Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(computer hacking). Showing records 1 – 30 of 33 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Deakin University

1. KHORSHED, TANZIM. Combating cyber attacks in cloud computing using machine learning techniques.

Degree: School of Information Technology, 2016, Deakin University

 An extensive investigative survey on Cloud Computing with the main focus on gaps that is slowing down Cloud adoption as well as reviewing the threat… (more)

Subjects/Keywords: Cloud computing; Computer networks; Computer hacking; Internet hosting services; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

KHORSHED, T. (2016). Combating cyber attacks in cloud computing using machine learning techniques. (Thesis). Deakin University. Retrieved from http://hdl.handle.net/10536/DRO/DU:30089157

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

KHORSHED, TANZIM. “Combating cyber attacks in cloud computing using machine learning techniques.” 2016. Thesis, Deakin University. Accessed January 15, 2021. http://hdl.handle.net/10536/DRO/DU:30089157.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

KHORSHED, TANZIM. “Combating cyber attacks in cloud computing using machine learning techniques.” 2016. Web. 15 Jan 2021.

Vancouver:

KHORSHED T. Combating cyber attacks in cloud computing using machine learning techniques. [Internet] [Thesis]. Deakin University; 2016. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10536/DRO/DU:30089157.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

KHORSHED T. Combating cyber attacks in cloud computing using machine learning techniques. [Thesis]. Deakin University; 2016. Available from: http://hdl.handle.net/10536/DRO/DU:30089157

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

2. Tsai, Ju-han. Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level.

Degree: Master, Information Management, 2010, NSYSU

 Given that computer hacking cause huge loss among firms, itâs necessary to understand how individuals engage to commit it. Most of previous research on computer(more)

Subjects/Keywords: Severity Level of Computer Hacking; Punishment Certainty; Punishment Severity; Moral Intensity; Social Learning Theory; Intrinsic Motivation; Computer Hacking; Extrinsic Motivation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, J. (2010). Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719110-162237

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Ju-han. “Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level.” 2010. Thesis, NSYSU. Accessed January 15, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719110-162237.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Ju-han. “Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level.” 2010. Web. 15 Jan 2021.

Vancouver:

Tsai J. Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level. [Internet] [Thesis]. NSYSU; 2010. [cited 2021 Jan 15]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719110-162237.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai J. Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level. [Thesis]. NSYSU; 2010. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719110-162237

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

3. Sjödin, Andreas. The ADS-B protocol and its'weaknesses : Exploring potential attack vectors.

Degree: Electrical Engineering and Computer Science (EECS), 2020, KTH

ADS-B är ett protokoll som används över hela världen för att piloter och flygledning ska få en bättre bild över trafiksituationen i luften.Tidigare studier… (more)

Subjects/Keywords: ADS-B; Air Safety; Hacking; OSSTMM3; Pentesting;

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sjödin, A. (2020). The ADS-B protocol and its'weaknesses : Exploring potential attack vectors. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sjödin, Andreas. “The ADS-B protocol and its'weaknesses : Exploring potential attack vectors.” 2020. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sjödin, Andreas. “The ADS-B protocol and its'weaknesses : Exploring potential attack vectors.” 2020. Web. 15 Jan 2021.

Vancouver:

Sjödin A. The ADS-B protocol and its'weaknesses : Exploring potential attack vectors. [Internet] [Thesis]. KTH; 2020. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sjödin A. The ADS-B protocol and its'weaknesses : Exploring potential attack vectors. [Thesis]. KTH; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brunel University

4. Shanmugam, Karthikeyan. Validating digital forensic evidence.

Degree: PhD, 2011, Brunel University

 This dissertation focuses on the forensic validation of computer evidence. It is a burgeoning field, by necessity, and there have been significant advances in the… (more)

Subjects/Keywords: 363.25; Security; Hacking; Computer vulnerability; Virus attack; Trojan horse attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shanmugam, K. (2011). Validating digital forensic evidence. (Doctoral Dissertation). Brunel University. Retrieved from http://bura.brunel.ac.uk/handle/2438/7651 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.582883

Chicago Manual of Style (16th Edition):

Shanmugam, Karthikeyan. “Validating digital forensic evidence.” 2011. Doctoral Dissertation, Brunel University. Accessed January 15, 2021. http://bura.brunel.ac.uk/handle/2438/7651 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.582883.

MLA Handbook (7th Edition):

Shanmugam, Karthikeyan. “Validating digital forensic evidence.” 2011. Web. 15 Jan 2021.

Vancouver:

Shanmugam K. Validating digital forensic evidence. [Internet] [Doctoral dissertation]. Brunel University; 2011. [cited 2021 Jan 15]. Available from: http://bura.brunel.ac.uk/handle/2438/7651 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.582883.

Council of Science Editors:

Shanmugam K. Validating digital forensic evidence. [Doctoral Dissertation]. Brunel University; 2011. Available from: http://bura.brunel.ac.uk/handle/2438/7651 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.582883

5. Franklin, Paige; Adams, Ryan. What the hack is a hacker?.

Degree: 2019, James Madison University

 The purpose of this study is to examine the historical tendencies and characteristics of hackers to create a holistic definition of what it means to… (more)

Subjects/Keywords: hack; hacker; hacking; computer science; programming; identity; Social and Behavioral Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Franklin, Paige; Adams, R. (2019). What the hack is a hacker?. (Masters Thesis). James Madison University. Retrieved from https://commons.lib.jmu.edu/honors201019/671

Chicago Manual of Style (16th Edition):

Franklin, Paige; Adams, Ryan. “What the hack is a hacker?.” 2019. Masters Thesis, James Madison University. Accessed January 15, 2021. https://commons.lib.jmu.edu/honors201019/671.

MLA Handbook (7th Edition):

Franklin, Paige; Adams, Ryan. “What the hack is a hacker?.” 2019. Web. 15 Jan 2021.

Vancouver:

Franklin, Paige; Adams R. What the hack is a hacker?. [Internet] [Masters thesis]. James Madison University; 2019. [cited 2021 Jan 15]. Available from: https://commons.lib.jmu.edu/honors201019/671.

Council of Science Editors:

Franklin, Paige; Adams R. What the hack is a hacker?. [Masters Thesis]. James Madison University; 2019. Available from: https://commons.lib.jmu.edu/honors201019/671


NSYSU

6. Wang, Yu-ching. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.

Degree: Master, Information Management, 2012, NSYSU

 Unauthorized computer access by employees is the most common hacking behavior in every company. Hence, it is necessary to first understand why an employee engages… (more)

Subjects/Keywords: Differential Association Theory; Neutralization Theory; Unauthorized Computer Access; Containment Theory; Computer Hacking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Y. (2012). A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Yu-ching. “A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.” 2012. Thesis, NSYSU. Accessed January 15, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Yu-ching. “A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.” 2012. Web. 15 Jan 2021.

Vancouver:

Wang Y. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. [Internet] [Thesis]. NSYSU; 2012. [cited 2021 Jan 15]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang Y. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Arizona State University

7. Santana Marin, Ericsson. A Hacker-Centric Perspective to Empower Cyber Defense.

Degree: Computer Science, 2020, Arizona State University

 Malicious hackers utilize the World Wide Web to share knowledge. Previous work has demonstrated that information mined from online hacking communities can be used as… (more)

Subjects/Keywords: Computer science; Artificial Intelligence; Cybersecurity; Darkweb; Machine Learning; Online Hacking Communities; Social Network Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Santana Marin, E. (2020). A Hacker-Centric Perspective to Empower Cyber Defense. (Doctoral Dissertation). Arizona State University. Retrieved from http://repository.asu.edu/items/57382

Chicago Manual of Style (16th Edition):

Santana Marin, Ericsson. “A Hacker-Centric Perspective to Empower Cyber Defense.” 2020. Doctoral Dissertation, Arizona State University. Accessed January 15, 2021. http://repository.asu.edu/items/57382.

MLA Handbook (7th Edition):

Santana Marin, Ericsson. “A Hacker-Centric Perspective to Empower Cyber Defense.” 2020. Web. 15 Jan 2021.

Vancouver:

Santana Marin E. A Hacker-Centric Perspective to Empower Cyber Defense. [Internet] [Doctoral dissertation]. Arizona State University; 2020. [cited 2021 Jan 15]. Available from: http://repository.asu.edu/items/57382.

Council of Science Editors:

Santana Marin E. A Hacker-Centric Perspective to Empower Cyber Defense. [Doctoral Dissertation]. Arizona State University; 2020. Available from: http://repository.asu.edu/items/57382


Rhodes University

8. Smit, Liam. Towards understanding and mitigating attacks leveraging zero-day exploits.

Degree: Faculty of Science, Computer Science, 2020, Rhodes University

 Zero-day vulnerabilities are unknown and therefore not addressed with the result that they can be exploited by attackers to gain unauthorised system access. In order… (more)

Subjects/Keywords: Computer crimes  – Prevention; Data protection; Hacking; Computer security; Computer networks  – Security measures; Computers  – Access control; Malware (Computer software)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smit, L. (2020). Towards understanding and mitigating attacks leveraging zero-day exploits. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/115718

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Smit, Liam. “Towards understanding and mitigating attacks leveraging zero-day exploits.” 2020. Thesis, Rhodes University. Accessed January 15, 2021. http://hdl.handle.net/10962/115718.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Smit, Liam. “Towards understanding and mitigating attacks leveraging zero-day exploits.” 2020. Web. 15 Jan 2021.

Vancouver:

Smit L. Towards understanding and mitigating attacks leveraging zero-day exploits. [Internet] [Thesis]. Rhodes University; 2020. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10962/115718.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Smit L. Towards understanding and mitigating attacks leveraging zero-day exploits. [Thesis]. Rhodes University; 2020. Available from: http://hdl.handle.net/10962/115718

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

9. Nilsson, Robin. Penetration testing of Android applications.

Degree: Electrical Engineering and Computer Science (EECS), 2020, KTH

The market of Android applications is huge, and in 2019, Google Play users worldwide downloaded 84.3 billion mobile applications. With such a big user… (more)

Subjects/Keywords: Ethical hacking; penetration testing; Android application security; reverse engineering; threat modeling; Etisk hacking; penetrationstest; Android-applikationssäkerhet; baklängeskonstruktion; hotmodellering; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nilsson, R. (2020). Penetration testing of Android applications. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280290

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nilsson, Robin. “Penetration testing of Android applications.” 2020. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280290.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nilsson, Robin. “Penetration testing of Android applications.” 2020. Web. 15 Jan 2021.

Vancouver:

Nilsson R. Penetration testing of Android applications. [Internet] [Thesis]. KTH; 2020. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280290.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nilsson R. Penetration testing of Android applications. [Thesis]. KTH; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280290

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Halmstad University

10. Türk, Jakob Lingaas. Comparing the relative efficacy of phishing emails.

Degree: Information Technology, 2020, Halmstad University

This study aimed to examine if there was a difference in how likely a victim is to click on a phishing email’s links based… (more)

Subjects/Keywords: Phishing; Spam Filter; Social engineering; ethical hacking; spam filter evasion; spear phishing; Phishing; Spam Filter; Social engineering; ethical hacking; spam filter evasion; spear phishing; Computer Systems; Datorsystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Türk, J. L. (2020). Comparing the relative efficacy of phishing emails. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42392

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Türk, Jakob Lingaas. “Comparing the relative efficacy of phishing emails.” 2020. Thesis, Halmstad University. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42392.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Türk, Jakob Lingaas. “Comparing the relative efficacy of phishing emails.” 2020. Web. 15 Jan 2021.

Vancouver:

Türk JL. Comparing the relative efficacy of phishing emails. [Internet] [Thesis]. Halmstad University; 2020. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42392.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Türk JL. Comparing the relative efficacy of phishing emails. [Thesis]. Halmstad University; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42392

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

11. Martin, Christopher. Digital image watermarking techniques.

Degree: Computer Engineering, 2000, Rochester Institute of Technology

 The ability to resolve ownership disputes and copyright infringement is difficult in the worldwide digital age. There is an increasing need to develop techniques that… (more)

Subjects/Keywords: Computer science; Digital data protection; File hacking; Watermarking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Martin, C. (2000). Digital image watermarking techniques. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/648

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Martin, Christopher. “Digital image watermarking techniques.” 2000. Thesis, Rochester Institute of Technology. Accessed January 15, 2021. https://scholarworks.rit.edu/theses/648.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Martin, Christopher. “Digital image watermarking techniques.” 2000. Web. 15 Jan 2021.

Vancouver:

Martin C. Digital image watermarking techniques. [Internet] [Thesis]. Rochester Institute of Technology; 2000. [cited 2021 Jan 15]. Available from: https://scholarworks.rit.edu/theses/648.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Martin C. Digital image watermarking techniques. [Thesis]. Rochester Institute of Technology; 2000. Available from: https://scholarworks.rit.edu/theses/648

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

12. Torgilsman, Christoffer. Ethical Hacking of a Robot Vacuum Cleaner.

Degree: Electrical Engineering and Computer Science (EECS), 2020, KTH

This study revolves around the safety of IoT devices, more specifically how safe the robot vacuum cleaner Ironpie m6 is. The method is based… (more)

Subjects/Keywords: IoT; Ethical Hacking; Penetration testing; Threat Model; Security; DREAD; STRIDE; Encryption; MQTT; Ironpie m6; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Torgilsman, C. (2020). Ethical Hacking of a Robot Vacuum Cleaner. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277918

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Torgilsman, Christoffer. “Ethical Hacking of a Robot Vacuum Cleaner.” 2020. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277918.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Torgilsman, Christoffer. “Ethical Hacking of a Robot Vacuum Cleaner.” 2020. Web. 15 Jan 2021.

Vancouver:

Torgilsman C. Ethical Hacking of a Robot Vacuum Cleaner. [Internet] [Thesis]. KTH; 2020. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277918.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Torgilsman C. Ethical Hacking of a Robot Vacuum Cleaner. [Thesis]. KTH; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277918

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Debrecen

13. Eskaif, Nedal. Computer Security .

Degree: DE – Informatikai Kar, University of Debrecen

 With the rapid development of the enormous and frightening spread of information networks which turned the distances between countries and made it less and less… (more)

Subjects/Keywords: Computer Security; Viruses; Hacking; Hackers; malwares; ACL; SSL; Cryptograpgy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Eskaif, N. (n.d.). Computer Security . (Thesis). University of Debrecen. Retrieved from http://hdl.handle.net/2437/233023

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Eskaif, Nedal. “Computer Security .” Thesis, University of Debrecen. Accessed January 15, 2021. http://hdl.handle.net/2437/233023.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Eskaif, Nedal. “Computer Security .” Web. 15 Jan 2021.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Eskaif N. Computer Security . [Internet] [Thesis]. University of Debrecen; [cited 2021 Jan 15]. Available from: http://hdl.handle.net/2437/233023.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Eskaif N. Computer Security . [Thesis]. University of Debrecen; Available from: http://hdl.handle.net/2437/233023

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


KTH

14. Pettersson, Anders. Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities.

Degree: Electrical Engineering and Computer Science (EECS), 2019, KTH

Bug bounties are an increasingly popular way of performing penetration tests of web applications. User statistics of bug bounty platforms show that a lot… (more)

Subjects/Keywords: Markov decision process; Reinforcement learning; Machine learning; Web vulnerabilities; Attack surfaces; Hacking; Bug Bounty; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pettersson, A. (2019). Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254642

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pettersson, Anders. “Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities.” 2019. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254642.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pettersson, Anders. “Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities.” 2019. Web. 15 Jan 2021.

Vancouver:

Pettersson A. Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities. [Internet] [Thesis]. KTH; 2019. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254642.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pettersson A. Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities. [Thesis]. KTH; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254642

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

15. Vitek, Viktor. Implementing a Nudge to Prevent Email Phishing.

Degree: Electrical Engineering and Computer Science (EECS), 2019, KTH

Phishing is a reoccurring issue, which uses social engineering as an attack strategy. The prevention of these attacks is often content-based filters. These solutions… (more)

Subjects/Keywords: Hacking; Phishing; Social Engineering; Psychology; Nudge;

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vitek, V. (2019). Implementing a Nudge to Prevent Email Phishing. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259403

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vitek, Viktor. “Implementing a Nudge to Prevent Email Phishing.” 2019. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259403.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vitek, Viktor. “Implementing a Nudge to Prevent Email Phishing.” 2019. Web. 15 Jan 2021.

Vancouver:

Vitek V. Implementing a Nudge to Prevent Email Phishing. [Internet] [Thesis]. KTH; 2019. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259403.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vitek V. Implementing a Nudge to Prevent Email Phishing. [Thesis]. KTH; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259403

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

16. Dostál, Otto. Právní aspekty boje proti počítačové trestné činnosti: Legal Aspects of Fighting Cybercrime.

Degree: 2020, Brno University of Technology

 The thesis deals with the topic of computer crime. Foremost, it demonstrates on an example of the operation of a medical image information processing system… (more)

Subjects/Keywords: Počítačová kriminalita; kyberkriminalita; právo; Úmluva o počítačové kriminalitě; hacking; detekce hrozeb; datový provoz; optické sítě; MeDiMed.; Computer crime; cybercrime; law; Convention on Cybercrime; hacking; thread detection; data traffic; optical networks; MeDiMed.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dostál, O. (2020). Právní aspekty boje proti počítačové trestné činnosti: Legal Aspects of Fighting Cybercrime. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/195563

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dostál, Otto. “Právní aspekty boje proti počítačové trestné činnosti: Legal Aspects of Fighting Cybercrime.” 2020. Thesis, Brno University of Technology. Accessed January 15, 2021. http://hdl.handle.net/11012/195563.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dostál, Otto. “Právní aspekty boje proti počítačové trestné činnosti: Legal Aspects of Fighting Cybercrime.” 2020. Web. 15 Jan 2021.

Vancouver:

Dostál O. Právní aspekty boje proti počítačové trestné činnosti: Legal Aspects of Fighting Cybercrime. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/11012/195563.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dostál O. Právní aspekty boje proti počítačové trestné činnosti: Legal Aspects of Fighting Cybercrime. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/195563

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

17. Galal, Daria. Security Test of iZettle's Reader 2 : A card terminal for safe payments?.

Degree: Electrical Engineering and Computer Science (EECS), 2020, KTH

Ethical hacking and penetration testing are two methods often used when organizations and companies want to measure their level of information security, and find… (more)

Subjects/Keywords: izettle reader; ethical hacking; threat modelling; penetration testing; bluetooth; https.; izettle reader; etisk hackning; hotmodellering; penetrationstestning; bluetooth; https.; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Galal, D. (2020). Security Test of iZettle's Reader 2 : A card terminal for safe payments?. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277913

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Galal, Daria. “Security Test of iZettle's Reader 2 : A card terminal for safe payments?.” 2020. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277913.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Galal, Daria. “Security Test of iZettle's Reader 2 : A card terminal for safe payments?.” 2020. Web. 15 Jan 2021.

Vancouver:

Galal D. Security Test of iZettle's Reader 2 : A card terminal for safe payments?. [Internet] [Thesis]. KTH; 2020. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277913.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Galal D. Security Test of iZettle's Reader 2 : A card terminal for safe payments?. [Thesis]. KTH; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277913

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linnaeus University

18. Akkaya, Deniz. Honeypots in network security.

Degree: Physics and Mathematics, 2010, Linnaeus University

  Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking… (more)

Subjects/Keywords: Honeypot; hacking; security; forensic analysis of honeypots; network; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Akkaya, D. (2010). Honeypots in network security. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Akkaya, Deniz. “Honeypots in network security.” 2010. Thesis, Linnaeus University. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Akkaya, Deniz. “Honeypots in network security.” 2010. Web. 15 Jan 2021.

Vancouver:

Akkaya D. Honeypots in network security. [Internet] [Thesis]. Linnaeus University; 2010. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Akkaya D. Honeypots in network security. [Thesis]. Linnaeus University; 2010. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Halmstad University

19. Axelsson, Andreas. Bluetoothsäkerhet, neglegerad eller (o)kunskap.

Degree: Information Technology, 2019, Halmstad University

  Under 2017 hittades sårbarheten Blueborne som gjorde att en person kunde ta sig in i mobiltelefoner eller datorer helt obemärkt genom att enheten endast… (more)

Subjects/Keywords: Bluetooth; IT security; security; investigation; vulnerability; eavesdropping; hacking; Bluetooth; it-säkerhet; säkerhet; undersökning; sårbarhet; avlyssning; hack; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Axelsson, A. (2019). Bluetoothsäkerhet, neglegerad eller (o)kunskap. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Axelsson, Andreas. “Bluetoothsäkerhet, neglegerad eller (o)kunskap.” 2019. Thesis, Halmstad University. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Axelsson, Andreas. “Bluetoothsäkerhet, neglegerad eller (o)kunskap.” 2019. Web. 15 Jan 2021.

Vancouver:

Axelsson A. Bluetoothsäkerhet, neglegerad eller (o)kunskap. [Internet] [Thesis]. Halmstad University; 2019. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Axelsson A. Bluetoothsäkerhet, neglegerad eller (o)kunskap. [Thesis]. Halmstad University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


East Tennessee State University

20. Cui, Zhiqiang. Security Incidents in an Academic Setting: A Case Study.

Degree: MS, Computer and Information Science, 2002, East Tennessee State University

  Academic institutes' networks, like commercial networks, have confidential and valuable information that attracts hackers. From 6 October 2000 to 29 March 2001, the authors… (more)

Subjects/Keywords: Security; Attack; Hacking; Probe; Hack; Computer Sciences; Physical Sciences and Mathematics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cui, Z. (2002). Security Incidents in an Academic Setting: A Case Study. (Thesis). East Tennessee State University. Retrieved from https://dc.etsu.edu/etd/664

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cui, Zhiqiang. “Security Incidents in an Academic Setting: A Case Study.” 2002. Thesis, East Tennessee State University. Accessed January 15, 2021. https://dc.etsu.edu/etd/664.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cui, Zhiqiang. “Security Incidents in an Academic Setting: A Case Study.” 2002. Web. 15 Jan 2021.

Vancouver:

Cui Z. Security Incidents in an Academic Setting: A Case Study. [Internet] [Thesis]. East Tennessee State University; 2002. [cited 2021 Jan 15]. Available from: https://dc.etsu.edu/etd/664.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cui Z. Security Incidents in an Academic Setting: A Case Study. [Thesis]. East Tennessee State University; 2002. Available from: https://dc.etsu.edu/etd/664

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

21. Gran, Tommie Höglund. Hacking a Commercial Drone.

Degree: Electrical Engineering and Computer Science (EECS), 2020, KTH

Obemannade luftfarkoster, även kallade drönare, är del av IoT-revolutionen och har uppmärksammats de senaste åren på grund av integritetsfrågor såväl som flygplats- och militär… (more)

Subjects/Keywords: ethical hacking; internet of things; penetration testing; threat modeling; unmanned aerial vehicle; etisk hackning; hotmodellering; obemannad luftfarkost; penetrationstestning; sakernas internet; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gran, T. H. (2020). Hacking a Commercial Drone. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284573

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gran, Tommie Höglund. “Hacking a Commercial Drone.” 2020. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284573.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gran, Tommie Höglund. “Hacking a Commercial Drone.” 2020. Web. 15 Jan 2021.

Vancouver:

Gran TH. Hacking a Commercial Drone. [Internet] [Thesis]. KTH; 2020. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284573.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gran TH. Hacking a Commercial Drone. [Thesis]. KTH; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284573

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Africa

22. Njotini, Mzukisi Niven. E-crimes and e-authentication - a legal perspective .

Degree: 2016, University of South Africa

 E-crimes continue to generate grave challenges to the ICT regulatory agenda. Because e-crimes involve a wrongful appropriation of information online, it is enquired whether information… (more)

Subjects/Keywords: Biometric characters; Computer hacking; Distributed denial of service (DDoS) attacks; E-authentication; Furtum,; ICT regulation; ID fraud; ID theft; Information or computer systems; Larceny; Man-in-the-middle attacks; Phishing; Precautionary principle and user characters; ICTs; PAEAN

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Njotini, M. N. (2016). E-crimes and e-authentication - a legal perspective . (Doctoral Dissertation). University of South Africa. Retrieved from http://hdl.handle.net/10500/21720

Chicago Manual of Style (16th Edition):

Njotini, Mzukisi Niven. “E-crimes and e-authentication - a legal perspective .” 2016. Doctoral Dissertation, University of South Africa. Accessed January 15, 2021. http://hdl.handle.net/10500/21720.

MLA Handbook (7th Edition):

Njotini, Mzukisi Niven. “E-crimes and e-authentication - a legal perspective .” 2016. Web. 15 Jan 2021.

Vancouver:

Njotini MN. E-crimes and e-authentication - a legal perspective . [Internet] [Doctoral dissertation]. University of South Africa; 2016. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10500/21720.

Council of Science Editors:

Njotini MN. E-crimes and e-authentication - a legal perspective . [Doctoral Dissertation]. University of South Africa; 2016. Available from: http://hdl.handle.net/10500/21720


Youngstown State University

23. Steh, Stephen R. Unauthorized Access Crimes.

Degree: MSin Criminal Justice, Department of Criminal Justice, 2009, Youngstown State University

 This paper examines the concept of unauthorized access crimes statutes in the fifty states and the federal system in order to determine the concept of… (more)

Subjects/Keywords: Computer Science; Criminology; Law; Technology; computer crime; hacking; unauthorized access; legislation and case law

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Steh, S. R. (2009). Unauthorized Access Crimes. (Masters Thesis). Youngstown State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817

Chicago Manual of Style (16th Edition):

Steh, Stephen R. “Unauthorized Access Crimes.” 2009. Masters Thesis, Youngstown State University. Accessed January 15, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

MLA Handbook (7th Edition):

Steh, Stephen R. “Unauthorized Access Crimes.” 2009. Web. 15 Jan 2021.

Vancouver:

Steh SR. Unauthorized Access Crimes. [Internet] [Masters thesis]. Youngstown State University; 2009. [cited 2021 Jan 15]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

Council of Science Editors:

Steh SR. Unauthorized Access Crimes. [Masters Thesis]. Youngstown State University; 2009. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817

24. Rosado Murillo, Luis Felipe. Transnationality, Morality, and Politics of Computing Expertise.

Degree: Anthropology, 2015, UCLA

 In this dissertation I examine the alterglobalization of computer expertise with a focus on the creation of political, economic, moral, and technical ties among computer(more)

Subjects/Keywords: Cultural anthropology; computer hacking; expertise; free software; morality; open hardware; transnationality

hacking today? Why is this question worth asking from an anthropological perspective? Computer… …CHAPTER 4. Imagined Spaces and Convivial Places of Hacking… …expansion of information and communication infrastructures, computer expertise has become a… …practices, and moral orientations. This common rubric is that of “hacking” whose agent has been… …information and communication infrastructures brought invisible computer collectives to the… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rosado Murillo, L. F. (2015). Transnationality, Morality, and Politics of Computing Expertise. (Thesis). UCLA. Retrieved from http://www.escholarship.org/uc/item/2rd8656g

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rosado Murillo, Luis Felipe. “Transnationality, Morality, and Politics of Computing Expertise.” 2015. Thesis, UCLA. Accessed January 15, 2021. http://www.escholarship.org/uc/item/2rd8656g.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rosado Murillo, Luis Felipe. “Transnationality, Morality, and Politics of Computing Expertise.” 2015. Web. 15 Jan 2021.

Vancouver:

Rosado Murillo LF. Transnationality, Morality, and Politics of Computing Expertise. [Internet] [Thesis]. UCLA; 2015. [cited 2021 Jan 15]. Available from: http://www.escholarship.org/uc/item/2rd8656g.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rosado Murillo LF. Transnationality, Morality, and Politics of Computing Expertise. [Thesis]. UCLA; 2015. Available from: http://www.escholarship.org/uc/item/2rd8656g

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

25. Bilan, Carolina. Säkerhetshot och lösningar för privatpersoner med bredband.

Degree: 2001, , Department of Software Engineering and Computer Science

  As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers… (more)

Subjects/Keywords: Bredband; Brandvägg; Säkerhet; Virus; Antivirus; Personlig Brandvägg; Hackning; Hackare; Broadband; Firewall; Security; Hacking; Hackers; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bilan, C. (2001). Säkerhetshot och lösningar för privatpersoner med bredband. (Thesis). , Department of Software Engineering and Computer Science. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bilan, Carolina. “Säkerhetshot och lösningar för privatpersoner med bredband.” 2001. Thesis, , Department of Software Engineering and Computer Science. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bilan, Carolina. “Säkerhetshot och lösningar för privatpersoner med bredband.” 2001. Web. 15 Jan 2021.

Vancouver:

Bilan C. Säkerhetshot och lösningar för privatpersoner med bredband. [Internet] [Thesis]. , Department of Software Engineering and Computer Science; 2001. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bilan C. Säkerhetshot och lösningar för privatpersoner med bredband. [Thesis]. , Department of Software Engineering and Computer Science; 2001. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

26. Christensen, Ludvig. Ethical hacking of IoT devices: OBD-II dongles.

Degree: Electrical Engineering and Computer Science (EECS), 2019, KTH

The subject area of this project is IT security related to cars, specifically the security of devices connected through a cars OBD-II connector. The… (more)

Subjects/Keywords: Hacking; OBD-II; Threat model; IoT security; AutoPi; Computer and Information Sciences; Data- och informationsvetenskap

hacking AutoPi’s WiFi was not found to be vulnerable to any particular known attacks against… …School of Electrical Engineering and Computer Science (EECS), 2018. [3] M… …Alamitos, CA, USA), pp. 278–283, IEEE Computer Society, sep 2016. [6] R. Khan, K… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Christensen, L. (2019). Ethical hacking of IoT devices: OBD-II dongles. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254571

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Christensen, Ludvig. “Ethical hacking of IoT devices: OBD-II dongles.” 2019. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254571.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Christensen, Ludvig. “Ethical hacking of IoT devices: OBD-II dongles.” 2019. Web. 15 Jan 2021.

Vancouver:

Christensen L. Ethical hacking of IoT devices: OBD-II dongles. [Internet] [Thesis]. KTH; 2019. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254571.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Christensen L. Ethical hacking of IoT devices: OBD-II dongles. [Thesis]. KTH; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254571

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

27. Ottosson, Henrik. Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities.

Degree: Database and information techniques, 2018, Linköping University

Having a proper method of defense against attacks is crucial for web applications to ensure the safety of both the application itself and its… (more)

Subjects/Keywords: Web Applications; Vulnerabilitiy Scanning; Automation; Ethical Hacking; Penetration Testing; Information Security; Computer Sciences; Datavetenskap (datalogi)

…malicious hacking, the title of ethical hacker1 , and the title of penetration tester… …National Institute of Standards and Technology, has presented a Guide to Computer Security Log… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ottosson, H. (2018). Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148581

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ottosson, Henrik. “Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities.” 2018. Thesis, Linköping University. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148581.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ottosson, Henrik. “Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities.” 2018. Web. 15 Jan 2021.

Vancouver:

Ottosson H. Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities. [Internet] [Thesis]. Linköping University; 2018. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148581.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ottosson H. Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities. [Thesis]. Linköping University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148581

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

28. Koelemeijer, Dorien. Auster: A service designed on the context of a surveillance society in an increasingly connected world.

Degree: 2015, , Faculty of Culture and Society (KS)

  The privacy and surveillance issues that are consequences of the Internet of Things are the motivation and grounding for this thesis project. The Internet… (more)

Subjects/Keywords: interaction design; human computer interaction; internet of things; the internet of things; IoT; surveillance; sousveillance; hacking; do it yourself; diy; data; big data; data obfuscation; arduino; decentralisation; internet; privacy; security; data mining; data analysis; Engineering and Technology; Teknik och teknologier

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koelemeijer, D. (2015). Auster: A service designed on the context of a surveillance society in an increasingly connected world. (Thesis). , Faculty of Culture and Society (KS). Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21852

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Koelemeijer, Dorien. “Auster: A service designed on the context of a surveillance society in an increasingly connected world.” 2015. Thesis, , Faculty of Culture and Society (KS). Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21852.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Koelemeijer, Dorien. “Auster: A service designed on the context of a surveillance society in an increasingly connected world.” 2015. Web. 15 Jan 2021.

Vancouver:

Koelemeijer D. Auster: A service designed on the context of a surveillance society in an increasingly connected world. [Internet] [Thesis]. , Faculty of Culture and Society (KS); 2015. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21852.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Koelemeijer D. Auster: A service designed on the context of a surveillance society in an increasingly connected world. [Thesis]. , Faculty of Culture and Society (KS); 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21852

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Africa

29. Maat, Sandra Mariana. Cyber crime: a comparative law analysis .

Degree: 2009, University of South Africa

 The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter… (more)

Subjects/Keywords: Digital signatures; Cryptography; Cyber inspectors; Unauthorised interception; Computer-related fraud; Theft of information; Denial of service attacks; Cyber crime; Hacking; Rogue code

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maat, S. M. (2009). Cyber crime: a comparative law analysis . (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/2056

Chicago Manual of Style (16th Edition):

Maat, Sandra Mariana. “Cyber crime: a comparative law analysis .” 2009. Masters Thesis, University of South Africa. Accessed January 15, 2021. http://hdl.handle.net/10500/2056.

MLA Handbook (7th Edition):

Maat, Sandra Mariana. “Cyber crime: a comparative law analysis .” 2009. Web. 15 Jan 2021.

Vancouver:

Maat SM. Cyber crime: a comparative law analysis . [Internet] [Masters thesis]. University of South Africa; 2009. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10500/2056.

Council of Science Editors:

Maat SM. Cyber crime: a comparative law analysis . [Masters Thesis]. University of South Africa; 2009. Available from: http://hdl.handle.net/10500/2056

30. Robberts, Christopher. Finding Vulnerabilities in IoT Devices : Ethical Hacking of Electronic Locks.

Degree: Electrical Engineering and Computer Science (EECS), 2019, KTH

Internet of Things (IoT) devices are becoming more ubiquitous than ever before, and while security is not that important for every type of device,… (more)

Subjects/Keywords: ethical hacking; penetration testing; electronic locks; internet of things; iot; threat modeling; security; etisk hacking; penetrationstestning; elektroniska lås; sakernas internet; iot; hotmodellering; säkerhet; Computer and Information Sciences; Data- och informationsvetenskap

…to exploit the product does not lead to a vulnerability. A central part of hacking "… …5.4 Problems and constraints At the beginning of the hacking phase of the project much… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Robberts, C. (2019). Finding Vulnerabilities in IoT Devices : Ethical Hacking of Electronic Locks. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254667

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Robberts, Christopher. “Finding Vulnerabilities in IoT Devices : Ethical Hacking of Electronic Locks.” 2019. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254667.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Robberts, Christopher. “Finding Vulnerabilities in IoT Devices : Ethical Hacking of Electronic Locks.” 2019. Web. 15 Jan 2021.

Vancouver:

Robberts C. Finding Vulnerabilities in IoT Devices : Ethical Hacking of Electronic Locks. [Internet] [Thesis]. KTH; 2019. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254667.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Robberts C. Finding Vulnerabilities in IoT Devices : Ethical Hacking of Electronic Locks. [Thesis]. KTH; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254667

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2]

.