cascading outages in the power system. [Internet] [Thesis]. Texas A&M University; 2009. [cited 2019 Jul 22]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-1109.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Song H. The detection, prevention and mitigation of cascading outages in the power system. [Thesis]. Texas A&M University; 2009. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-1109

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

18. Gokulkumari, G. A study on bio metric security in online shopping; -.

Degree: Management Studies, 2014, Anna University

Biometrics is a technology that is used to identify people by newlinetheir physical andor behavioral characteristics and so inherently newlinerequires that the person to be… (more)

Subjects/Keywords: bio metric security; management science; system integrates

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gokulkumari, G. (2014). A study on bio metric security in online shopping; -. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/25546

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gokulkumari, G. “A study on bio metric security in online shopping; -.” 2014. Thesis, Anna University. Accessed July 22, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/25546.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gokulkumari, G. “A study on bio metric security in online shopping; -.” 2014. Web. 22 Jul 2019.

Vancouver:

Gokulkumari G. A study on bio metric security in online shopping; -. [Internet] [Thesis]. Anna University; 2014. [cited 2019 Jul 22]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/25546.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gokulkumari G. A study on bio metric security in online shopping; -. [Thesis]. Anna University; 2014. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/25546

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Technology, Sydney

19. Tran, TP. Innovative machine learning techniques for security detection problems.

Degree: 2009, University of Technology, Sydney

 Most of the currently available network security techniques cannot cope with the dynamic and increasingly complex nature of the attacks on distributed computer systems. Therefore,… (more)

Subjects/Keywords: Intrusion detection system.; Machine learning.; Computer security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tran, T. (2009). Innovative machine learning techniques for security detection problems. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/30237

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tran, TP. “Innovative machine learning techniques for security detection problems.” 2009. Thesis, University of Technology, Sydney. Accessed July 22, 2019. http://hdl.handle.net/10453/30237.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tran, TP. “Innovative machine learning techniques for security detection problems.” 2009. Web. 22 Jul 2019.

Vancouver:

Tran T. Innovative machine learning techniques for security detection problems. [Internet] [Thesis]. University of Technology, Sydney; 2009. [cited 2019 Jul 22]. Available from: http://hdl.handle.net/10453/30237.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tran T. Innovative machine learning techniques for security detection problems. [Thesis]. University of Technology, Sydney; 2009. Available from: http://hdl.handle.net/10453/30237

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Michigan Technological University

20. Hu, Lihui. A FIREWALL MODEL OF FILE SYSTEM SECURITY.

Degree: PhD, Department of Computer Science, 2014, Michigan Technological University

  File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of… (more)

Subjects/Keywords: Access control; File system; Security; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hu, L. (2014). A FIREWALL MODEL OF FILE SYSTEM SECURITY. (Doctoral Dissertation). Michigan Technological University. Retrieved from http://digitalcommons.mtu.edu/etds/786

Chicago Manual of Style (16th Edition):

Hu, Lihui. “A FIREWALL MODEL OF FILE SYSTEM SECURITY.” 2014. Doctoral Dissertation, Michigan Technological University. Accessed July 22, 2019. http://digitalcommons.mtu.edu/etds/786.

MLA Handbook (7th Edition):

Hu, Lihui. “A FIREWALL MODEL OF FILE SYSTEM SECURITY.” 2014. Web. 22 Jul 2019.

Vancouver:

Hu L. A FIREWALL MODEL OF FILE SYSTEM SECURITY. [Internet] [Doctoral dissertation]. Michigan Technological University; 2014. [cited 2019 Jul 22]. Available from: http://digitalcommons.mtu.edu/etds/786.

Council of Science Editors:

Hu L. A FIREWALL MODEL OF FILE SYSTEM SECURITY. [Doctoral Dissertation]. Michigan Technological University; 2014. Available from: http://digitalcommons.mtu.edu/etds/786


University of Tasmania

21. Jones, DK. Power system dynamic security assessment with high penetration of wind generation in presence of a line commutated converter DC link.

Degree: 2014, University of Tasmania

 Traditionally energy has been generated with large synchronous generators. These large plants have characteristics that are well understood and are the basis for the operation… (more)

Subjects/Keywords: wind generation; HVDC; system security; Inertia

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jones, D. (2014). Power system dynamic security assessment with high penetration of wind generation in presence of a line commutated converter DC link. (Thesis). University of Tasmania. Retrieved from https://eprints.utas.edu.au/22421/1/Whole-Jones-thesis.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jones, DK. “Power system dynamic security assessment with high penetration of wind generation in presence of a line commutated converter DC link.” 2014. Thesis, University of Tasmania. Accessed July 22, 2019. https://eprints.utas.edu.au/22421/1/Whole-Jones-thesis.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jones, DK. “Power system dynamic security assessment with high penetration of wind generation in presence of a line commutated converter DC link.” 2014. Web. 22 Jul 2019.

Vancouver:

Jones D. Power system dynamic security assessment with high penetration of wind generation in presence of a line commutated converter DC link. [Internet] [Thesis]. University of Tasmania; 2014. [cited 2019 Jul 22]. Available from: https://eprints.utas.edu.au/22421/1/Whole-Jones-thesis.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jones D. Power system dynamic security assessment with high penetration of wind generation in presence of a line commutated converter DC link. [Thesis]. University of Tasmania; 2014. Available from: https://eprints.utas.edu.au/22421/1/Whole-Jones-thesis.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Duke University

22. Srivastava, Animesh. Practical fine-grained access control for mobile camera .

Degree: 2017, Duke University

  Cameras are pervasive and multiplying. A device’s camera allows users to capture and share important moments, and programmatic camera access provides apps with a… (more)

Subjects/Keywords: Computer science; Operating system security; Visual Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Srivastava, A. (2017). Practical fine-grained access control for mobile camera . (Thesis). Duke University. Retrieved from http://hdl.handle.net/10161/16356

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Srivastava, Animesh. “Practical fine-grained access control for mobile camera .” 2017. Thesis, Duke University. Accessed July 22, 2019. http://hdl.handle.net/10161/16356.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Srivastava, Animesh. “Practical fine-grained access control for mobile camera .” 2017. Web. 22 Jul 2019.

Vancouver:

Srivastava A. Practical fine-grained access control for mobile camera . [Internet] [Thesis]. Duke University; 2017. [cited 2019 Jul 22]. Available from: http://hdl.handle.net/10161/16356.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Srivastava A. Practical fine-grained access control for mobile camera . [Thesis]. Duke University; 2017. Available from: http://hdl.handle.net/10161/16356

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

23. Rahman, Md Shihanur. Distributed Multi-Agent Approach for Enhancing Stability and Security of Emerging Smart Grids.

Degree: Engineering & Information Technology, 2014, University of New South Wales

 The vision of a smart grid is to provide a modern, resilient and secure electric powergrid in a highly reliable, stable and efficient environment through… (more)

Subjects/Keywords: Stability; Multi-agent system; Smart grids; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rahman, M. S. (2014). Distributed Multi-Agent Approach for Enhancing Stability and Security of Emerging Smart Grids. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/53976 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:12687/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Rahman, Md Shihanur. “Distributed Multi-Agent Approach for Enhancing Stability and Security of Emerging Smart Grids.” 2014. Doctoral Dissertation, University of New South Wales. Accessed July 22, 2019. http://handle.unsw.edu.au/1959.4/53976 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:12687/SOURCE02?view=true.

MLA Handbook (7th Edition):

Rahman, Md Shihanur. “Distributed Multi-Agent Approach for Enhancing Stability and Security of Emerging Smart Grids.” 2014. Web. 22 Jul 2019.

Vancouver:

Rahman MS. Distributed Multi-Agent Approach for Enhancing Stability and Security of Emerging Smart Grids. [Internet] [Doctoral dissertation]. University of New South Wales; 2014. [cited 2019 Jul 22]. Available from: http://handle.unsw.edu.au/1959.4/53976 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:12687/SOURCE02?view=true.

Council of Science Editors:

Rahman MS. Distributed Multi-Agent Approach for Enhancing Stability and Security of Emerging Smart Grids. [Doctoral Dissertation]. University of New South Wales; 2014. Available from: http://handle.unsw.edu.au/1959.4/53976 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:12687/SOURCE02?view=true


University of Waterloo

24. Alhalali, Safoan. Real Time Dynamic State Estimation: Development and Application to Power System.

Degree: 2018, University of Waterloo

 Since the state estimation algorithm has been firstly proposed, considerable research interest has been shown in adapting and applying the different versions of this algorithm… (more)

Subjects/Keywords: State Estimation; Electrical distribution system; Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alhalali, S. (2018). Real Time Dynamic State Estimation: Development and Application to Power System. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/14057

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alhalali, Safoan. “Real Time Dynamic State Estimation: Development and Application to Power System.” 2018. Thesis, University of Waterloo. Accessed July 22, 2019. http://hdl.handle.net/10012/14057.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alhalali, Safoan. “Real Time Dynamic State Estimation: Development and Application to Power System.” 2018. Web. 22 Jul 2019.

Vancouver:

Alhalali S. Real Time Dynamic State Estimation: Development and Application to Power System. [Internet] [Thesis]. University of Waterloo; 2018. [cited 2019 Jul 22]. Available from: http://hdl.handle.net/10012/14057.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alhalali S. Real Time Dynamic State Estimation: Development and Application to Power System. [Thesis]. University of Waterloo; 2018. Available from: http://hdl.handle.net/10012/14057

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Colorado State University

25. Zhang, Han. Detecting advanced botnets in enterprise networks.

Degree: PhD, Computer Science, 2017, Colorado State University

 A botnet is a network composed of compromised computers that are controlled by a botmaster through command and control (C&C) channel. Botnets are more destructive… (more)

Subjects/Keywords: DNS; Network Security; Intrusion Detection System; Botnet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, H. (2017). Detecting advanced botnets in enterprise networks. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/181362

Chicago Manual of Style (16th Edition):

Zhang, Han. “Detecting advanced botnets in enterprise networks.” 2017. Doctoral Dissertation, Colorado State University. Accessed July 22, 2019. http://hdl.handle.net/10217/181362.

MLA Handbook (7th Edition):

Zhang, Han. “Detecting advanced botnets in enterprise networks.” 2017. Web. 22 Jul 2019.

Vancouver:

Zhang H. Detecting advanced botnets in enterprise networks. [Internet] [Doctoral dissertation]. Colorado State University; 2017. [cited 2019 Jul 22]. Available from: http://hdl.handle.net/10217/181362.

Council of Science Editors:

Zhang H. Detecting advanced botnets in enterprise networks. [Doctoral Dissertation]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/181362


Univerzitet u Beogradu

26. Perišić, Natalija. 1975-. Socijalna sigurnost između države i tržišta.

Degree: Fakultet političkih nauka, 2015, Univerzitet u Beogradu

Datum odbrane: 24.4.2012.

Udeo države i tržišta u obezbeđivanju socijalne sigurnosti, kao i sama socijalna sigurnost, predmet su preispitivanja i čestih osporavanja u savremenim političkim,… (more)

Subjects/Keywords: social security; social security system; state; market; reforms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Perišić, N. 1. (2015). Socijalna sigurnost između države i tržišta. (Thesis). Univerzitet u Beogradu. Retrieved from https://fedorabg.bg.ac.rs/fedora/get/o:8399/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Perišić, Natalija 1975-. “Socijalna sigurnost između države i tržišta.” 2015. Thesis, Univerzitet u Beogradu. Accessed July 22, 2019. https://fedorabg.bg.ac.rs/fedora/get/o:8399/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Perišić, Natalija 1975-. “Socijalna sigurnost između države i tržišta.” 2015. Web. 22 Jul 2019.

Vancouver:

Perišić N1. Socijalna sigurnost između države i tržišta. [Internet] [Thesis]. Univerzitet u Beogradu; 2015. [cited 2019 Jul 22]. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:8399/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Perišić N1. Socijalna sigurnost između države i tržišta. [Thesis]. Univerzitet u Beogradu; 2015. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:8399/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


California State University – Sacramento

27. Sanchez, Jason Paul. Secure web-based compiler.

Degree: MS, Computer Science, 2011, California State University – Sacramento

Security has become a fundamental concern in many of today???s applications. Software developers and system administrators have to employ a number of security strategies to… (more)

Subjects/Keywords: Compiler; PHP; C; C++; Web security; System security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sanchez, J. P. (2011). Secure web-based compiler. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/1382

Chicago Manual of Style (16th Edition):

Sanchez, Jason Paul. “Secure web-based compiler.” 2011. Masters Thesis, California State University – Sacramento. Accessed July 22, 2019. http://hdl.handle.net/10211.9/1382.

MLA Handbook (7th Edition):

Sanchez, Jason Paul. “Secure web-based compiler.” 2011. Web. 22 Jul 2019.

Vancouver:

Sanchez JP. Secure web-based compiler. [Internet] [Masters thesis]. California State University – Sacramento; 2011. [cited 2019 Jul 22]. Available from: http://hdl.handle.net/10211.9/1382.

Council of Science Editors:

Sanchez JP. Secure web-based compiler. [Masters Thesis]. California State University – Sacramento; 2011. Available from: http://hdl.handle.net/10211.9/1382


NSYSU

28. Wang, Yen-Chun. The position, Organization and Function of the ROC National Security Council.

Degree: Master, EMPP, 2014, NSYSU

 National security and development is the goal of national existence. For a long time, to protect national security and peopleâs rights to subsistence is every… (more)

Subjects/Keywords: Council for National Security; National Security; Constitutional System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Y. (2014). The position, Organization and Function of the ROC National Security Council. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0610114-215419

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Yen-Chun. “The position, Organization and Function of the ROC National Security Council.” 2014. Thesis, NSYSU. Accessed July 22, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0610114-215419.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Yen-Chun. “The position, Organization and Function of the ROC National Security Council.” 2014. Web. 22 Jul 2019.

Vancouver:

Wang Y. The position, Organization and Function of the ROC National Security Council. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Jul 22]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0610114-215419.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang Y. The position, Organization and Function of the ROC National Security Council. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0610114-215419

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

29. Xiong, Xi. Preserving System Integrity in Commodity Computers.

Degree: PhD, Computer Science and Engineering, 2012, Penn State University

 Today people rely more and more on commodity computer systems for storing and processing information. To make computer systems more trustworthy, it is highly demanding… (more)

Subjects/Keywords: Software Security; Operating System Security; Virtualization; Intrusion Recovery; OS Kernel

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xiong, X. (2012). Preserving System Integrity in Commodity Computers. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/16202

Chicago Manual of Style (16th Edition):

Xiong, Xi. “Preserving System Integrity in Commodity Computers.” 2012. Doctoral Dissertation, Penn State University. Accessed July 22, 2019. https://etda.libraries.psu.edu/catalog/16202.

MLA Handbook (7th Edition):

Xiong, Xi. “Preserving System Integrity in Commodity Computers.” 2012. Web. 22 Jul 2019.

Vancouver:

Xiong X. Preserving System Integrity in Commodity Computers. [Internet] [Doctoral dissertation]. Penn State University; 2012. [cited 2019 Jul 22]. Available from: https://etda.libraries.psu.edu/catalog/16202.

Council of Science Editors:

Xiong X. Preserving System Integrity in Commodity Computers. [Doctoral Dissertation]. Penn State University; 2012. Available from: https://etda.libraries.psu.edu/catalog/16202


Lehigh University

30. Liu, Zhiheng. Towards a Secure Zero-rating Framework with Three Parties.

Degree: MS, Computer Science, 2018, Lehigh University

 Zero-rating services allow mobile users to access contents from contracted CP free of data charge. In this thesis, we introduce attacks against the zero rating… (more)

Subjects/Keywords: core-network; ISP; Network; Security; System; Zero-rating; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, Z. (2018). Towards a Secure Zero-rating Framework with Three Parties. (Thesis). Lehigh University. Retrieved from https://preserve.lehigh.edu/etd/4357

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Zhiheng. “Towards a Secure Zero-rating Framework with Three Parties.” 2018. Thesis, Lehigh University. Accessed July 22, 2019. https://preserve.lehigh.edu/etd/4357.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Zhiheng. “Towards a Secure Zero-rating Framework with Three Parties.” 2018. Web. 22 Jul 2019.

Vancouver:

Liu Z. Towards a Secure Zero-rating Framework with Three Parties. [Internet] [Thesis]. Lehigh University; 2018. [cited 2019 Jul 22]. Available from: https://preserve.lehigh.edu/etd/4357.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu Z. Towards a Secure Zero-rating Framework with Three Parties. [Thesis]. Lehigh University; 2018. Available from: https://preserve.lehigh.edu/etd/4357

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [30]

.