Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(attack model). Showing records 1 – 30 of 38 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


NSYSU

1. Huang, Yu-Zhi. Detecting Attack Sequence in Cloud Based on Hidden Markov Model.

Degree: Master, Computer Science and Engineering, 2012, NSYSU

 Cloud computing provides business new working paradigm with the benefit of cost reduce and resource sharing. Tasks from different users may be performed on the… (more)

Subjects/Keywords: Cloud Computing; Hidden Markov Model; Attack Plan

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, Y. (2012). Detecting Attack Sequence in Cloud Based on Hidden Markov Model. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Yu-Zhi. “Detecting Attack Sequence in Cloud Based on Hidden Markov Model.” 2012. Thesis, NSYSU. Accessed February 21, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Yu-Zhi. “Detecting Attack Sequence in Cloud Based on Hidden Markov Model.” 2012. Web. 21 Feb 2020.

Vancouver:

Huang Y. Detecting Attack Sequence in Cloud Based on Hidden Markov Model. [Internet] [Thesis]. NSYSU; 2012. [cited 2020 Feb 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang Y. Detecting Attack Sequence in Cloud Based on Hidden Markov Model. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

2. Aguessy, François-Xavier. Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models.

Degree: Docteur es, Informatique, 2016, Evry, Institut national des télécommunications

Les systèmes d'information sont une cible de plus en plus attractive pour les attaquants. Dans cette thèse de doctorat, nous construisons une méthodologie complète d'analyse… (more)

Subjects/Keywords: Graphes d'attaque; Évaluation dynamique de risque; Modélisation d'attaques; Modèles d’attaques bayésiens; Attack graph; Dynamic risk assessment; Attack modelling; Bayesian attack model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aguessy, F. (2016). Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models. (Doctoral Dissertation). Evry, Institut national des télécommunications. Retrieved from http://www.theses.fr/2016TELE0016

Chicago Manual of Style (16th Edition):

Aguessy, François-Xavier. “Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models.” 2016. Doctoral Dissertation, Evry, Institut national des télécommunications. Accessed February 21, 2020. http://www.theses.fr/2016TELE0016.

MLA Handbook (7th Edition):

Aguessy, François-Xavier. “Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models.” 2016. Web. 21 Feb 2020.

Vancouver:

Aguessy F. Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models. [Internet] [Doctoral dissertation]. Evry, Institut national des télécommunications; 2016. [cited 2020 Feb 21]. Available from: http://www.theses.fr/2016TELE0016.

Council of Science Editors:

Aguessy F. Évaluation dynamique de risque et calcul de réponses basés sur des modèles d’attaques bayésiens : Dynamic risk assessment and response computation using Bayesian attack models. [Doctoral Dissertation]. Evry, Institut national des télécommunications; 2016. Available from: http://www.theses.fr/2016TELE0016


Queensland University of Technology

3. Nyeem, Hussain Md Abu. A digital watermarking framework with application to medical image security.

Degree: 2014, Queensland University of Technology

 Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include… (more)

Subjects/Keywords: Watermarking model; Attack model; Content authentication; Counterfeiting attack; Tampering detection; Security; Medical Image; Capacity control framework; Fragile watermarking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nyeem, H. M. A. (2014). A digital watermarking framework with application to medical image security. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/74749/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nyeem, Hussain Md Abu. “A digital watermarking framework with application to medical image security.” 2014. Thesis, Queensland University of Technology. Accessed February 21, 2020. https://eprints.qut.edu.au/74749/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nyeem, Hussain Md Abu. “A digital watermarking framework with application to medical image security.” 2014. Web. 21 Feb 2020.

Vancouver:

Nyeem HMA. A digital watermarking framework with application to medical image security. [Internet] [Thesis]. Queensland University of Technology; 2014. [cited 2020 Feb 21]. Available from: https://eprints.qut.edu.au/74749/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nyeem HMA. A digital watermarking framework with application to medical image security. [Thesis]. Queensland University of Technology; 2014. Available from: https://eprints.qut.edu.au/74749/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

4. LAI, CHIPING. Detecting Intrusions Using Social Network Analysis And Bayesian Network.

Degree: Master, Information Management, 2015, NSYSU

 The type of attack has been change from random attack to non-random attack which called Targeted Attack. This means the attack has an obvious target… (more)

Subjects/Keywords: Bayesian Network Model; Intrusion Detection System; Targeted Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

LAI, C. (2015). Detecting Intrusions Using Social Network Analysis And Bayesian Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

LAI, CHIPING. “Detecting Intrusions Using Social Network Analysis And Bayesian Network.” 2015. Thesis, NSYSU. Accessed February 21, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

LAI, CHIPING. “Detecting Intrusions Using Social Network Analysis And Bayesian Network.” 2015. Web. 21 Feb 2020.

Vancouver:

LAI C. Detecting Intrusions Using Social Network Analysis And Bayesian Network. [Internet] [Thesis]. NSYSU; 2015. [cited 2020 Feb 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

LAI C. Detecting Intrusions Using Social Network Analysis And Bayesian Network. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-160447

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

5. Yang, Zhi-Hong. Study on the bottom-blowing erosion in converter by using numerical model.

Degree: Master, Institute Of Mechanical And Electro-Mechanical Engineering, 2018, NSYSU

 The bottom-blowing process of the converter accelerates the erosion of refractory material near the tuyere and the tuyere tip. If the damage mechanism is understood… (more)

Subjects/Keywords: Multiphase Flow; Numerical Simulation; Water Model; Back-Attack; Converter Bottom-Blowing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, Z. (2018). Study on the bottom-blowing erosion in converter by using numerical model. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0619118-105053

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yang, Zhi-Hong. “Study on the bottom-blowing erosion in converter by using numerical model.” 2018. Thesis, NSYSU. Accessed February 21, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0619118-105053.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yang, Zhi-Hong. “Study on the bottom-blowing erosion in converter by using numerical model.” 2018. Web. 21 Feb 2020.

Vancouver:

Yang Z. Study on the bottom-blowing erosion in converter by using numerical model. [Internet] [Thesis]. NSYSU; 2018. [cited 2020 Feb 21]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0619118-105053.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yang Z. Study on the bottom-blowing erosion in converter by using numerical model. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0619118-105053

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Windsor

6. Nizampatnam, Meenakshi. Attack Aware RWA for Sliding Window Scheduled Traffic Model.

Degree: MS, Computer Science, 2016, University of Windsor

 In Transparent optical networks (TONs), the data signals remain in the optical domain for the entire transmission path. The capability of handling high data rates… (more)

Subjects/Keywords: Attack Aware RWA; RWA Scheduled Traffic Model; RWA Sliding Window

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nizampatnam, M. (2016). Attack Aware RWA for Sliding Window Scheduled Traffic Model. (Masters Thesis). University of Windsor. Retrieved from https://scholar.uwindsor.ca/etd/5753

Chicago Manual of Style (16th Edition):

Nizampatnam, Meenakshi. “Attack Aware RWA for Sliding Window Scheduled Traffic Model.” 2016. Masters Thesis, University of Windsor. Accessed February 21, 2020. https://scholar.uwindsor.ca/etd/5753.

MLA Handbook (7th Edition):

Nizampatnam, Meenakshi. “Attack Aware RWA for Sliding Window Scheduled Traffic Model.” 2016. Web. 21 Feb 2020.

Vancouver:

Nizampatnam M. Attack Aware RWA for Sliding Window Scheduled Traffic Model. [Internet] [Masters thesis]. University of Windsor; 2016. [cited 2020 Feb 21]. Available from: https://scholar.uwindsor.ca/etd/5753.

Council of Science Editors:

Nizampatnam M. Attack Aware RWA for Sliding Window Scheduled Traffic Model. [Masters Thesis]. University of Windsor; 2016. Available from: https://scholar.uwindsor.ca/etd/5753


Brno University of Technology

7. Vašek, Jiří. Distribuovaný systém kryptoanalýzy .

Degree: 2012, Brno University of Technology

 Tato práce by měla seznámit čtenáře se základním rozdělením paralelních výpočtů a popisem distribuovaných systémů. Dále je zaměřena na rozdělení kryptografický útoků. Měla by sloužit… (more)

Subjects/Keywords: Distribuovaný systém; primitiva; model; kryptoanalýza; útok; Distributed system; primitive; model; cryptoanalysis; attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vašek, J. (2012). Distribuovaný systém kryptoanalýzy . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/8684

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vašek, Jiří. “Distribuovaný systém kryptoanalýzy .” 2012. Thesis, Brno University of Technology. Accessed February 21, 2020. http://hdl.handle.net/11012/8684.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vašek, Jiří. “Distribuovaný systém kryptoanalýzy .” 2012. Web. 21 Feb 2020.

Vancouver:

Vašek J. Distribuovaný systém kryptoanalýzy . [Internet] [Thesis]. Brno University of Technology; 2012. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/11012/8684.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vašek J. Distribuovaný systém kryptoanalýzy . [Thesis]. Brno University of Technology; 2012. Available from: http://hdl.handle.net/11012/8684

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Southern California

8. Southwell, Carl Erckman. A robust model for disaster risk and decision analysis.

Degree: Doctor of Policy, Planning & Development, Policy, Planning and Development, 2012, University of Southern California

 There are many types of disasters, and it is a challenge to derive a single model of disaster risk and decision analysis that encompasses them… (more)

Subjects/Keywords: disaster; risk; risk analysis; decision analysis; model; hurricane; flood; LPG; LNG; port; security; terrorist attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Southwell, C. E. (2012). A robust model for disaster risk and decision analysis. (Doctoral Dissertation). University of Southern California. Retrieved from http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/36559/rec/351

Chicago Manual of Style (16th Edition):

Southwell, Carl Erckman. “A robust model for disaster risk and decision analysis.” 2012. Doctoral Dissertation, University of Southern California. Accessed February 21, 2020. http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/36559/rec/351.

MLA Handbook (7th Edition):

Southwell, Carl Erckman. “A robust model for disaster risk and decision analysis.” 2012. Web. 21 Feb 2020.

Vancouver:

Southwell CE. A robust model for disaster risk and decision analysis. [Internet] [Doctoral dissertation]. University of Southern California; 2012. [cited 2020 Feb 21]. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/36559/rec/351.

Council of Science Editors:

Southwell CE. A robust model for disaster risk and decision analysis. [Doctoral Dissertation]. University of Southern California; 2012. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/36559/rec/351


Cranfield University

9. Mohmad Rouyan, Nurhana. Model simulation suitable for an aircraft at high angle of attack.

Degree: MPhil, 2016, Cranfield University

 Simulation of a dynamic system is known to be sensitive to various factors and one of them could be the precision of model parameters. While… (more)

Subjects/Keywords: NASA F-18 HARV; High angles of attack; Aerodynamic model; Aircraft simulation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mohmad Rouyan, N. (2016). Model simulation suitable for an aircraft at high angle of attack. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/9722

Chicago Manual of Style (16th Edition):

Mohmad Rouyan, Nurhana. “Model simulation suitable for an aircraft at high angle of attack.” 2016. Doctoral Dissertation, Cranfield University. Accessed February 21, 2020. http://dspace.lib.cranfield.ac.uk/handle/1826/9722.

MLA Handbook (7th Edition):

Mohmad Rouyan, Nurhana. “Model simulation suitable for an aircraft at high angle of attack.” 2016. Web. 21 Feb 2020.

Vancouver:

Mohmad Rouyan N. Model simulation suitable for an aircraft at high angle of attack. [Internet] [Doctoral dissertation]. Cranfield University; 2016. [cited 2020 Feb 21]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/9722.

Council of Science Editors:

Mohmad Rouyan N. Model simulation suitable for an aircraft at high angle of attack. [Doctoral Dissertation]. Cranfield University; 2016. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/9722

10. Zhong, Jiawei. Network Interface Design for Network-on-Chip.

Degree: MS, 2014, University of New Hampshire

  In the culture of globalized integrated circuit (IC, a.k.a chip) production, the use of Intellectual Property (IP) cores, computer aided design tools (CAD) and… (more)

Subjects/Keywords: Hardware Trojan; HT Attack Model; Network Interface; Network-on-Chip; Electrical engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhong, J. (2014). Network Interface Design for Network-on-Chip. (Thesis). University of New Hampshire. Retrieved from https://scholars.unh.edu/thesis/988

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhong, Jiawei. “Network Interface Design for Network-on-Chip.” 2014. Thesis, University of New Hampshire. Accessed February 21, 2020. https://scholars.unh.edu/thesis/988.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhong, Jiawei. “Network Interface Design for Network-on-Chip.” 2014. Web. 21 Feb 2020.

Vancouver:

Zhong J. Network Interface Design for Network-on-Chip. [Internet] [Thesis]. University of New Hampshire; 2014. [cited 2020 Feb 21]. Available from: https://scholars.unh.edu/thesis/988.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhong J. Network Interface Design for Network-on-Chip. [Thesis]. University of New Hampshire; 2014. Available from: https://scholars.unh.edu/thesis/988

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia State University

11. He, Zaobo. Privacy Preserving Data Publishing.

Degree: PhD, Computer Science, 2018, Georgia State University

  Recent years have witnessed increasing interest among researchers in protecting individual privacy in the big data era, involving social media, genomics, and Internet of… (more)

Subjects/Keywords: Inference Attack; Data Sanitization; Differential Privacy; SNP-Trait Association; Belief Propagation; Probabilistic Graphical Model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

He, Z. (2018). Privacy Preserving Data Publishing. (Doctoral Dissertation). Georgia State University. Retrieved from https://scholarworks.gsu.edu/cs_diss/141

Chicago Manual of Style (16th Edition):

He, Zaobo. “Privacy Preserving Data Publishing.” 2018. Doctoral Dissertation, Georgia State University. Accessed February 21, 2020. https://scholarworks.gsu.edu/cs_diss/141.

MLA Handbook (7th Edition):

He, Zaobo. “Privacy Preserving Data Publishing.” 2018. Web. 21 Feb 2020.

Vancouver:

He Z. Privacy Preserving Data Publishing. [Internet] [Doctoral dissertation]. Georgia State University; 2018. [cited 2020 Feb 21]. Available from: https://scholarworks.gsu.edu/cs_diss/141.

Council of Science Editors:

He Z. Privacy Preserving Data Publishing. [Doctoral Dissertation]. Georgia State University; 2018. Available from: https://scholarworks.gsu.edu/cs_diss/141


University of Illinois – Urbana-Champaign

12. Lemay, Elizabeth. Adversary-driven state-based system security evaluation.

Degree: PhD, 1200, 2012, University of Illinois – Urbana-Champaign

 Quantitative metrics can aid decision-makers in making informed trade-off decisions. In system-level security decisions, quantitative security metrics allow decision-makers to compare the relative security of… (more)

Subjects/Keywords: model-based quantitative security metrics; system security analysis; attack execution graph; executable security models; attack step decision function; state look-ahead tree; ADversary VIew Security Evaluation (ADVISE) method

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lemay, E. (2012). Adversary-driven state-based system security evaluation. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/29707

Chicago Manual of Style (16th Edition):

Lemay, Elizabeth. “Adversary-driven state-based system security evaluation.” 2012. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed February 21, 2020. http://hdl.handle.net/2142/29707.

MLA Handbook (7th Edition):

Lemay, Elizabeth. “Adversary-driven state-based system security evaluation.” 2012. Web. 21 Feb 2020.

Vancouver:

Lemay E. Adversary-driven state-based system security evaluation. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2012. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/2142/29707.

Council of Science Editors:

Lemay E. Adversary-driven state-based system security evaluation. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2012. Available from: http://hdl.handle.net/2142/29707


Université du Luxembourg

13. Venkatesh, Srinivas Vivek. Practical Provable Security against Side-Channel Attacks.

Degree: 2015, Université du Luxembourg

 Securing cryptographic systems in the presence of side-channel leakages is still an important problem. Over recent years, the cryptography theory community has shown considerable interest… (more)

Subjects/Keywords: Cryptography; Side-channel attack; Countermeasure; Leakage-resilient cryptography; Provable security; Polynomial evaluation; Lattice-based attack; Generic group model; Engineering, computing & technology :: Computer science [C05]; Ingénierie, informatique & technologie :: Sciences informatiques [C05]

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Venkatesh, S. V. (2015). Practical Provable Security against Side-Channel Attacks. (Doctoral Dissertation). Université du Luxembourg. Retrieved from http://orbilu.uni.lu/handle/10993/21578

Chicago Manual of Style (16th Edition):

Venkatesh, Srinivas Vivek. “Practical Provable Security against Side-Channel Attacks.” 2015. Doctoral Dissertation, Université du Luxembourg. Accessed February 21, 2020. http://orbilu.uni.lu/handle/10993/21578.

MLA Handbook (7th Edition):

Venkatesh, Srinivas Vivek. “Practical Provable Security against Side-Channel Attacks.” 2015. Web. 21 Feb 2020.

Vancouver:

Venkatesh SV. Practical Provable Security against Side-Channel Attacks. [Internet] [Doctoral dissertation]. Université du Luxembourg; 2015. [cited 2020 Feb 21]. Available from: http://orbilu.uni.lu/handle/10993/21578.

Council of Science Editors:

Venkatesh SV. Practical Provable Security against Side-Channel Attacks. [Doctoral Dissertation]. Université du Luxembourg; 2015. Available from: http://orbilu.uni.lu/handle/10993/21578


Penn State University

14. Kotapati, Kameswari. Assessing Security of Mobile telecommunication networks.

Degree: PhD, Computer Science and Engineering, 2008, Penn State University

 With the increase in popularity of mobile phones over landlines, the mobile telecommunication network has now become the primary source of communication for not only… (more)

Subjects/Keywords: Three dimensional taxonomy; cascading attacks; attack graphs; vulnerability assessment; EndSec; CAT; aCAT; eCAT; Network dependency Model; MAPSec evaluation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kotapati, K. (2008). Assessing Security of Mobile telecommunication networks. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/8755

Chicago Manual of Style (16th Edition):

Kotapati, Kameswari. “Assessing Security of Mobile telecommunication networks.” 2008. Doctoral Dissertation, Penn State University. Accessed February 21, 2020. https://etda.libraries.psu.edu/catalog/8755.

MLA Handbook (7th Edition):

Kotapati, Kameswari. “Assessing Security of Mobile telecommunication networks.” 2008. Web. 21 Feb 2020.

Vancouver:

Kotapati K. Assessing Security of Mobile telecommunication networks. [Internet] [Doctoral dissertation]. Penn State University; 2008. [cited 2020 Feb 21]. Available from: https://etda.libraries.psu.edu/catalog/8755.

Council of Science Editors:

Kotapati K. Assessing Security of Mobile telecommunication networks. [Doctoral Dissertation]. Penn State University; 2008. Available from: https://etda.libraries.psu.edu/catalog/8755

15. Audinot, Maxime. Assisted design and analysis of attack trees : Assistance à la conception et l’analyse d’arbres d’attaque.

Degree: Docteur es, Informatique, 2018, Rennes 1

En analyse de risques, les arbres d’attaque sont utilisés pour évaluer les menaces sur un système. Les méthodes formelles permettent leur analyse quantitative et leur… (more)

Subjects/Keywords: Arbres d’attaque; Vérification de modèles; Méthodes formelles; Évaluation du risque; Attack trees; Formal methods; Model checking; Risk assessment

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Audinot, M. (2018). Assisted design and analysis of attack trees : Assistance à la conception et l’analyse d’arbres d’attaque. (Doctoral Dissertation). Rennes 1. Retrieved from http://www.theses.fr/2018REN1S082

Chicago Manual of Style (16th Edition):

Audinot, Maxime. “Assisted design and analysis of attack trees : Assistance à la conception et l’analyse d’arbres d’attaque.” 2018. Doctoral Dissertation, Rennes 1. Accessed February 21, 2020. http://www.theses.fr/2018REN1S082.

MLA Handbook (7th Edition):

Audinot, Maxime. “Assisted design and analysis of attack trees : Assistance à la conception et l’analyse d’arbres d’attaque.” 2018. Web. 21 Feb 2020.

Vancouver:

Audinot M. Assisted design and analysis of attack trees : Assistance à la conception et l’analyse d’arbres d’attaque. [Internet] [Doctoral dissertation]. Rennes 1; 2018. [cited 2020 Feb 21]. Available from: http://www.theses.fr/2018REN1S082.

Council of Science Editors:

Audinot M. Assisted design and analysis of attack trees : Assistance à la conception et l’analyse d’arbres d’attaque. [Doctoral Dissertation]. Rennes 1; 2018. Available from: http://www.theses.fr/2018REN1S082


Iowa State University

16. Myers, Luke David. Efficient state estimation via inference on a probabilistic graphical model.

Degree: 2019, Iowa State University

 This thesis presents a unique and efficient solver to the state estimation (SE) problem for the power grid, based on probabilistic graphical models (PGMs). SE… (more)

Subjects/Keywords: false data injection attack; gaussian belief propagation; power grid; probabilistic graphical model; security; state estimation; Electrical and Electronics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Myers, L. D. (2019). Efficient state estimation via inference on a probabilistic graphical model. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/17520

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Myers, Luke David. “Efficient state estimation via inference on a probabilistic graphical model.” 2019. Thesis, Iowa State University. Accessed February 21, 2020. https://lib.dr.iastate.edu/etd/17520.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Myers, Luke David. “Efficient state estimation via inference on a probabilistic graphical model.” 2019. Web. 21 Feb 2020.

Vancouver:

Myers LD. Efficient state estimation via inference on a probabilistic graphical model. [Internet] [Thesis]. Iowa State University; 2019. [cited 2020 Feb 21]. Available from: https://lib.dr.iastate.edu/etd/17520.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Myers LD. Efficient state estimation via inference on a probabilistic graphical model. [Thesis]. Iowa State University; 2019. Available from: https://lib.dr.iastate.edu/etd/17520

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Mississippi State University

17. Chen, Qian. Model-based autonomic security management of networked distributed systems.

Degree: PhD, Electrical and Computer Engineering, 2014, Mississippi State University

  This research focuses on the development and validation of an autonomic security management (ASM) framework to proactively protect distributed systems (DSs) from a wide… (more)

Subjects/Keywords: Intrusion Mitigation and Response System; Self-Protection; Autonomic Computing; Intrusion Detection/Protection System; Network Forensics; Cyber Attack Taxonomy; Cyber Security; Intrusion Estimation; Security Model-based Validation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Q. (2014). Model-based autonomic security management of networked distributed systems. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-07262014-175530/ ;

Chicago Manual of Style (16th Edition):

Chen, Qian. “Model-based autonomic security management of networked distributed systems.” 2014. Doctoral Dissertation, Mississippi State University. Accessed February 21, 2020. http://sun.library.msstate.edu/ETD-db/theses/available/etd-07262014-175530/ ;.

MLA Handbook (7th Edition):

Chen, Qian. “Model-based autonomic security management of networked distributed systems.” 2014. Web. 21 Feb 2020.

Vancouver:

Chen Q. Model-based autonomic security management of networked distributed systems. [Internet] [Doctoral dissertation]. Mississippi State University; 2014. [cited 2020 Feb 21]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07262014-175530/ ;.

Council of Science Editors:

Chen Q. Model-based autonomic security management of networked distributed systems. [Doctoral Dissertation]. Mississippi State University; 2014. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07262014-175530/ ;

18. Lone Sang, Fernand. Protection des systèmes informatiques contre les attaques par entrées-sorties : Protecting Computer Systems against Input/Output Attacks.

Degree: Docteur es, Réseaux, Télécommunications, Systèmes et Architecture, 2012, Toulouse, INSA

Les attaques ciblant les systèmes informatiques vont aujourd'hui au delà de simples logiciels malveillants et impliquent de plus en plus des composants matériels. Cette thèse… (more)

Subjects/Keywords: Sécurité informatique; Attaques par entrées-sorties; Modèle d'attaques; Analyse de vulnérabilités; Fuzzing; Computer security; I/O attacks; Attack model; Vulnerability analysis; Fuzzing; 005.8

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lone Sang, F. (2012). Protection des systèmes informatiques contre les attaques par entrées-sorties : Protecting Computer Systems against Input/Output Attacks. (Doctoral Dissertation). Toulouse, INSA. Retrieved from http://www.theses.fr/2012ISAT0051

Chicago Manual of Style (16th Edition):

Lone Sang, Fernand. “Protection des systèmes informatiques contre les attaques par entrées-sorties : Protecting Computer Systems against Input/Output Attacks.” 2012. Doctoral Dissertation, Toulouse, INSA. Accessed February 21, 2020. http://www.theses.fr/2012ISAT0051.

MLA Handbook (7th Edition):

Lone Sang, Fernand. “Protection des systèmes informatiques contre les attaques par entrées-sorties : Protecting Computer Systems against Input/Output Attacks.” 2012. Web. 21 Feb 2020.

Vancouver:

Lone Sang F. Protection des systèmes informatiques contre les attaques par entrées-sorties : Protecting Computer Systems against Input/Output Attacks. [Internet] [Doctoral dissertation]. Toulouse, INSA; 2012. [cited 2020 Feb 21]. Available from: http://www.theses.fr/2012ISAT0051.

Council of Science Editors:

Lone Sang F. Protection des systèmes informatiques contre les attaques par entrées-sorties : Protecting Computer Systems against Input/Output Attacks. [Doctoral Dissertation]. Toulouse, INSA; 2012. Available from: http://www.theses.fr/2012ISAT0051

19. ZHAO XIAHONG. STATISTICAL MODELLING OF UPPER RESPIRATORY TRACT INFECTIONS.

Degree: 2018, National University of Singapore

Subjects/Keywords: Influenza; Vaccination Effectiveness; Hemagglutination Inhibition Titers; Influenza Seasonality; Attack Rate; Bayesian Hierarchical Model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

XIAHONG, Z. (2018). STATISTICAL MODELLING OF UPPER RESPIRATORY TRACT INFECTIONS. (Thesis). National University of Singapore. Retrieved from http://scholarbank.nus.edu.sg/handle/10635/142813

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

XIAHONG, ZHAO. “STATISTICAL MODELLING OF UPPER RESPIRATORY TRACT INFECTIONS.” 2018. Thesis, National University of Singapore. Accessed February 21, 2020. http://scholarbank.nus.edu.sg/handle/10635/142813.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

XIAHONG, ZHAO. “STATISTICAL MODELLING OF UPPER RESPIRATORY TRACT INFECTIONS.” 2018. Web. 21 Feb 2020.

Vancouver:

XIAHONG Z. STATISTICAL MODELLING OF UPPER RESPIRATORY TRACT INFECTIONS. [Internet] [Thesis]. National University of Singapore; 2018. [cited 2020 Feb 21]. Available from: http://scholarbank.nus.edu.sg/handle/10635/142813.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

XIAHONG Z. STATISTICAL MODELLING OF UPPER RESPIRATORY TRACT INFECTIONS. [Thesis]. National University of Singapore; 2018. Available from: http://scholarbank.nus.edu.sg/handle/10635/142813

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Missouri – Columbia

20. Ivey, Patrick Alton. Exploring the lived psychosocial experience of elite national football league (NFL) players.

Degree: 2013, University of Missouri – Columbia

 The purpose of this study was to explore the psychosocial experiences of elite NFL players. Many athletes dreamed and prepared to make it to the… (more)

Subjects/Keywords: psychosocial analysis; NFL players; Point of Attack; SDT theory; PERMA model; National Football League; Athletes - Psychology; Sports  – Psychological aspects; Personal narratives  – American

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ivey, P. A. (2013). Exploring the lived psychosocial experience of elite national football league (NFL) players. (Thesis). University of Missouri – Columbia. Retrieved from http://hdl.handle.net/10355/46116

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ivey, Patrick Alton. “Exploring the lived psychosocial experience of elite national football league (NFL) players.” 2013. Thesis, University of Missouri – Columbia. Accessed February 21, 2020. http://hdl.handle.net/10355/46116.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ivey, Patrick Alton. “Exploring the lived psychosocial experience of elite national football league (NFL) players.” 2013. Web. 21 Feb 2020.

Vancouver:

Ivey PA. Exploring the lived psychosocial experience of elite national football league (NFL) players. [Internet] [Thesis]. University of Missouri – Columbia; 2013. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/10355/46116.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ivey PA. Exploring the lived psychosocial experience of elite national football league (NFL) players. [Thesis]. University of Missouri – Columbia; 2013. Available from: http://hdl.handle.net/10355/46116

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Ujcich, Benjamin E. An attack model, language, and injector for the control plane of software-defined networks.

Degree: MS, Electrical & Computer Engr, 2016, University of Illinois – Urbana-Champaign

 Software-defined networking (SDN) is an emerging paradigm that differs from traditional approaches to computer networking by decoupling how traffic forwarding should be performed from the… (more)

Subjects/Keywords: software-defined networking (SDN); OpenFlow; control plane; attack model; attack language; attack injection; fault injection; fault tolerance; dependability; security; software testing; software validation

…with attack states that model prior message history. . . . . . . . 35 37 38 38 40 42 43… …connectivity, and configuration of the network. 2 First, we define an attack model that describes… …attack itself, subject to the system constraints given in the attack model. We assume that an… …attack occurs in stages (or states) and model it through an attack state machine… …Third, we implement the attack model and attacks written in the attack language in an attack… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ujcich, B. E. (2016). An attack model, language, and injector for the control plane of software-defined networks. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/92856

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ujcich, Benjamin E. “An attack model, language, and injector for the control plane of software-defined networks.” 2016. Thesis, University of Illinois – Urbana-Champaign. Accessed February 21, 2020. http://hdl.handle.net/2142/92856.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ujcich, Benjamin E. “An attack model, language, and injector for the control plane of software-defined networks.” 2016. Web. 21 Feb 2020.

Vancouver:

Ujcich BE. An attack model, language, and injector for the control plane of software-defined networks. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2016. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/2142/92856.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ujcich BE. An attack model, language, and injector for the control plane of software-defined networks. [Thesis]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/92856

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

22. Alaboodi, Saad Saleh. Towards evaluating security implementations using the Information Security Maturity Model (ISMM).

Degree: 2007, University of Waterloo

 Information security is a common and ever-present concern for both private and public sector organizations. Information security protects information from a wide range of threats,… (more)

Subjects/Keywords: maturity model; information security; IT security; security processes; attack model; optimal security; cost of information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alaboodi, S. S. (2007). Towards evaluating security implementations using the Information Security Maturity Model (ISMM). (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/3049

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alaboodi, Saad Saleh. “Towards evaluating security implementations using the Information Security Maturity Model (ISMM).” 2007. Thesis, University of Waterloo. Accessed February 21, 2020. http://hdl.handle.net/10012/3049.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alaboodi, Saad Saleh. “Towards evaluating security implementations using the Information Security Maturity Model (ISMM).” 2007. Web. 21 Feb 2020.

Vancouver:

Alaboodi SS. Towards evaluating security implementations using the Information Security Maturity Model (ISMM). [Internet] [Thesis]. University of Waterloo; 2007. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/10012/3049.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alaboodi SS. Towards evaluating security implementations using the Information Security Maturity Model (ISMM). [Thesis]. University of Waterloo; 2007. Available from: http://hdl.handle.net/10012/3049

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

23. Yang, Yuhao. Protecting attributes and contents in online social networks.

Degree: PhD, Electrical Engineering & Computer Science, 2014, University of Kansas

 With the extreme popularity of online social networks, security and privacy issues become critical. In particular, it is important to protect user privacy without preventing… (more)

Subjects/Keywords: Computer science; Social structure; Attack Model; Clustering; Online Social Network; Social Circle; User Privacy

…3.3.2.1 Re-identification attack model To launch a re-identification attack, the attacker needs… …secure. Many of the proposed attack and prevention models are based on links among users, which… …incorporate the social circle model derived from social science theories. In this model, there are… …more interactions with each other. We model the ego network with 6 different views, and we… …detail in Chapter 3. Social circle model motivation and circle discovery is talked in Chapter 4… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, Y. (2014). Protecting attributes and contents in online social networks. (Doctoral Dissertation). University of Kansas. Retrieved from http://hdl.handle.net/1808/18413

Chicago Manual of Style (16th Edition):

Yang, Yuhao. “Protecting attributes and contents in online social networks.” 2014. Doctoral Dissertation, University of Kansas. Accessed February 21, 2020. http://hdl.handle.net/1808/18413.

MLA Handbook (7th Edition):

Yang, Yuhao. “Protecting attributes and contents in online social networks.” 2014. Web. 21 Feb 2020.

Vancouver:

Yang Y. Protecting attributes and contents in online social networks. [Internet] [Doctoral dissertation]. University of Kansas; 2014. [cited 2020 Feb 21]. Available from: http://hdl.handle.net/1808/18413.

Council of Science Editors:

Yang Y. Protecting attributes and contents in online social networks. [Doctoral Dissertation]. University of Kansas; 2014. Available from: http://hdl.handle.net/1808/18413

24. Pekić Nikola. Actual methods of application the new generation aircraft in the course of attacking moving targets in the air and on the ground.

Degree: PhD, Mechanical Engineering, 2013, University of Belgrade

 Simulation model of the aircraft conduct in transient flying regimes is shown in this dissertation. A complete motion model of the aircraft as a six… (more)

Subjects/Keywords: manoeuvre properties; engine thrust vector deflection; attack manoeuvre; ground target; flight mode; simulation mode of aircraft motion; boundary layer; weaponry; manevarske karakteristike; otklon vektora potiska motora; manevar napada; zemaljski cilj; mod leta; simulacioni model kretanja aviona; granični sloj; naoružanje

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nikola, P. (2013). Actual methods of application the new generation aircraft in the course of attacking moving targets in the air and on the ground. (Doctoral Dissertation). University of Belgrade. Retrieved from http://dx.doi.org/10.2298/BG20130710PEKIC ; http://eteze.bg.ac.rs/application/showtheses?thesesId=866 ; https://fedorabg.bg.ac.rs/fedora/get/o:7256/bdef:Content/get ; http://vbs.rs/scripts/cobiss?command=SEARCH&base=99999&select=ID=514114723

Chicago Manual of Style (16th Edition):

Nikola, Pekić. “Actual methods of application the new generation aircraft in the course of attacking moving targets in the air and on the ground.” 2013. Doctoral Dissertation, University of Belgrade. Accessed February 21, 2020. http://dx.doi.org/10.2298/BG20130710PEKIC ; http://eteze.bg.ac.rs/application/showtheses?thesesId=866 ; https://fedorabg.bg.ac.rs/fedora/get/o:7256/bdef:Content/get ; http://vbs.rs/scripts/cobiss?command=SEARCH&base=99999&select=ID=514114723.

MLA Handbook (7th Edition):

Nikola, Pekić. “Actual methods of application the new generation aircraft in the course of attacking moving targets in the air and on the ground.” 2013. Web. 21 Feb 2020.

Vancouver:

Nikola P. Actual methods of application the new generation aircraft in the course of attacking moving targets in the air and on the ground. [Internet] [Doctoral dissertation]. University of Belgrade; 2013. [cited 2020 Feb 21]. Available from: http://dx.doi.org/10.2298/BG20130710PEKIC ; http://eteze.bg.ac.rs/application/showtheses?thesesId=866 ; https://fedorabg.bg.ac.rs/fedora/get/o:7256/bdef:Content/get ; http://vbs.rs/scripts/cobiss?command=SEARCH&base=99999&select=ID=514114723.

Council of Science Editors:

Nikola P. Actual methods of application the new generation aircraft in the course of attacking moving targets in the air and on the ground. [Doctoral Dissertation]. University of Belgrade; 2013. Available from: http://dx.doi.org/10.2298/BG20130710PEKIC ; http://eteze.bg.ac.rs/application/showtheses?thesesId=866 ; https://fedorabg.bg.ac.rs/fedora/get/o:7256/bdef:Content/get ; http://vbs.rs/scripts/cobiss?command=SEARCH&base=99999&select=ID=514114723


Indian Institute of Science

25. Chethan Kamath, H. Constructing Provably Secure Identity-Based Signature Schemes.

Degree: 2013, Indian Institute of Science

 An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented by any arbitrary string such as an e-mail address. The… (more)

Subjects/Keywords: Identity Based Signature; Provably Secure sSgnatures; Schnorr Signature; Oracle Replay Attack; Galindo-Garcia Identity Based Signature; Random Oracles; Identity-Based Cryptosystems; Identity Based Signatures - Forking; Provable Security; Selective-Identity Model; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chethan Kamath, H. (2013). Constructing Provably Secure Identity-Based Signature Schemes. (Thesis). Indian Institute of Science. Retrieved from http://etd.iisc.ernet.in/2005/3330 ; http://etd.iisc.ernet.in/abstracts/4194/G25722-Abs.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chethan Kamath, H. “Constructing Provably Secure Identity-Based Signature Schemes.” 2013. Thesis, Indian Institute of Science. Accessed February 21, 2020. http://etd.iisc.ernet.in/2005/3330 ; http://etd.iisc.ernet.in/abstracts/4194/G25722-Abs.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chethan Kamath, H. “Constructing Provably Secure Identity-Based Signature Schemes.” 2013. Web. 21 Feb 2020.

Vancouver:

Chethan Kamath H. Constructing Provably Secure Identity-Based Signature Schemes. [Internet] [Thesis]. Indian Institute of Science; 2013. [cited 2020 Feb 21]. Available from: http://etd.iisc.ernet.in/2005/3330 ; http://etd.iisc.ernet.in/abstracts/4194/G25722-Abs.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chethan Kamath H. Constructing Provably Secure Identity-Based Signature Schemes. [Thesis]. Indian Institute of Science; 2013. Available from: http://etd.iisc.ernet.in/2005/3330 ; http://etd.iisc.ernet.in/abstracts/4194/G25722-Abs.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


George Mason University

26. Dang, Fengying. POD-based Flow Estimation and Its Application in Control of Underwater Robots .

Degree: George Mason University

 Flow estimation plays an important role in the control and navigation of autonomous underwater robots. It is challenging for underwater robots because of the complex… (more)

Subjects/Keywords: underwater robot; reduced-order flow model; angle-of-attack control; flow estimation; Bayesian estimation; navigation and control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dang, F. (n.d.). POD-based Flow Estimation and Its Application in Control of Underwater Robots . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/11592

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dang, Fengying. “POD-based Flow Estimation and Its Application in Control of Underwater Robots .” Thesis, George Mason University. Accessed February 21, 2020. http://hdl.handle.net/1920/11592.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dang, Fengying. “POD-based Flow Estimation and Its Application in Control of Underwater Robots .” Web. 21 Feb 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Dang F. POD-based Flow Estimation and Its Application in Control of Underwater Robots . [Internet] [Thesis]. George Mason University; [cited 2020 Feb 21]. Available from: http://hdl.handle.net/1920/11592.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Dang F. POD-based Flow Estimation and Its Application in Control of Underwater Robots . [Thesis]. George Mason University; Available from: http://hdl.handle.net/1920/11592

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

27. Rubio Hernan, Jose Manuel. Detection of attacks against cyber-physical industrial systems : Détection des attaques contre les systèmes cyber-physiques industriels.

Degree: Docteur es, Informatique et réseaux, 2017, Evry, Institut national des télécommunications

Nous abordons des problèmes de sécurité dans des systèmes cyber-physiques industriels. Les attaques contre ces systèmes doivent être traitées à la fois en matière de… (more)

Subjects/Keywords: Sécurité cyber-physique; Théorie du contrôle; Sécurité du réseau; Systèmes contrôlés via un réseau; Infrastructures critiques; Détection d’attaques; Modèle d’adversaire; Adversaire cyber-physique; Cyber-physical security; Control theory; Network security; Networked-control system; Critical infrastructures; Attack detection; Adversary model; Cyber-physical adversary

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rubio Hernan, J. M. (2017). Detection of attacks against cyber-physical industrial systems : Détection des attaques contre les systèmes cyber-physiques industriels. (Doctoral Dissertation). Evry, Institut national des télécommunications. Retrieved from http://www.theses.fr/2017TELE0015

Chicago Manual of Style (16th Edition):

Rubio Hernan, Jose Manuel. “Detection of attacks against cyber-physical industrial systems : Détection des attaques contre les systèmes cyber-physiques industriels.” 2017. Doctoral Dissertation, Evry, Institut national des télécommunications. Accessed February 21, 2020. http://www.theses.fr/2017TELE0015.

MLA Handbook (7th Edition):

Rubio Hernan, Jose Manuel. “Detection of attacks against cyber-physical industrial systems : Détection des attaques contre les systèmes cyber-physiques industriels.” 2017. Web. 21 Feb 2020.

Vancouver:

Rubio Hernan JM. Detection of attacks against cyber-physical industrial systems : Détection des attaques contre les systèmes cyber-physiques industriels. [Internet] [Doctoral dissertation]. Evry, Institut national des télécommunications; 2017. [cited 2020 Feb 21]. Available from: http://www.theses.fr/2017TELE0015.

Council of Science Editors:

Rubio Hernan JM. Detection of attacks against cyber-physical industrial systems : Détection des attaques contre les systèmes cyber-physiques industriels. [Doctoral Dissertation]. Evry, Institut national des télécommunications; 2017. Available from: http://www.theses.fr/2017TELE0015


Delft University of Technology

28. Ma, X. Cement paste degradation under external sulfate attack: An experimental and numerical research.

Degree: 2018, Delft University of Technology

 Chemical degradation of cementitious materials is a serious threat to the durability and performance of concrete structures. External sulfate attack is one of the situations… (more)

Subjects/Keywords: External sulfate attack; Cement paste; Thin-wall pipe; Longitudinal restraint; Expansion; Stress; Crack initiation and propagation; Lattice fracture model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ma, X. (2018). Cement paste degradation under external sulfate attack: An experimental and numerical research. (Doctoral Dissertation). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; urn:NBN:nl:ui:24-uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; 8da7150b-eec8-4148-b277-538b6bfc1384 ; 10.4233/uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; urn:isbn:978-94-6186-982-1 ; urn:NBN:nl:ui:24-uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; http://resolver.tudelft.nl/uuid:8da7150b-eec8-4148-b277-538b6bfc1384

Chicago Manual of Style (16th Edition):

Ma, X. “Cement paste degradation under external sulfate attack: An experimental and numerical research.” 2018. Doctoral Dissertation, Delft University of Technology. Accessed February 21, 2020. http://resolver.tudelft.nl/uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; urn:NBN:nl:ui:24-uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; 8da7150b-eec8-4148-b277-538b6bfc1384 ; 10.4233/uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; urn:isbn:978-94-6186-982-1 ; urn:NBN:nl:ui:24-uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; http://resolver.tudelft.nl/uuid:8da7150b-eec8-4148-b277-538b6bfc1384.

MLA Handbook (7th Edition):

Ma, X. “Cement paste degradation under external sulfate attack: An experimental and numerical research.” 2018. Web. 21 Feb 2020.

Vancouver:

Ma X. Cement paste degradation under external sulfate attack: An experimental and numerical research. [Internet] [Doctoral dissertation]. Delft University of Technology; 2018. [cited 2020 Feb 21]. Available from: http://resolver.tudelft.nl/uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; urn:NBN:nl:ui:24-uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; 8da7150b-eec8-4148-b277-538b6bfc1384 ; 10.4233/uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; urn:isbn:978-94-6186-982-1 ; urn:NBN:nl:ui:24-uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; http://resolver.tudelft.nl/uuid:8da7150b-eec8-4148-b277-538b6bfc1384.

Council of Science Editors:

Ma X. Cement paste degradation under external sulfate attack: An experimental and numerical research. [Doctoral Dissertation]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; urn:NBN:nl:ui:24-uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; 8da7150b-eec8-4148-b277-538b6bfc1384 ; 10.4233/uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; urn:isbn:978-94-6186-982-1 ; urn:NBN:nl:ui:24-uuid:8da7150b-eec8-4148-b277-538b6bfc1384 ; http://resolver.tudelft.nl/uuid:8da7150b-eec8-4148-b277-538b6bfc1384

29. Mesele, Asmelash Girmay. AUTOSARLang: Threat Modeling and Attack Simulation for Vehicle Cybersecurity.

Degree: Electrical Engineering and Computer Science (EECS), 2018, KTH

The rapid growth and development of the Information and Communications Technology attract many industries including the automotive industry. Since the last four decades, the… (more)

Subjects/Keywords: vehicular cybersecurity; threat model; attack simulation; AUTOSAR Adaptive Platform; vehicular cybersecurity; hot modell; attack simulering; AUTOSAR Adaptiv plattform; Engineering and Technology; Teknik och teknologier

…attacks and attack steps), makes the threat model by writing a MAL specification and… …vulnerabilities and threats of the identified assets • Model the threats with Meta Attack Language… …and SecuriLang) that is used to model the cybersecurity attack. The study used an agile… …Attack Simulation •Validate the threat model with test cases, and make attack simulation… …Attack Simulation and Model Validation An already prepared MAL specification needs to be… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mesele, A. G. (2018). AUTOSARLang: Threat Modeling and Attack Simulation for Vehicle Cybersecurity. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240410

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mesele, Asmelash Girmay. “AUTOSARLang: Threat Modeling and Attack Simulation for Vehicle Cybersecurity.” 2018. Thesis, KTH. Accessed February 21, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240410.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mesele, Asmelash Girmay. “AUTOSARLang: Threat Modeling and Attack Simulation for Vehicle Cybersecurity.” 2018. Web. 21 Feb 2020.

Vancouver:

Mesele AG. AUTOSARLang: Threat Modeling and Attack Simulation for Vehicle Cybersecurity. [Internet] [Thesis]. KTH; 2018. [cited 2020 Feb 21]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240410.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mesele AG. AUTOSARLang: Threat Modeling and Attack Simulation for Vehicle Cybersecurity. [Thesis]. KTH; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240410

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Vanderbilt University

30. Neema, Himanshu. Large-Scale Integration of Heterogeneous Simulations.

Degree: PhD, Computer Science, 2018, Vanderbilt University

 Systems-of-Systems (SoS) are composed of several interacting and interdependent systems that necessitate the integration of complex, heterogeneous models that represent the ensemble from different points… (more)

Subjects/Keywords: Modeling; Simulation; Model-Based Simulation Integration; Courses-of-Action; Distributed Simulations; High-Level Architecture; Cyber-Attack Library; FMU Co-Simulation; Ontology Based Model Composition; Functional Mockup Interface; Partitioning Dynamical Models; Scenario-Based Experimentation; Mapping Methods for Legacy Simulation Integration; Generic Network Simulation; Cyber-Attacks; Multi-Physics Simulation; Ontological Mapping Rules; COA; Ontological System Models; FMI

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Neema, H. (2018). Large-Scale Integration of Heterogeneous Simulations. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://etd.library.vanderbilt.edu/available/etd-01172018-232437/ ;

Chicago Manual of Style (16th Edition):

Neema, Himanshu. “Large-Scale Integration of Heterogeneous Simulations.” 2018. Doctoral Dissertation, Vanderbilt University. Accessed February 21, 2020. http://etd.library.vanderbilt.edu/available/etd-01172018-232437/ ;.

MLA Handbook (7th Edition):

Neema, Himanshu. “Large-Scale Integration of Heterogeneous Simulations.” 2018. Web. 21 Feb 2020.

Vancouver:

Neema H. Large-Scale Integration of Heterogeneous Simulations. [Internet] [Doctoral dissertation]. Vanderbilt University; 2018. [cited 2020 Feb 21]. Available from: http://etd.library.vanderbilt.edu/available/etd-01172018-232437/ ;.

Council of Science Editors:

Neema H. Large-Scale Integration of Heterogeneous Simulations. [Doctoral Dissertation]. Vanderbilt University; 2018. Available from: http://etd.library.vanderbilt.edu/available/etd-01172018-232437/ ;

[1] [2]

.