Advanced search options
You searched for subject:(computer hacking)
.
Showing records 1 – 30 of
33 total matches.
▼ Search Limiters
Deakin University
1. KHORSHED, TANZIM. Combating cyber attacks in cloud computing using machine learning techniques.
Degree: School of Information Technology, 2016, Deakin University
URL: http://hdl.handle.net/10536/DRO/DU:30089157
Subjects/Keywords: Cloud computing; Computer networks; Computer hacking; Internet hosting services; Computer security
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
KHORSHED, T. (2016). Combating cyber attacks in cloud computing using machine learning techniques. (Thesis). Deakin University. Retrieved from http://hdl.handle.net/10536/DRO/DU:30089157
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
KHORSHED, TANZIM. “Combating cyber attacks in cloud computing using machine learning techniques.” 2016. Thesis, Deakin University. Accessed January 15, 2021. http://hdl.handle.net/10536/DRO/DU:30089157.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
KHORSHED, TANZIM. “Combating cyber attacks in cloud computing using machine learning techniques.” 2016. Web. 15 Jan 2021.
Vancouver:
KHORSHED T. Combating cyber attacks in cloud computing using machine learning techniques. [Internet] [Thesis]. Deakin University; 2016. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10536/DRO/DU:30089157.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
KHORSHED T. Combating cyber attacks in cloud computing using machine learning techniques. [Thesis]. Deakin University; 2016. Available from: http://hdl.handle.net/10536/DRO/DU:30089157
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
NSYSU
2. Tsai, Ju-han. Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level.
Degree: Master, Information Management, 2010, NSYSU
URL: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719110-162237
Subjects/Keywords: Severity Level of Computer Hacking; Punishment Certainty; Punishment Severity; Moral Intensity; Social Learning Theory; Intrinsic Motivation; Computer Hacking; Extrinsic Motivation
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Tsai, J. (2010). Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719110-162237
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Tsai, Ju-han. “Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level.” 2010. Thesis, NSYSU. Accessed January 15, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719110-162237.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Tsai, Ju-han. “Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level.” 2010. Web. 15 Jan 2021.
Vancouver:
Tsai J. Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level. [Internet] [Thesis]. NSYSU; 2010. [cited 2021 Jan 15]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719110-162237.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Tsai J. Examine the Synergy Effect of Motivation, Morality, Deterrence, and Social Learning Perspectives to Intention of Computer Hacking -The Moderation Role of Severity Level. [Thesis]. NSYSU; 2010. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719110-162237
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
KTH
3. Sjödin, Andreas. The ADS-B protocol and its'weaknesses : Exploring potential attack vectors.
Degree: Electrical Engineering and Computer Science (EECS), 2020, KTH
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283
Subjects/Keywords: ADS-B; Air Safety; Hacking; OSSTMM3; Pentesting;
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Sjödin, A. (2020). The ADS-B protocol and its'weaknesses : Exploring potential attack vectors. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Sjödin, Andreas. “The ADS-B protocol and its'weaknesses : Exploring potential attack vectors.” 2020. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Sjödin, Andreas. “The ADS-B protocol and its'weaknesses : Exploring potential attack vectors.” 2020. Web. 15 Jan 2021.
Vancouver:
Sjödin A. The ADS-B protocol and its'weaknesses : Exploring potential attack vectors. [Internet] [Thesis]. KTH; 2020. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Sjödin A. The ADS-B protocol and its'weaknesses : Exploring potential attack vectors. [Thesis]. KTH; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Brunel University
4. Shanmugam, Karthikeyan. Validating digital forensic evidence.
Degree: PhD, 2011, Brunel University
URL: http://bura.brunel.ac.uk/handle/2438/7651
;
http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.582883
Subjects/Keywords: 363.25; Security; Hacking; Computer vulnerability; Virus attack; Trojan horse attack
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Shanmugam, K. (2011). Validating digital forensic evidence. (Doctoral Dissertation). Brunel University. Retrieved from http://bura.brunel.ac.uk/handle/2438/7651 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.582883
Chicago Manual of Style (16th Edition):
Shanmugam, Karthikeyan. “Validating digital forensic evidence.” 2011. Doctoral Dissertation, Brunel University. Accessed January 15, 2021. http://bura.brunel.ac.uk/handle/2438/7651 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.582883.
MLA Handbook (7th Edition):
Shanmugam, Karthikeyan. “Validating digital forensic evidence.” 2011. Web. 15 Jan 2021.
Vancouver:
Shanmugam K. Validating digital forensic evidence. [Internet] [Doctoral dissertation]. Brunel University; 2011. [cited 2021 Jan 15]. Available from: http://bura.brunel.ac.uk/handle/2438/7651 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.582883.
Council of Science Editors:
Shanmugam K. Validating digital forensic evidence. [Doctoral Dissertation]. Brunel University; 2011. Available from: http://bura.brunel.ac.uk/handle/2438/7651 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.582883
5.
Franklin, Paige; Adams, Ryan.
What the hack is a hacker?.
Degree: 2019, James Madison University
URL: https://commons.lib.jmu.edu/honors201019/671
Subjects/Keywords: hack; hacker; hacking; computer science; programming; identity; Social and Behavioral Sciences
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Franklin, Paige; Adams, R. (2019). What the hack is a hacker?. (Masters Thesis). James Madison University. Retrieved from https://commons.lib.jmu.edu/honors201019/671
Chicago Manual of Style (16th Edition):
Franklin, Paige; Adams, Ryan. “What the hack is a hacker?.” 2019. Masters Thesis, James Madison University. Accessed January 15, 2021. https://commons.lib.jmu.edu/honors201019/671.
MLA Handbook (7th Edition):
Franklin, Paige; Adams, Ryan. “What the hack is a hacker?.” 2019. Web. 15 Jan 2021.
Vancouver:
Franklin, Paige; Adams R. What the hack is a hacker?. [Internet] [Masters thesis]. James Madison University; 2019. [cited 2021 Jan 15]. Available from: https://commons.lib.jmu.edu/honors201019/671.
Council of Science Editors:
Franklin, Paige; Adams R. What the hack is a hacker?. [Masters Thesis]. James Madison University; 2019. Available from: https://commons.lib.jmu.edu/honors201019/671
NSYSU
6. Wang, Yu-ching. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.
Degree: Master, Information Management, 2012, NSYSU
URL: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405
Subjects/Keywords: Differential Association Theory; Neutralization Theory; Unauthorized Computer Access; Containment Theory; Computer Hacking
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Wang, Y. (2012). A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Wang, Yu-ching. “A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.” 2012. Thesis, NSYSU. Accessed January 15, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Wang, Yu-ching. “A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory.” 2012. Web. 15 Jan 2021.
Vancouver:
Wang Y. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. [Internet] [Thesis]. NSYSU; 2012. [cited 2021 Jan 15]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Wang Y. A Study of Employee Unauthorized Computer Access Intention â An Integration of Neutralization, Differential Association and Containment Theory. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0817112-194405
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Arizona State University
7. Santana Marin, Ericsson. A Hacker-Centric Perspective to Empower Cyber Defense.
Degree: Computer Science, 2020, Arizona State University
URL: http://repository.asu.edu/items/57382
Subjects/Keywords: Computer science; Artificial Intelligence; Cybersecurity; Darkweb; Machine Learning; Online Hacking Communities; Social Network Analysis
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Santana Marin, E. (2020). A Hacker-Centric Perspective to Empower Cyber Defense. (Doctoral Dissertation). Arizona State University. Retrieved from http://repository.asu.edu/items/57382
Chicago Manual of Style (16th Edition):
Santana Marin, Ericsson. “A Hacker-Centric Perspective to Empower Cyber Defense.” 2020. Doctoral Dissertation, Arizona State University. Accessed January 15, 2021. http://repository.asu.edu/items/57382.
MLA Handbook (7th Edition):
Santana Marin, Ericsson. “A Hacker-Centric Perspective to Empower Cyber Defense.” 2020. Web. 15 Jan 2021.
Vancouver:
Santana Marin E. A Hacker-Centric Perspective to Empower Cyber Defense. [Internet] [Doctoral dissertation]. Arizona State University; 2020. [cited 2021 Jan 15]. Available from: http://repository.asu.edu/items/57382.
Council of Science Editors:
Santana Marin E. A Hacker-Centric Perspective to Empower Cyber Defense. [Doctoral Dissertation]. Arizona State University; 2020. Available from: http://repository.asu.edu/items/57382
Rhodes University
8. Smit, Liam. Towards understanding and mitigating attacks leveraging zero-day exploits.
Degree: Faculty of Science, Computer Science, 2020, Rhodes University
URL: http://hdl.handle.net/10962/115718
Subjects/Keywords: Computer crimes – Prevention; Data protection; Hacking; Computer security; Computer networks – Security measures; Computers – Access control; Malware (Computer software)
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Smit, L. (2020). Towards understanding and mitigating attacks leveraging zero-day exploits. (Thesis). Rhodes University. Retrieved from http://hdl.handle.net/10962/115718
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Smit, Liam. “Towards understanding and mitigating attacks leveraging zero-day exploits.” 2020. Thesis, Rhodes University. Accessed January 15, 2021. http://hdl.handle.net/10962/115718.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Smit, Liam. “Towards understanding and mitigating attacks leveraging zero-day exploits.” 2020. Web. 15 Jan 2021.
Vancouver:
Smit L. Towards understanding and mitigating attacks leveraging zero-day exploits. [Internet] [Thesis]. Rhodes University; 2020. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10962/115718.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Smit L. Towards understanding and mitigating attacks leveraging zero-day exploits. [Thesis]. Rhodes University; 2020. Available from: http://hdl.handle.net/10962/115718
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
KTH
9. Nilsson, Robin. Penetration testing of Android applications.
Degree: Electrical Engineering and Computer Science (EECS), 2020, KTH
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280290
Subjects/Keywords: Ethical hacking; penetration testing; Android application security; reverse engineering; threat modeling; Etisk hacking; penetrationstest; Android-applikationssäkerhet; baklängeskonstruktion; hotmodellering; Computer and Information Sciences; Data- och informationsvetenskap
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Nilsson, R. (2020). Penetration testing of Android applications. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280290
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Nilsson, Robin. “Penetration testing of Android applications.” 2020. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280290.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Nilsson, Robin. “Penetration testing of Android applications.” 2020. Web. 15 Jan 2021.
Vancouver:
Nilsson R. Penetration testing of Android applications. [Internet] [Thesis]. KTH; 2020. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280290.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Nilsson R. Penetration testing of Android applications. [Thesis]. KTH; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280290
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Halmstad University
10. Türk, Jakob Lingaas. Comparing the relative efficacy of phishing emails.
Degree: Information Technology, 2020, Halmstad University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42392
Subjects/Keywords: Phishing; Spam Filter; Social engineering; ethical hacking; spam filter evasion; spear phishing; Phishing; Spam Filter; Social engineering; ethical hacking; spam filter evasion; spear phishing; Computer Systems; Datorsystem
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Türk, J. L. (2020). Comparing the relative efficacy of phishing emails. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42392
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Türk, Jakob Lingaas. “Comparing the relative efficacy of phishing emails.” 2020. Thesis, Halmstad University. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42392.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Türk, Jakob Lingaas. “Comparing the relative efficacy of phishing emails.” 2020. Web. 15 Jan 2021.
Vancouver:
Türk JL. Comparing the relative efficacy of phishing emails. [Internet] [Thesis]. Halmstad University; 2020. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42392.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Türk JL. Comparing the relative efficacy of phishing emails. [Thesis]. Halmstad University; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42392
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Rochester Institute of Technology
11. Martin, Christopher. Digital image watermarking techniques.
Degree: Computer Engineering, 2000, Rochester Institute of Technology
URL: https://scholarworks.rit.edu/theses/648
Subjects/Keywords: Computer science; Digital data protection; File hacking; Watermarking
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Martin, C. (2000). Digital image watermarking techniques. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/648
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Martin, Christopher. “Digital image watermarking techniques.” 2000. Thesis, Rochester Institute of Technology. Accessed January 15, 2021. https://scholarworks.rit.edu/theses/648.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Martin, Christopher. “Digital image watermarking techniques.” 2000. Web. 15 Jan 2021.
Vancouver:
Martin C. Digital image watermarking techniques. [Internet] [Thesis]. Rochester Institute of Technology; 2000. [cited 2021 Jan 15]. Available from: https://scholarworks.rit.edu/theses/648.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Martin C. Digital image watermarking techniques. [Thesis]. Rochester Institute of Technology; 2000. Available from: https://scholarworks.rit.edu/theses/648
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
KTH
12. Torgilsman, Christoffer. Ethical Hacking of a Robot Vacuum Cleaner.
Degree: Electrical Engineering and Computer Science (EECS), 2020, KTH
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277918
Subjects/Keywords: IoT; Ethical Hacking; Penetration testing; Threat Model; Security; DREAD; STRIDE; Encryption; MQTT; Ironpie m6; Computer and Information Sciences; Data- och informationsvetenskap
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Torgilsman, C. (2020). Ethical Hacking of a Robot Vacuum Cleaner. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277918
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Torgilsman, Christoffer. “Ethical Hacking of a Robot Vacuum Cleaner.” 2020. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277918.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Torgilsman, Christoffer. “Ethical Hacking of a Robot Vacuum Cleaner.” 2020. Web. 15 Jan 2021.
Vancouver:
Torgilsman C. Ethical Hacking of a Robot Vacuum Cleaner. [Internet] [Thesis]. KTH; 2020. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277918.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Torgilsman C. Ethical Hacking of a Robot Vacuum Cleaner. [Thesis]. KTH; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277918
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of Debrecen
13. Eskaif, Nedal. Computer Security .
Degree: DE – Informatikai Kar, University of Debrecen
URL: http://hdl.handle.net/2437/233023
Subjects/Keywords: Computer Security; Viruses; Hacking; Hackers; malwares; ACL; SSL; Cryptograpgy
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Eskaif, N. (n.d.). Computer Security . (Thesis). University of Debrecen. Retrieved from http://hdl.handle.net/2437/233023
Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Eskaif, Nedal. “Computer Security .” Thesis, University of Debrecen. Accessed January 15, 2021. http://hdl.handle.net/2437/233023.
Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Eskaif, Nedal. “Computer Security .” Web. 15 Jan 2021.
Note: this citation may be lacking information needed for this citation format:
No year of publication.
Vancouver:
Eskaif N. Computer Security . [Internet] [Thesis]. University of Debrecen; [cited 2021 Jan 15]. Available from: http://hdl.handle.net/2437/233023.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.
Council of Science Editors:
Eskaif N. Computer Security . [Thesis]. University of Debrecen; Available from: http://hdl.handle.net/2437/233023
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.
KTH
14. Pettersson, Anders. Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities.
Degree: Electrical Engineering and Computer Science (EECS), 2019, KTH
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254642
Subjects/Keywords: Markov decision process; Reinforcement learning; Machine learning; Web vulnerabilities; Attack surfaces; Hacking; Bug Bounty; Computer and Information Sciences; Data- och informationsvetenskap
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Pettersson, A. (2019). Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254642
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Pettersson, Anders. “Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities.” 2019. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254642.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Pettersson, Anders. “Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities.” 2019. Web. 15 Jan 2021.
Vancouver:
Pettersson A. Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities. [Internet] [Thesis]. KTH; 2019. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254642.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Pettersson A. Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities. [Thesis]. KTH; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254642
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
KTH
15. Vitek, Viktor. Implementing a Nudge to Prevent Email Phishing.
Degree: Electrical Engineering and Computer Science (EECS), 2019, KTH
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259403
Subjects/Keywords: Hacking; Phishing; Social Engineering; Psychology; Nudge;
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Vitek, V. (2019). Implementing a Nudge to Prevent Email Phishing. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259403
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Vitek, Viktor. “Implementing a Nudge to Prevent Email Phishing.” 2019. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259403.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Vitek, Viktor. “Implementing a Nudge to Prevent Email Phishing.” 2019. Web. 15 Jan 2021.
Vancouver:
Vitek V. Implementing a Nudge to Prevent Email Phishing. [Internet] [Thesis]. KTH; 2019. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259403.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Vitek V. Implementing a Nudge to Prevent Email Phishing. [Thesis]. KTH; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259403
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Brno University of Technology
16. Dostál, Otto. Právní aspekty boje proti počítačové trestné činnosti: Legal Aspects of Fighting Cybercrime.
Degree: 2020, Brno University of Technology
URL: http://hdl.handle.net/11012/195563
Subjects/Keywords: Počítačová kriminalita; kyberkriminalita; právo; Úmluva o počítačové kriminalitě; hacking; detekce hrozeb; datový provoz; optické sítě; MeDiMed.; Computer crime; cybercrime; law; Convention on Cybercrime; hacking; thread detection; data traffic; optical networks; MeDiMed.
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Dostál, O. (2020). Právní aspekty boje proti počítačové trestné činnosti: Legal Aspects of Fighting Cybercrime. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/195563
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Dostál, Otto. “Právní aspekty boje proti počítačové trestné činnosti: Legal Aspects of Fighting Cybercrime.” 2020. Thesis, Brno University of Technology. Accessed January 15, 2021. http://hdl.handle.net/11012/195563.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Dostál, Otto. “Právní aspekty boje proti počítačové trestné činnosti: Legal Aspects of Fighting Cybercrime.” 2020. Web. 15 Jan 2021.
Vancouver:
Dostál O. Právní aspekty boje proti počítačové trestné činnosti: Legal Aspects of Fighting Cybercrime. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/11012/195563.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Dostál O. Právní aspekty boje proti počítačové trestné činnosti: Legal Aspects of Fighting Cybercrime. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/195563
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
KTH
17. Galal, Daria. Security Test of iZettle's Reader 2 : A card terminal for safe payments?.
Degree: Electrical Engineering and Computer Science (EECS), 2020, KTH
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277913
Subjects/Keywords: izettle reader; ethical hacking; threat modelling; penetration testing; bluetooth; https.; izettle reader; etisk hackning; hotmodellering; penetrationstestning; bluetooth; https.; Computer and Information Sciences; Data- och informationsvetenskap
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Galal, D. (2020). Security Test of iZettle's Reader 2 : A card terminal for safe payments?. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277913
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Galal, Daria. “Security Test of iZettle's Reader 2 : A card terminal for safe payments?.” 2020. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277913.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Galal, Daria. “Security Test of iZettle's Reader 2 : A card terminal for safe payments?.” 2020. Web. 15 Jan 2021.
Vancouver:
Galal D. Security Test of iZettle's Reader 2 : A card terminal for safe payments?. [Internet] [Thesis]. KTH; 2020. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277913.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Galal D. Security Test of iZettle's Reader 2 : A card terminal for safe payments?. [Thesis]. KTH; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277913
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Linnaeus University
18. Akkaya, Deniz. Honeypots in network security.
Degree: Physics and Mathematics, 2010, Linnaeus University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600
Subjects/Keywords: Honeypot; hacking; security; forensic analysis of honeypots; network; Computer Sciences; Datavetenskap (datalogi)
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Akkaya, D. (2010). Honeypots in network security. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Akkaya, Deniz. “Honeypots in network security.” 2010. Thesis, Linnaeus University. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Akkaya, Deniz. “Honeypots in network security.” 2010. Web. 15 Jan 2021.
Vancouver:
Akkaya D. Honeypots in network security. [Internet] [Thesis]. Linnaeus University; 2010. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Akkaya D. Honeypots in network security. [Thesis]. Linnaeus University; 2010. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Halmstad University
19. Axelsson, Andreas. Bluetoothsäkerhet, neglegerad eller (o)kunskap.
Degree: Information Technology, 2019, Halmstad University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40131
Subjects/Keywords: Bluetooth; IT security; security; investigation; vulnerability; eavesdropping; hacking; Bluetooth; it-säkerhet; säkerhet; undersökning; sårbarhet; avlyssning; hack; Computer and Information Sciences; Data- och informationsvetenskap
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Axelsson, A. (2019). Bluetoothsäkerhet, neglegerad eller (o)kunskap. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40131
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Axelsson, Andreas. “Bluetoothsäkerhet, neglegerad eller (o)kunskap.” 2019. Thesis, Halmstad University. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40131.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Axelsson, Andreas. “Bluetoothsäkerhet, neglegerad eller (o)kunskap.” 2019. Web. 15 Jan 2021.
Vancouver:
Axelsson A. Bluetoothsäkerhet, neglegerad eller (o)kunskap. [Internet] [Thesis]. Halmstad University; 2019. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40131.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Axelsson A. Bluetoothsäkerhet, neglegerad eller (o)kunskap. [Thesis]. Halmstad University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40131
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
East Tennessee State University
20. Cui, Zhiqiang. Security Incidents in an Academic Setting: A Case Study.
Degree: MS, Computer and Information Science, 2002, East Tennessee State University
URL: https://dc.etsu.edu/etd/664
Subjects/Keywords: Security; Attack; Hacking; Probe; Hack; Computer Sciences; Physical Sciences and Mathematics
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Cui, Z. (2002). Security Incidents in an Academic Setting: A Case Study. (Thesis). East Tennessee State University. Retrieved from https://dc.etsu.edu/etd/664
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Cui, Zhiqiang. “Security Incidents in an Academic Setting: A Case Study.” 2002. Thesis, East Tennessee State University. Accessed January 15, 2021. https://dc.etsu.edu/etd/664.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Cui, Zhiqiang. “Security Incidents in an Academic Setting: A Case Study.” 2002. Web. 15 Jan 2021.
Vancouver:
Cui Z. Security Incidents in an Academic Setting: A Case Study. [Internet] [Thesis]. East Tennessee State University; 2002. [cited 2021 Jan 15]. Available from: https://dc.etsu.edu/etd/664.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Cui Z. Security Incidents in an Academic Setting: A Case Study. [Thesis]. East Tennessee State University; 2002. Available from: https://dc.etsu.edu/etd/664
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
KTH
21. Gran, Tommie Höglund. Hacking a Commercial Drone.
Degree: Electrical Engineering and Computer Science (EECS), 2020, KTH
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284573
Subjects/Keywords: ethical hacking; internet of things; penetration testing; threat modeling; unmanned aerial vehicle; etisk hackning; hotmodellering; obemannad luftfarkost; penetrationstestning; sakernas internet; Computer and Information Sciences; Data- och informationsvetenskap
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Gran, T. H. (2020). Hacking a Commercial Drone. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284573
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Gran, Tommie Höglund. “Hacking a Commercial Drone.” 2020. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284573.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Gran, Tommie Höglund. “Hacking a Commercial Drone.” 2020. Web. 15 Jan 2021.
Vancouver:
Gran TH. Hacking a Commercial Drone. [Internet] [Thesis]. KTH; 2020. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284573.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Gran TH. Hacking a Commercial Drone. [Thesis]. KTH; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284573
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of South Africa
22. Njotini, Mzukisi Niven. E-crimes and e-authentication - a legal perspective .
Degree: 2016, University of South Africa
URL: http://hdl.handle.net/10500/21720
Subjects/Keywords: Biometric characters; Computer hacking; Distributed denial of service (DDoS) attacks; E-authentication; Furtum,; ICT regulation; ID fraud; ID theft; Information or computer systems; Larceny; Man-in-the-middle attacks; Phishing; Precautionary principle and user characters; ICTs; PAEAN
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Njotini, M. N. (2016). E-crimes and e-authentication - a legal perspective . (Doctoral Dissertation). University of South Africa. Retrieved from http://hdl.handle.net/10500/21720
Chicago Manual of Style (16th Edition):
Njotini, Mzukisi Niven. “E-crimes and e-authentication - a legal perspective .” 2016. Doctoral Dissertation, University of South Africa. Accessed January 15, 2021. http://hdl.handle.net/10500/21720.
MLA Handbook (7th Edition):
Njotini, Mzukisi Niven. “E-crimes and e-authentication - a legal perspective .” 2016. Web. 15 Jan 2021.
Vancouver:
Njotini MN. E-crimes and e-authentication - a legal perspective . [Internet] [Doctoral dissertation]. University of South Africa; 2016. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10500/21720.
Council of Science Editors:
Njotini MN. E-crimes and e-authentication - a legal perspective . [Doctoral Dissertation]. University of South Africa; 2016. Available from: http://hdl.handle.net/10500/21720
Youngstown State University
23. Steh, Stephen R. Unauthorized Access Crimes.
Degree: MSin Criminal Justice, Department of Criminal Justice, 2009, Youngstown State University
URL: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817
Subjects/Keywords: Computer Science; Criminology; Law; Technology; computer crime; hacking; unauthorized access; legislation and case law
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Steh, S. R. (2009). Unauthorized Access Crimes. (Masters Thesis). Youngstown State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817
Chicago Manual of Style (16th Edition):
Steh, Stephen R. “Unauthorized Access Crimes.” 2009. Masters Thesis, Youngstown State University. Accessed January 15, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
MLA Handbook (7th Edition):
Steh, Stephen R. “Unauthorized Access Crimes.” 2009. Web. 15 Jan 2021.
Vancouver:
Steh SR. Unauthorized Access Crimes. [Internet] [Masters thesis]. Youngstown State University; 2009. [cited 2021 Jan 15]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
Council of Science Editors:
Steh SR. Unauthorized Access Crimes. [Masters Thesis]. Youngstown State University; 2009. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817
24. Rosado Murillo, Luis Felipe. Transnationality, Morality, and Politics of Computing Expertise.
Degree: Anthropology, 2015, UCLA
URL: http://www.escholarship.org/uc/item/2rd8656g
Subjects/Keywords: Cultural anthropology; computer hacking; expertise; free software; morality; open hardware; transnationality
…hacking today? Why is this question worth asking from an anthropological perspective? Computer… …CHAPTER 4. Imagined Spaces and Convivial Places of Hacking… …expansion of information and communication infrastructures, computer expertise has become a… …practices, and moral orientations. This common rubric is that of “hacking” whose agent has been… …information and communication infrastructures brought invisible computer collectives to the…
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Rosado Murillo, L. F. (2015). Transnationality, Morality, and Politics of Computing Expertise. (Thesis). UCLA. Retrieved from http://www.escholarship.org/uc/item/2rd8656g
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Rosado Murillo, Luis Felipe. “Transnationality, Morality, and Politics of Computing Expertise.” 2015. Thesis, UCLA. Accessed January 15, 2021. http://www.escholarship.org/uc/item/2rd8656g.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Rosado Murillo, Luis Felipe. “Transnationality, Morality, and Politics of Computing Expertise.” 2015. Web. 15 Jan 2021.
Vancouver:
Rosado Murillo LF. Transnationality, Morality, and Politics of Computing Expertise. [Internet] [Thesis]. UCLA; 2015. [cited 2021 Jan 15]. Available from: http://www.escholarship.org/uc/item/2rd8656g.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Rosado Murillo LF. Transnationality, Morality, and Politics of Computing Expertise. [Thesis]. UCLA; 2015. Available from: http://www.escholarship.org/uc/item/2rd8656g
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
25. Bilan, Carolina. Säkerhetshot och lösningar för privatpersoner med bredband.
Degree: 2001, , Department of Software Engineering and Computer Science
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491
Subjects/Keywords: Bredband; Brandvägg; Säkerhet; Virus; Antivirus; Personlig Brandvägg; Hackning; Hackare; Broadband; Firewall; Security; Hacking; Hackers; Computer Sciences; Datavetenskap (datalogi)
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Bilan, C. (2001). Säkerhetshot och lösningar för privatpersoner med bredband. (Thesis). , Department of Software Engineering and Computer Science. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Bilan, Carolina. “Säkerhetshot och lösningar för privatpersoner med bredband.” 2001. Thesis, , Department of Software Engineering and Computer Science. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Bilan, Carolina. “Säkerhetshot och lösningar för privatpersoner med bredband.” 2001. Web. 15 Jan 2021.
Vancouver:
Bilan C. Säkerhetshot och lösningar för privatpersoner med bredband. [Internet] [Thesis]. , Department of Software Engineering and Computer Science; 2001. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Bilan C. Säkerhetshot och lösningar för privatpersoner med bredband. [Thesis]. , Department of Software Engineering and Computer Science; 2001. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1491
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
26. Christensen, Ludvig. Ethical hacking of IoT devices: OBD-II dongles.
Degree: Electrical Engineering and Computer Science (EECS), 2019, KTH
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254571
Subjects/Keywords: Hacking; OBD-II; Threat model; IoT security; AutoPi; Computer and Information Sciences; Data- och informationsvetenskap
…hacking AutoPi’s WiFi was not found to be vulnerable to any particular known attacks against… …School of Electrical Engineering and Computer Science (EECS), 2018. [3] M… …Alamitos, CA, USA), pp. 278–283, IEEE Computer Society, sep 2016. [6] R. Khan, K…
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Christensen, L. (2019). Ethical hacking of IoT devices: OBD-II dongles. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254571
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Christensen, Ludvig. “Ethical hacking of IoT devices: OBD-II dongles.” 2019. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254571.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Christensen, Ludvig. “Ethical hacking of IoT devices: OBD-II dongles.” 2019. Web. 15 Jan 2021.
Vancouver:
Christensen L. Ethical hacking of IoT devices: OBD-II dongles. [Internet] [Thesis]. KTH; 2019. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254571.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Christensen L. Ethical hacking of IoT devices: OBD-II dongles. [Thesis]. KTH; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254571
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
27. Ottosson, Henrik. Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities.
Degree: Database and information techniques, 2018, Linköping University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148581
Subjects/Keywords: Web Applications; Vulnerabilitiy Scanning; Automation; Ethical Hacking; Penetration Testing; Information Security; Computer Sciences; Datavetenskap (datalogi)
…malicious hacking, the title of ethical hacker1 , and the title of penetration tester… …National Institute of Standards and Technology, has presented a Guide to Computer Security Log…
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Ottosson, H. (2018). Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148581
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Ottosson, Henrik. “Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities.” 2018. Thesis, Linköping University. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148581.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Ottosson, Henrik. “Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities.” 2018. Web. 15 Jan 2021.
Vancouver:
Ottosson H. Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities. [Internet] [Thesis]. Linköping University; 2018. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148581.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Ottosson H. Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities. [Thesis]. Linköping University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148581
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
28. Koelemeijer, Dorien. Auster: A service designed on the context of a surveillance society in an increasingly connected world.
Degree: 2015, , Faculty of Culture and Society (KS)
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21852
Subjects/Keywords: interaction design; human computer interaction; internet of things; the internet of things; IoT; surveillance; sousveillance; hacking; do it yourself; diy; data; big data; data obfuscation; arduino; decentralisation; internet; privacy; security; data mining; data analysis; Engineering and Technology; Teknik och teknologier
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Koelemeijer, D. (2015). Auster: A service designed on the context of a surveillance society in an increasingly connected world. (Thesis). , Faculty of Culture and Society (KS). Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21852
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Koelemeijer, Dorien. “Auster: A service designed on the context of a surveillance society in an increasingly connected world.” 2015. Thesis, , Faculty of Culture and Society (KS). Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21852.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Koelemeijer, Dorien. “Auster: A service designed on the context of a surveillance society in an increasingly connected world.” 2015. Web. 15 Jan 2021.
Vancouver:
Koelemeijer D. Auster: A service designed on the context of a surveillance society in an increasingly connected world. [Internet] [Thesis]. , Faculty of Culture and Society (KS); 2015. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21852.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Koelemeijer D. Auster: A service designed on the context of a surveillance society in an increasingly connected world. [Thesis]. , Faculty of Culture and Society (KS); 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21852
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of South Africa
29. Maat, Sandra Mariana. Cyber crime: a comparative law analysis .
Degree: 2009, University of South Africa
URL: http://hdl.handle.net/10500/2056
Subjects/Keywords: Digital signatures; Cryptography; Cyber inspectors; Unauthorised interception; Computer-related fraud; Theft of information; Denial of service attacks; Cyber crime; Hacking; Rogue code
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Maat, S. M. (2009). Cyber crime: a comparative law analysis . (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/2056
Chicago Manual of Style (16th Edition):
Maat, Sandra Mariana. “Cyber crime: a comparative law analysis .” 2009. Masters Thesis, University of South Africa. Accessed January 15, 2021. http://hdl.handle.net/10500/2056.
MLA Handbook (7th Edition):
Maat, Sandra Mariana. “Cyber crime: a comparative law analysis .” 2009. Web. 15 Jan 2021.
Vancouver:
Maat SM. Cyber crime: a comparative law analysis . [Internet] [Masters thesis]. University of South Africa; 2009. [cited 2021 Jan 15]. Available from: http://hdl.handle.net/10500/2056.
Council of Science Editors:
Maat SM. Cyber crime: a comparative law analysis . [Masters Thesis]. University of South Africa; 2009. Available from: http://hdl.handle.net/10500/2056
30. Robberts, Christopher. Finding Vulnerabilities in IoT Devices : Ethical Hacking of Electronic Locks.
Degree: Electrical Engineering and Computer Science (EECS), 2019, KTH
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254667
Subjects/Keywords: ethical hacking; penetration testing; electronic locks; internet of things; iot; threat modeling; security; etisk hacking; penetrationstestning; elektroniska lås; sakernas internet; iot; hotmodellering; säkerhet; Computer and Information Sciences; Data- och informationsvetenskap
…to exploit the product does not lead to a vulnerability. A central part of hacking "… …5.4 Problems and constraints At the beginning of the hacking phase of the project much…
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Robberts, C. (2019). Finding Vulnerabilities in IoT Devices : Ethical Hacking of Electronic Locks. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254667
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Robberts, Christopher. “Finding Vulnerabilities in IoT Devices : Ethical Hacking of Electronic Locks.” 2019. Thesis, KTH. Accessed January 15, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254667.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Robberts, Christopher. “Finding Vulnerabilities in IoT Devices : Ethical Hacking of Electronic Locks.” 2019. Web. 15 Jan 2021.
Vancouver:
Robberts C. Finding Vulnerabilities in IoT Devices : Ethical Hacking of Electronic Locks. [Internet] [Thesis]. KTH; 2019. [cited 2021 Jan 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254667.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Robberts C. Finding Vulnerabilities in IoT Devices : Ethical Hacking of Electronic Locks. [Thesis]. KTH; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254667
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation