Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · date | New search

You searched for subject:(ZUGRIFFSKONTROLLE BETRIEBSSYSTEME ). Showing records 1 – 12 of 12 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters

1. Tsankov, Petar. Access Control with Formal Security Guarantees.

Degree: 2016, ETH Zürich

Subjects/Keywords: ACCESS CONTROL (OPERATING SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); NETWORK MONITORING (COMPUTER SYSTEMS); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/004; Data processing, computer science; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsankov, P. (2016). Access Control with Formal Security Guarantees. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/125291

Chicago Manual of Style (16th Edition):

Tsankov, Petar. “Access Control with Formal Security Guarantees.” 2016. Doctoral Dissertation, ETH Zürich. Accessed March 06, 2021. http://hdl.handle.net/20.500.11850/125291.

MLA Handbook (7th Edition):

Tsankov, Petar. “Access Control with Formal Security Guarantees.” 2016. Web. 06 Mar 2021.

Vancouver:

Tsankov P. Access Control with Formal Security Guarantees. [Internet] [Doctoral dissertation]. ETH Zürich; 2016. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/20.500.11850/125291.

Council of Science Editors:

Tsankov P. Access Control with Formal Security Guarantees. [Doctoral Dissertation]. ETH Zürich; 2016. Available from: http://hdl.handle.net/20.500.11850/125291


ETH Zürich

2. Lamprakis, Pavlos. Human or malware? Detection of malicious Web requests.

Degree: 2016, ETH Zürich

Subjects/Keywords: NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); INTERNET + WORLD WIDE WEB (COMPUTERSYSTEME); NETWORK MONITORING (COMPUTER SYSTEMS); ACCESS CONTROL (OPERATING SYSTEMS); INTERNET + WORLD WIDE WEB (COMPUTER SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lamprakis, P. (2016). Human or malware? Detection of malicious Web requests. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/155852

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lamprakis, Pavlos. “Human or malware? Detection of malicious Web requests.” 2016. Thesis, ETH Zürich. Accessed March 06, 2021. http://hdl.handle.net/20.500.11850/155852.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lamprakis, Pavlos. “Human or malware? Detection of malicious Web requests.” 2016. Web. 06 Mar 2021.

Vancouver:

Lamprakis P. Human or malware? Detection of malicious Web requests. [Internet] [Thesis]. ETH Zürich; 2016. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/20.500.11850/155852.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lamprakis P. Human or malware? Detection of malicious Web requests. [Thesis]. ETH Zürich; 2016. Available from: http://hdl.handle.net/20.500.11850/155852

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

3. Ben-Porat, Ehud. On the Vulnerability of Network Mechanisms to Sophisticated Attacks.

Degree: 2014, ETH Zürich

Subjects/Keywords: ACCESS CONTROL (OPERATING SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); NETWORK MONITORING (COMPUTER SYSTEMS); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/004; Data processing, computer science; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ben-Porat, E. (2014). On the Vulnerability of Network Mechanisms to Sophisticated Attacks. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/91062

Chicago Manual of Style (16th Edition):

Ben-Porat, Ehud. “On the Vulnerability of Network Mechanisms to Sophisticated Attacks.” 2014. Doctoral Dissertation, ETH Zürich. Accessed March 06, 2021. http://hdl.handle.net/20.500.11850/91062.

MLA Handbook (7th Edition):

Ben-Porat, Ehud. “On the Vulnerability of Network Mechanisms to Sophisticated Attacks.” 2014. Web. 06 Mar 2021.

Vancouver:

Ben-Porat E. On the Vulnerability of Network Mechanisms to Sophisticated Attacks. [Internet] [Doctoral dissertation]. ETH Zürich; 2014. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/20.500.11850/91062.

Council of Science Editors:

Ben-Porat E. On the Vulnerability of Network Mechanisms to Sophisticated Attacks. [Doctoral Dissertation]. ETH Zürich; 2014. Available from: http://hdl.handle.net/20.500.11850/91062


ETH Zürich

4. Dubovitskaya, Maria. Cryptographic Protocols for Privacy-Preserving Access Control in Databases.

Degree: 2014, ETH Zürich

Subjects/Keywords: NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME); CODIERUNG (INFORMATIONSTHEORIE); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); DATENBANKVERWALTUNG + DATENBANKADMINISTRATION (INFORMATIONSSYSTEME); NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS); CODING (INFORMATION THEORY); ACCESS CONTROL (OPERATING SYSTEMS); DATABASE MANAGEMENT + DATABASE ADMINISTRATION (INFORMATION SYSTEMS); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/004; Data processing, computer science; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dubovitskaya, M. (2014). Cryptographic Protocols for Privacy-Preserving Access Control in Databases. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/154670

Chicago Manual of Style (16th Edition):

Dubovitskaya, Maria. “Cryptographic Protocols for Privacy-Preserving Access Control in Databases.” 2014. Doctoral Dissertation, ETH Zürich. Accessed March 06, 2021. http://hdl.handle.net/20.500.11850/154670.

MLA Handbook (7th Edition):

Dubovitskaya, Maria. “Cryptographic Protocols for Privacy-Preserving Access Control in Databases.” 2014. Web. 06 Mar 2021.

Vancouver:

Dubovitskaya M. Cryptographic Protocols for Privacy-Preserving Access Control in Databases. [Internet] [Doctoral dissertation]. ETH Zürich; 2014. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/20.500.11850/154670.

Council of Science Editors:

Dubovitskaya M. Cryptographic Protocols for Privacy-Preserving Access Control in Databases. [Doctoral Dissertation]. ETH Zürich; 2014. Available from: http://hdl.handle.net/20.500.11850/154670


ETH Zürich

5. Raftopoulos, Ilias. Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections.

Degree: 2014, ETH Zürich

Subjects/Keywords: ACCESS CONTROL (OPERATING SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); COMPUTER CRIMINALITY + CYBERCRIMINALITY (CRIMINAL LAW); COMPUTERKRIMINALITÄT + CYBERKRIMINALITÄT (STRAFRECHT); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Raftopoulos, I. (2014). Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/91060

Chicago Manual of Style (16th Edition):

Raftopoulos, Ilias. “Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections.” 2014. Doctoral Dissertation, ETH Zürich. Accessed March 06, 2021. http://hdl.handle.net/20.500.11850/91060.

MLA Handbook (7th Edition):

Raftopoulos, Ilias. “Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections.” 2014. Web. 06 Mar 2021.

Vancouver:

Raftopoulos I. Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections. [Internet] [Doctoral dissertation]. ETH Zürich; 2014. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/20.500.11850/91060.

Council of Science Editors:

Raftopoulos I. Extrusion Detection: Monitoring, Detecting, and Characterizing Internal Infections. [Doctoral Dissertation]. ETH Zürich; 2014. Available from: http://hdl.handle.net/20.500.11850/91060


ETH Zürich

6. Werthmüller, Tanja. Efficient evaluation of PBel access control policies.

Degree: 2013, ETH Zürich

Subjects/Keywords: SPEZIELLE PROGRAMMIERMETHODEN; ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); SPECIAL PROGRAMMING METHODS; ACCESS CONTROL (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Werthmüller, T. (2013). Efficient evaluation of PBel access control policies. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/153956

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Werthmüller, Tanja. “Efficient evaluation of PBel access control policies.” 2013. Thesis, ETH Zürich. Accessed March 06, 2021. http://hdl.handle.net/20.500.11850/153956.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Werthmüller, Tanja. “Efficient evaluation of PBel access control policies.” 2013. Web. 06 Mar 2021.

Vancouver:

Werthmüller T. Efficient evaluation of PBel access control policies. [Internet] [Thesis]. ETH Zürich; 2013. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/20.500.11850/153956.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Werthmüller T. Efficient evaluation of PBel access control policies. [Thesis]. ETH Zürich; 2013. Available from: http://hdl.handle.net/20.500.11850/153956

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

7. Meier, Daniela. Realizing and Implementing Location-based Access Control Policies.

Degree: 2013, ETH Zürich

Subjects/Keywords: ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); ACCESS CONTROL (OPERATING SYSTEMS); NETWORK MONITORING (COMPUTER SYSTEMS); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/004; Data processing, computer science; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Meier, D. (2013). Realizing and Implementing Location-based Access Control Policies. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/154153

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Meier, Daniela. “Realizing and Implementing Location-based Access Control Policies.” 2013. Thesis, ETH Zürich. Accessed March 06, 2021. http://hdl.handle.net/20.500.11850/154153.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Meier, Daniela. “Realizing and Implementing Location-based Access Control Policies.” 2013. Web. 06 Mar 2021.

Vancouver:

Meier D. Realizing and Implementing Location-based Access Control Policies. [Internet] [Thesis]. ETH Zürich; 2013. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/20.500.11850/154153.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Meier D. Realizing and Implementing Location-based Access Control Policies. [Thesis]. ETH Zürich; 2013. Available from: http://hdl.handle.net/20.500.11850/154153

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

8. Lai, Willy. Data Warehouse Query Log Analysis using MapReduce.

Degree: 2011, ETH Zürich

Subjects/Keywords: ACCESS CONTROL (OPERATING SYSTEMS); DATABASE MANAGEMENT + DATABASE ADMINISTRATION (INFORMATION SYSTEMS); ABFRAGEN (INFORMATIONSSYSTEME); QUERIES (INFORMATION SYSTEMS); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); DATENBANKVERWALTUNG + DATENBANKADMINISTRATION (INFORMATIONSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lai, W. (2011). Data Warehouse Query Log Analysis using MapReduce. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/41270

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lai, Willy. “Data Warehouse Query Log Analysis using MapReduce.” 2011. Thesis, ETH Zürich. Accessed March 06, 2021. http://hdl.handle.net/20.500.11850/41270.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lai, Willy. “Data Warehouse Query Log Analysis using MapReduce.” 2011. Web. 06 Mar 2021.

Vancouver:

Lai W. Data Warehouse Query Log Analysis using MapReduce. [Internet] [Thesis]. ETH Zürich; 2011. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/20.500.11850/41270.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lai W. Data Warehouse Query Log Analysis using MapReduce. [Thesis]. ETH Zürich; 2011. Available from: http://hdl.handle.net/20.500.11850/41270

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

9. Danev, Boris D. Physical-Layer Identification of Wireless Devices.

Degree: 2011, ETH Zürich

Subjects/Keywords: ACCESS CONTROL (OPERATING SYSTEMS); NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); NETWORK MONITORING (COMPUTER SYSTEMS); AUTHENTIFICATION (OPERATING SYSTEMS); AUTHENTIFIKATION (BETRIEBSSYSTEME); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/004; Data processing, computer science; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Danev, B. D. (2011). Physical-Layer Identification of Wireless Devices. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/72822

Chicago Manual of Style (16th Edition):

Danev, Boris D. “Physical-Layer Identification of Wireless Devices.” 2011. Doctoral Dissertation, ETH Zürich. Accessed March 06, 2021. http://hdl.handle.net/20.500.11850/72822.

MLA Handbook (7th Edition):

Danev, Boris D. “Physical-Layer Identification of Wireless Devices.” 2011. Web. 06 Mar 2021.

Vancouver:

Danev BD. Physical-Layer Identification of Wireless Devices. [Internet] [Doctoral dissertation]. ETH Zürich; 2011. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/20.500.11850/72822.

Council of Science Editors:

Danev BD. Physical-Layer Identification of Wireless Devices. [Doctoral Dissertation]. ETH Zürich; 2011. Available from: http://hdl.handle.net/20.500.11850/72822


ETH Zürich

10. Frank, Mario. Probabilistic Role Mining.

Degree: 2011, ETH Zürich

Subjects/Keywords: ACCESS CONTROL (OPERATING SYSTEMS); ASSIGNMENT PROBLEMS (LINEAR PROGRAMMING); STOCHASTIC MODELS + STOCHASTIC SIMULATION (PROBABILITY THEORY); STOCHASTISCHE MODELLE + STOCHASTISCHE SIMULATION (WAHRSCHEINLICHKEITSRECHNUNG); ZUORDNUNGSPROBLEME (LINEARE OPTIMIERUNG); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Frank, M. (2011). Probabilistic Role Mining. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/72860

Chicago Manual of Style (16th Edition):

Frank, Mario. “Probabilistic Role Mining.” 2011. Doctoral Dissertation, ETH Zürich. Accessed March 06, 2021. http://hdl.handle.net/20.500.11850/72860.

MLA Handbook (7th Edition):

Frank, Mario. “Probabilistic Role Mining.” 2011. Web. 06 Mar 2021.

Vancouver:

Frank M. Probabilistic Role Mining. [Internet] [Doctoral dissertation]. ETH Zürich; 2011. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/20.500.11850/72860.

Council of Science Editors:

Frank M. Probabilistic Role Mining. [Doctoral Dissertation]. ETH Zürich; 2011. Available from: http://hdl.handle.net/20.500.11850/72860


ETH Zürich

11. Jotterand, Arnaud. Usage control in secure messaging.

Degree: 2008, ETH Zürich

Subjects/Keywords: NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); NETWORK MONITORING (COMPUTER SYSTEMS); ACCESS CONTROL (OPERATING SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jotterand, A. (2008). Usage control in secure messaging. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/150366

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jotterand, Arnaud. “Usage control in secure messaging.” 2008. Thesis, ETH Zürich. Accessed March 06, 2021. http://hdl.handle.net/20.500.11850/150366.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jotterand, Arnaud. “Usage control in secure messaging.” 2008. Web. 06 Mar 2021.

Vancouver:

Jotterand A. Usage control in secure messaging. [Internet] [Thesis]. ETH Zürich; 2008. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/20.500.11850/150366.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jotterand A. Usage control in secure messaging. [Thesis]. ETH Zürich; 2008. Available from: http://hdl.handle.net/20.500.11850/150366

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

12. Lüssi, Cécile. Signature-based extrusion detection.

Degree: 2008, ETH Zürich

Subjects/Keywords: ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); ACCESS CONTROL (OPERATING SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lüssi, C. (2008). Signature-based extrusion detection. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/150670

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lüssi, Cécile. “Signature-based extrusion detection.” 2008. Thesis, ETH Zürich. Accessed March 06, 2021. http://hdl.handle.net/20.500.11850/150670.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lüssi, Cécile. “Signature-based extrusion detection.” 2008. Web. 06 Mar 2021.

Vancouver:

Lüssi C. Signature-based extrusion detection. [Internet] [Thesis]. ETH Zürich; 2008. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/20.500.11850/150670.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lüssi C. Signature-based extrusion detection. [Thesis]. ETH Zürich; 2008. Available from: http://hdl.handle.net/20.500.11850/150670

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.