Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(computer security). Showing records 1 – 30 of 2478 total matches.

[1] [2] [3] [4] [5] … [83]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of Hong Kong

1. 陳秉暉.; Chan, Ping-fai. Data flow and heap analysis with application to privilege escalation vulnerability scanning and software theft detection.

Degree: PhD, 2013, University of Hong Kong

 Static and dynamic program analysis techniques are important research areas in software security. Static analysis helps us locate vulnerabilities in a software by looking at… (more)

Subjects/Keywords: Computer security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

陳秉暉.; Chan, P. (2013). Data flow and heap analysis with application to privilege escalation vulnerability scanning and software theft detection. (Doctoral Dissertation). University of Hong Kong. Retrieved from Chan, P. [陳秉暉]. (2013). Data flow and heap analysis with application to privilege escalation vulnerability scanning and software theft detection. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5089956 ; http://dx.doi.org/10.5353/th_b5089956 ; http://hdl.handle.net/10722/192811

Chicago Manual of Style (16th Edition):

陳秉暉.; Chan, Ping-fai. “Data flow and heap analysis with application to privilege escalation vulnerability scanning and software theft detection.” 2013. Doctoral Dissertation, University of Hong Kong. Accessed November 15, 2019. Chan, P. [陳秉暉]. (2013). Data flow and heap analysis with application to privilege escalation vulnerability scanning and software theft detection. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5089956 ; http://dx.doi.org/10.5353/th_b5089956 ; http://hdl.handle.net/10722/192811.

MLA Handbook (7th Edition):

陳秉暉.; Chan, Ping-fai. “Data flow and heap analysis with application to privilege escalation vulnerability scanning and software theft detection.” 2013. Web. 15 Nov 2019.

Vancouver:

陳秉暉.; Chan P. Data flow and heap analysis with application to privilege escalation vulnerability scanning and software theft detection. [Internet] [Doctoral dissertation]. University of Hong Kong; 2013. [cited 2019 Nov 15]. Available from: Chan, P. [陳秉暉]. (2013). Data flow and heap analysis with application to privilege escalation vulnerability scanning and software theft detection. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5089956 ; http://dx.doi.org/10.5353/th_b5089956 ; http://hdl.handle.net/10722/192811.

Council of Science Editors:

陳秉暉.; Chan P. Data flow and heap analysis with application to privilege escalation vulnerability scanning and software theft detection. [Doctoral Dissertation]. University of Hong Kong; 2013. Available from: Chan, P. [陳秉暉]. (2013). Data flow and heap analysis with application to privilege escalation vulnerability scanning and software theft detection. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b5089956 ; http://dx.doi.org/10.5353/th_b5089956 ; http://hdl.handle.net/10722/192811

2. Gasior, Wade Chester. Network covert channels on the Android platform.

Degree: 2011, University of Tennessee – Chattanooga

 Network covert channels are used to exfiltrate information from a secured environment in a way that is extremely difficult to detect or prevent. These secret… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gasior, W. C. (2011). Network covert channels on the Android platform. (Masters Thesis). University of Tennessee – Chattanooga. Retrieved from https://scholar.utc.edu/theses/270

Chicago Manual of Style (16th Edition):

Gasior, Wade Chester. “Network covert channels on the Android platform.” 2011. Masters Thesis, University of Tennessee – Chattanooga. Accessed November 15, 2019. https://scholar.utc.edu/theses/270.

MLA Handbook (7th Edition):

Gasior, Wade Chester. “Network covert channels on the Android platform.” 2011. Web. 15 Nov 2019.

Vancouver:

Gasior WC. Network covert channels on the Android platform. [Internet] [Masters thesis]. University of Tennessee – Chattanooga; 2011. [cited 2019 Nov 15]. Available from: https://scholar.utc.edu/theses/270.

Council of Science Editors:

Gasior WC. Network covert channels on the Android platform. [Masters Thesis]. University of Tennessee – Chattanooga; 2011. Available from: https://scholar.utc.edu/theses/270


Oregon State University

3. Nandakumar Thampi, Archana. Efficient, secure and covert channel capacity bounded protocols for multilevel security cross-domain environments - an experimental system.

Degree: MS, Computer Science, 2014, Oregon State University

 The communication in MLS cross-domain environments faces many challenges. The three most important challenges are efficient key management, privacy preserving and covert channel. We propose… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nandakumar Thampi, A. (2014). Efficient, secure and covert channel capacity bounded protocols for multilevel security cross-domain environments - an experimental system. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/51895

Chicago Manual of Style (16th Edition):

Nandakumar Thampi, Archana. “Efficient, secure and covert channel capacity bounded protocols for multilevel security cross-domain environments - an experimental system.” 2014. Masters Thesis, Oregon State University. Accessed November 15, 2019. http://hdl.handle.net/1957/51895.

MLA Handbook (7th Edition):

Nandakumar Thampi, Archana. “Efficient, secure and covert channel capacity bounded protocols for multilevel security cross-domain environments - an experimental system.” 2014. Web. 15 Nov 2019.

Vancouver:

Nandakumar Thampi A. Efficient, secure and covert channel capacity bounded protocols for multilevel security cross-domain environments - an experimental system. [Internet] [Masters thesis]. Oregon State University; 2014. [cited 2019 Nov 15]. Available from: http://hdl.handle.net/1957/51895.

Council of Science Editors:

Nandakumar Thampi A. Efficient, secure and covert channel capacity bounded protocols for multilevel security cross-domain environments - an experimental system. [Masters Thesis]. Oregon State University; 2014. Available from: http://hdl.handle.net/1957/51895


Dublin City University

4. Dunne, Cameron R. An architecture and protocol, an access control model, and a sighting blurring algorithm for improving users' security in the context of location based services operating over the internet.

Degree: School of Computing, 2009, Dublin City University

 A new type of service, known as a Location Based Service (LBS), is emerging that incorporates users' location information, and many of these LBSs operate… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dunne, C. R. (2009). An architecture and protocol, an access control model, and a sighting blurring algorithm for improving users' security in the context of location based services operating over the internet. (Thesis). Dublin City University. Retrieved from http://doras.dcu.ie/2236/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dunne, Cameron R. “An architecture and protocol, an access control model, and a sighting blurring algorithm for improving users' security in the context of location based services operating over the internet.” 2009. Thesis, Dublin City University. Accessed November 15, 2019. http://doras.dcu.ie/2236/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dunne, Cameron R. “An architecture and protocol, an access control model, and a sighting blurring algorithm for improving users' security in the context of location based services operating over the internet.” 2009. Web. 15 Nov 2019.

Vancouver:

Dunne CR. An architecture and protocol, an access control model, and a sighting blurring algorithm for improving users' security in the context of location based services operating over the internet. [Internet] [Thesis]. Dublin City University; 2009. [cited 2019 Nov 15]. Available from: http://doras.dcu.ie/2236/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dunne CR. An architecture and protocol, an access control model, and a sighting blurring algorithm for improving users' security in the context of location based services operating over the internet. [Thesis]. Dublin City University; 2009. Available from: http://doras.dcu.ie/2236/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Dublin City University

5. Graham, Michelle. A System for the Verication of Location Claims.

Degree: School of Computing, 2010, Dublin City University

 As location becomes an increasingly important piece of context information regarding a device, so too must the method of providing this information increase in reliability.… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Graham, M. (2010). A System for the Verication of Location Claims. (Thesis). Dublin City University. Retrieved from http://doras.dcu.ie/15754/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Graham, Michelle. “A System for the Verication of Location Claims.” 2010. Thesis, Dublin City University. Accessed November 15, 2019. http://doras.dcu.ie/15754/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Graham, Michelle. “A System for the Verication of Location Claims.” 2010. Web. 15 Nov 2019.

Vancouver:

Graham M. A System for the Verication of Location Claims. [Internet] [Thesis]. Dublin City University; 2010. [cited 2019 Nov 15]. Available from: http://doras.dcu.ie/15754/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Graham M. A System for the Verication of Location Claims. [Thesis]. Dublin City University; 2010. Available from: http://doras.dcu.ie/15754/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Dublin City University

6. Fitzpatrick, Darren. Intrusion Detection and Security Assessment in a University Network.

Degree: School of Computing, 2010, Dublin City University

 This thesis first explores how intrusion detection (ID) techniques can be used to provide an extra security layer for today‟s typically security-unaware Internet user. A… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fitzpatrick, D. (2010). Intrusion Detection and Security Assessment in a University Network. (Thesis). Dublin City University. Retrieved from http://doras.dcu.ie/15222/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fitzpatrick, Darren. “Intrusion Detection and Security Assessment in a University Network.” 2010. Thesis, Dublin City University. Accessed November 15, 2019. http://doras.dcu.ie/15222/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fitzpatrick, Darren. “Intrusion Detection and Security Assessment in a University Network.” 2010. Web. 15 Nov 2019.

Vancouver:

Fitzpatrick D. Intrusion Detection and Security Assessment in a University Network. [Internet] [Thesis]. Dublin City University; 2010. [cited 2019 Nov 15]. Available from: http://doras.dcu.ie/15222/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fitzpatrick D. Intrusion Detection and Security Assessment in a University Network. [Thesis]. Dublin City University; 2010. Available from: http://doras.dcu.ie/15222/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Dublin City University

7. Dominguez Perez, Luis Julian. Developing an Automatic Generation Tool for Cryptographic Pairing Functions.

Degree: School of Computing, 2011, Dublin City University

 Pairing-Based Cryptography is receiving steadily more attention from industry, mainly because of the increasing interest in Identity-Based protocols. Although there are plenty of applications, efficiently… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dominguez Perez, L. J. (2011). Developing an Automatic Generation Tool for Cryptographic Pairing Functions. (Thesis). Dublin City University. Retrieved from http://doras.dcu.ie/16002/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dominguez Perez, Luis Julian. “Developing an Automatic Generation Tool for Cryptographic Pairing Functions.” 2011. Thesis, Dublin City University. Accessed November 15, 2019. http://doras.dcu.ie/16002/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dominguez Perez, Luis Julian. “Developing an Automatic Generation Tool for Cryptographic Pairing Functions.” 2011. Web. 15 Nov 2019.

Vancouver:

Dominguez Perez LJ. Developing an Automatic Generation Tool for Cryptographic Pairing Functions. [Internet] [Thesis]. Dublin City University; 2011. [cited 2019 Nov 15]. Available from: http://doras.dcu.ie/16002/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dominguez Perez LJ. Developing an Automatic Generation Tool for Cryptographic Pairing Functions. [Thesis]. Dublin City University; 2011. Available from: http://doras.dcu.ie/16002/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Dublin City University

8. Charlemagne, Manuel. Pairings in Cryptology: efficiency, security and applications.

Degree: School of Computing, 2010, Dublin City University

 Abstract The study of pairings can be considered in so many dierent ways that it may not be useless to state in a few words… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Charlemagne, M. (2010). Pairings in Cryptology: efficiency, security and applications. (Thesis). Dublin City University. Retrieved from http://doras.dcu.ie/16000/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Charlemagne, Manuel. “Pairings in Cryptology: efficiency, security and applications.” 2010. Thesis, Dublin City University. Accessed November 15, 2019. http://doras.dcu.ie/16000/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Charlemagne, Manuel. “Pairings in Cryptology: efficiency, security and applications.” 2010. Web. 15 Nov 2019.

Vancouver:

Charlemagne M. Pairings in Cryptology: efficiency, security and applications. [Internet] [Thesis]. Dublin City University; 2010. [cited 2019 Nov 15]. Available from: http://doras.dcu.ie/16000/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Charlemagne M. Pairings in Cryptology: efficiency, security and applications. [Thesis]. Dublin City University; 2010. Available from: http://doras.dcu.ie/16000/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

9. Smith, Robert Walter. Evolutionary Strategies for Secure Moving Target Configuration Discovery.

Degree: 2014, Wake Forest University

 Defense against many cyber security threats can be implemented with existing software on the machine, without requiring patches for current programs or the installation of… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smith, R. W. (2014). Evolutionary Strategies for Secure Moving Target Configuration Discovery. (Thesis). Wake Forest University. Retrieved from http://hdl.handle.net/10339/39267

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Smith, Robert Walter. “Evolutionary Strategies for Secure Moving Target Configuration Discovery.” 2014. Thesis, Wake Forest University. Accessed November 15, 2019. http://hdl.handle.net/10339/39267.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Smith, Robert Walter. “Evolutionary Strategies for Secure Moving Target Configuration Discovery.” 2014. Web. 15 Nov 2019.

Vancouver:

Smith RW. Evolutionary Strategies for Secure Moving Target Configuration Discovery. [Internet] [Thesis]. Wake Forest University; 2014. [cited 2019 Nov 15]. Available from: http://hdl.handle.net/10339/39267.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Smith RW. Evolutionary Strategies for Secure Moving Target Configuration Discovery. [Thesis]. Wake Forest University; 2014. Available from: http://hdl.handle.net/10339/39267

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Ghosh, Esha. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data.

Degree: Department of Computer Science, 2018, Brown University

 An integral component of the modern computing era is the ability to outsource data and computation to remote Cloud Service Providers or CSPs. The advent… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ghosh, E. (2018). Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. (Thesis). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:792909/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ghosh, Esha. “Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data.” 2018. Thesis, Brown University. Accessed November 15, 2019. https://repository.library.brown.edu/studio/item/bdr:792909/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ghosh, Esha. “Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data.” 2018. Web. 15 Nov 2019.

Vancouver:

Ghosh E. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. [Internet] [Thesis]. Brown University; 2018. [cited 2019 Nov 15]. Available from: https://repository.library.brown.edu/studio/item/bdr:792909/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ghosh E. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. [Thesis]. Brown University; 2018. Available from: https://repository.library.brown.edu/studio/item/bdr:792909/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

11. Hirwani, Manish. Forensic analysis of VMware hard disks.

Degree: 2011, Rochester Institute of Technology

 With the advancement in virtualization technology, virtual machines (VMs) are becoming a common and an integral part of datacenters. As the popularity and use of… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hirwani, M. (2011). Forensic analysis of VMware hard disks. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hirwani, Manish. “Forensic analysis of VMware hard disks.” 2011. Thesis, Rochester Institute of Technology. Accessed November 15, 2019. https://scholarworks.rit.edu/theses/624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hirwani, Manish. “Forensic analysis of VMware hard disks.” 2011. Web. 15 Nov 2019.

Vancouver:

Hirwani M. Forensic analysis of VMware hard disks. [Internet] [Thesis]. Rochester Institute of Technology; 2011. [cited 2019 Nov 15]. Available from: https://scholarworks.rit.edu/theses/624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hirwani M. Forensic analysis of VMware hard disks. [Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

12. Li, He. Three essays on cybersecurity-related issues.

Degree: PhD, Management, 2017, Rutgers University

This dissertation consists of three essays that examine cybersecurity-related matters. In the first essay, I investigate whether external auditors respond to cyber incidents by charging… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, H. (2017). Three essays on cybersecurity-related issues. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/55281/

Chicago Manual of Style (16th Edition):

Li, He. “Three essays on cybersecurity-related issues.” 2017. Doctoral Dissertation, Rutgers University. Accessed November 15, 2019. https://rucore.libraries.rutgers.edu/rutgers-lib/55281/.

MLA Handbook (7th Edition):

Li, He. “Three essays on cybersecurity-related issues.” 2017. Web. 15 Nov 2019.

Vancouver:

Li H. Three essays on cybersecurity-related issues. [Internet] [Doctoral dissertation]. Rutgers University; 2017. [cited 2019 Nov 15]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/55281/.

Council of Science Editors:

Li H. Three essays on cybersecurity-related issues. [Doctoral Dissertation]. Rutgers University; 2017. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/55281/


Rutgers University

13. Alapati, Kalyan Koushik, 1993-. Group-oriented secret sharing using Shamir's algorithm.

Degree: MS, Computer Science, 2018, Rutgers University

 In the current state of highly distributed and hybrid-cloud systems environment, managing and securing enterprise or government systems/data requires effective access control techniques and protocols.… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alapati, Kalyan Koushik, 1. (2018). Group-oriented secret sharing using Shamir's algorithm. (Masters Thesis). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/55941/

Chicago Manual of Style (16th Edition):

Alapati, Kalyan Koushik, 1993-. “Group-oriented secret sharing using Shamir's algorithm.” 2018. Masters Thesis, Rutgers University. Accessed November 15, 2019. https://rucore.libraries.rutgers.edu/rutgers-lib/55941/.

MLA Handbook (7th Edition):

Alapati, Kalyan Koushik, 1993-. “Group-oriented secret sharing using Shamir's algorithm.” 2018. Web. 15 Nov 2019.

Vancouver:

Alapati, Kalyan Koushik 1. Group-oriented secret sharing using Shamir's algorithm. [Internet] [Masters thesis]. Rutgers University; 2018. [cited 2019 Nov 15]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/55941/.

Council of Science Editors:

Alapati, Kalyan Koushik 1. Group-oriented secret sharing using Shamir's algorithm. [Masters Thesis]. Rutgers University; 2018. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/55941/


University of Hong Kong

14. 何思樂.; Ho, Sze-lok. Technical solutions for conducting investigations in digital age.

Degree: M. Phil., 2012, University of Hong Kong

Confidentiality has always been a concern in secret operation. In this thesis, we consider the situation of legitimate data request and transfer between investigator and… (more)

Subjects/Keywords: Computer security.; Database security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

何思樂.; Ho, S. (2012). Technical solutions for conducting investigations in digital age. (Masters Thesis). University of Hong Kong. Retrieved from Ho, S. [何思樂]. (2012). Technical solutions for conducting investigations in digital age. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4852180 ; http://dx.doi.org/10.5353/th_b4852180 ; http://hdl.handle.net/10722/179989

Chicago Manual of Style (16th Edition):

何思樂.; Ho, Sze-lok. “Technical solutions for conducting investigations in digital age.” 2012. Masters Thesis, University of Hong Kong. Accessed November 15, 2019. Ho, S. [何思樂]. (2012). Technical solutions for conducting investigations in digital age. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4852180 ; http://dx.doi.org/10.5353/th_b4852180 ; http://hdl.handle.net/10722/179989.

MLA Handbook (7th Edition):

何思樂.; Ho, Sze-lok. “Technical solutions for conducting investigations in digital age.” 2012. Web. 15 Nov 2019.

Vancouver:

何思樂.; Ho S. Technical solutions for conducting investigations in digital age. [Internet] [Masters thesis]. University of Hong Kong; 2012. [cited 2019 Nov 15]. Available from: Ho, S. [何思樂]. (2012). Technical solutions for conducting investigations in digital age. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4852180 ; http://dx.doi.org/10.5353/th_b4852180 ; http://hdl.handle.net/10722/179989.

Council of Science Editors:

何思樂.; Ho S. Technical solutions for conducting investigations in digital age. [Masters Thesis]. University of Hong Kong; 2012. Available from: Ho, S. [何思樂]. (2012). Technical solutions for conducting investigations in digital age. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4852180 ; http://dx.doi.org/10.5353/th_b4852180 ; http://hdl.handle.net/10722/179989


Penn State University

15. Ren, Chuangang. A Study of Selected Issues in Android Security.

Degree: PhD, Computer Science and Engineering, 2016, Penn State University

 Mobile devices such as smartphones have become an integral part of society today, shaping people’s daily life, changing the landscape of how business operate and… (more)

Subjects/Keywords: Android; Computer Security; Android Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ren, C. (2016). A Study of Selected Issues in Android Security. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/b5644r534

Chicago Manual of Style (16th Edition):

Ren, Chuangang. “A Study of Selected Issues in Android Security.” 2016. Doctoral Dissertation, Penn State University. Accessed November 15, 2019. https://etda.libraries.psu.edu/catalog/b5644r534.

MLA Handbook (7th Edition):

Ren, Chuangang. “A Study of Selected Issues in Android Security.” 2016. Web. 15 Nov 2019.

Vancouver:

Ren C. A Study of Selected Issues in Android Security. [Internet] [Doctoral dissertation]. Penn State University; 2016. [cited 2019 Nov 15]. Available from: https://etda.libraries.psu.edu/catalog/b5644r534.

Council of Science Editors:

Ren C. A Study of Selected Issues in Android Security. [Doctoral Dissertation]. Penn State University; 2016. Available from: https://etda.libraries.psu.edu/catalog/b5644r534


University of Johannesburg

16. Van der Merwe, Isak Pieter. Rolprofiele vir die bestuur van inligtingsekerheid.

Degree: 2014, University of Johannesburg

M.Com. (Informatics)

The aim of this study is to introduce a model that can be used to manage the security profiles by using a role… (more)

Subjects/Keywords: Database security; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van der Merwe, I. P. (2014). Rolprofiele vir die bestuur van inligtingsekerheid. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12066

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van der Merwe, Isak Pieter. “Rolprofiele vir die bestuur van inligtingsekerheid.” 2014. Thesis, University of Johannesburg. Accessed November 15, 2019. http://hdl.handle.net/10210/12066.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van der Merwe, Isak Pieter. “Rolprofiele vir die bestuur van inligtingsekerheid.” 2014. Web. 15 Nov 2019.

Vancouver:

Van der Merwe IP. Rolprofiele vir die bestuur van inligtingsekerheid. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Nov 15]. Available from: http://hdl.handle.net/10210/12066.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van der Merwe IP. Rolprofiele vir die bestuur van inligtingsekerheid. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12066

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

17. Tolnai, Annette. ISAP - an information security awareness portal.

Degree: 2010, University of Johannesburg

M.Sc.

The exponential growth of the Internet contributes to risks and threats which materialize without our knowledge. The more computer and Internet use becomes a… (more)

Subjects/Keywords: Computer security; Internet security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tolnai, A. (2010). ISAP - an information security awareness portal. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tolnai, Annette. “ISAP - an information security awareness portal.” 2010. Thesis, University of Johannesburg. Accessed November 15, 2019. http://hdl.handle.net/10210/3283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tolnai, Annette. “ISAP - an information security awareness portal.” 2010. Web. 15 Nov 2019.

Vancouver:

Tolnai A. ISAP - an information security awareness portal. [Internet] [Thesis]. University of Johannesburg; 2010. [cited 2019 Nov 15]. Available from: http://hdl.handle.net/10210/3283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tolnai A. ISAP - an information security awareness portal. [Thesis]. University of Johannesburg; 2010. Available from: http://hdl.handle.net/10210/3283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Colorado

18. Dixon, Bryan Charles. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.

Degree: PhD, Computer Science, 2013, University of Colorado

  In recent years there has been a growing number of viruses, rootkits, and malware designed to gain access to system resources and information stored… (more)

Subjects/Keywords: Mobile Security; Security; Computer Sciences; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dixon, B. C. (2013). Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. (Doctoral Dissertation). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/69

Chicago Manual of Style (16th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Doctoral Dissertation, University of Colorado. Accessed November 15, 2019. http://scholar.colorado.edu/csci_gradetds/69.

MLA Handbook (7th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Web. 15 Nov 2019.

Vancouver:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Internet] [Doctoral dissertation]. University of Colorado; 2013. [cited 2019 Nov 15]. Available from: http://scholar.colorado.edu/csci_gradetds/69.

Council of Science Editors:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Doctoral Dissertation]. University of Colorado; 2013. Available from: http://scholar.colorado.edu/csci_gradetds/69


Nelson Mandela Metropolitan University

19. Reid, Rayne. Guidelines for cybersecurity education campaigns.

Degree: 2017, Nelson Mandela Metropolitan University

 In our technology- and information-infused world, cyberspace is an integral part of modern-day society. As the number of active cyberspace users increases, so too does… (more)

Subjects/Keywords: Computer security; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reid, R. (2017). Guidelines for cybersecurity education campaigns. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/14091

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Reid, Rayne. “Guidelines for cybersecurity education campaigns.” 2017. Thesis, Nelson Mandela Metropolitan University. Accessed November 15, 2019. http://hdl.handle.net/10948/14091.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Reid, Rayne. “Guidelines for cybersecurity education campaigns.” 2017. Web. 15 Nov 2019.

Vancouver:

Reid R. Guidelines for cybersecurity education campaigns. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2017. [cited 2019 Nov 15]. Available from: http://hdl.handle.net/10948/14091.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Reid R. Guidelines for cybersecurity education campaigns. [Thesis]. Nelson Mandela Metropolitan University; 2017. Available from: http://hdl.handle.net/10948/14091

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Edith Cowan University

20. Coole, Michael P. Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems.

Degree: 2010, Edith Cowan University

 As a quantitative auditing tool for Physical Protection Systems (PPS) the Estimated Adversary Sequence Interruption (EASI) model has been available for many years. Nevertheless, once… (more)

Subjects/Keywords: Computer security; computer networks; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coole, M. P. (2010). Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems. (Thesis). Edith Cowan University. Retrieved from http://ro.ecu.edu.au/theses/372

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Coole, Michael P. “Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems.” 2010. Thesis, Edith Cowan University. Accessed November 15, 2019. http://ro.ecu.edu.au/theses/372.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Coole, Michael P. “Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems.” 2010. Web. 15 Nov 2019.

Vancouver:

Coole MP. Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems. [Internet] [Thesis]. Edith Cowan University; 2010. [cited 2019 Nov 15]. Available from: http://ro.ecu.edu.au/theses/372.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Coole MP. Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems. [Thesis]. Edith Cowan University; 2010. Available from: http://ro.ecu.edu.au/theses/372

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

21. Tolnai, Annette. A security model for a virtualized information environment.

Degree: 2012, University of Johannesburg

D.Phil.

Virtualization is a new infrastructure platform whose trend is sweeping through IT like a blaze. Improving the IT industry by higher utilization from hardware,… (more)

Subjects/Keywords: Virtual computer systems - Security measures; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tolnai, A. (2012). A security model for a virtualized information environment. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/5821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tolnai, Annette. “A security model for a virtualized information environment.” 2012. Thesis, University of Johannesburg. Accessed November 15, 2019. http://hdl.handle.net/10210/5821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tolnai, Annette. “A security model for a virtualized information environment.” 2012. Web. 15 Nov 2019.

Vancouver:

Tolnai A. A security model for a virtualized information environment. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2019 Nov 15]. Available from: http://hdl.handle.net/10210/5821.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tolnai A. A security model for a virtualized information environment. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/5821

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

22. Muchenje, Tonderai. An analysis of the impact of emerging technology on organisations’ internal controls.

Degree: 2013, University of Johannesburg

M.Comm. (Computer Auditing)

This study presents an evaluation of emerging information communication technology (ICT) solutions to the security internal control systems in South African organisations.… (more)

Subjects/Keywords: Computer auditing; Information security; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Muchenje, T. (2013). An analysis of the impact of emerging technology on organisations’ internal controls. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/8597

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Muchenje, Tonderai. “An analysis of the impact of emerging technology on organisations’ internal controls.” 2013. Thesis, University of Johannesburg. Accessed November 15, 2019. http://hdl.handle.net/10210/8597.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Muchenje, Tonderai. “An analysis of the impact of emerging technology on organisations’ internal controls.” 2013. Web. 15 Nov 2019.

Vancouver:

Muchenje T. An analysis of the impact of emerging technology on organisations’ internal controls. [Internet] [Thesis]. University of Johannesburg; 2013. [cited 2019 Nov 15]. Available from: http://hdl.handle.net/10210/8597.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Muchenje T. An analysis of the impact of emerging technology on organisations’ internal controls. [Thesis]. University of Johannesburg; 2013. Available from: http://hdl.handle.net/10210/8597

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Drexel University

23. Heverin, Thomas. Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment.

Degree: 2014, Drexel University

The purpose of this dissertation research was to examine the information behaviors and cognitive modes used by expert cyber defenders when completing cyber situation assessment… (more)

Subjects/Keywords: Computer science; Internet – Security measures; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Heverin, T. (2014). Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment. (Thesis). Drexel University. Retrieved from http://hdl.handle.net/1860/idea:7034

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Heverin, Thomas. “Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment.” 2014. Thesis, Drexel University. Accessed November 15, 2019. http://hdl.handle.net/1860/idea:7034.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Heverin, Thomas. “Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment.” 2014. Web. 15 Nov 2019.

Vancouver:

Heverin T. Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment. [Internet] [Thesis]. Drexel University; 2014. [cited 2019 Nov 15]. Available from: http://hdl.handle.net/1860/idea:7034.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Heverin T. Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment. [Thesis]. Drexel University; 2014. Available from: http://hdl.handle.net/1860/idea:7034

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linköping University

24. Hellström, Jesper. A Lightweight Secure Development Process for Developers.

Degree: Software and Systems, 2019, Linköping University

  Following a secure development process when developing software can greatly increase the security of the software. Several secure development processes have been developed and… (more)

Subjects/Keywords: computer security; security; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hellström, J. (2019). A Lightweight Secure Development Process for Developers. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hellström, Jesper. “A Lightweight Secure Development Process for Developers.” 2019. Thesis, Linköping University. Accessed November 15, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hellström, Jesper. “A Lightweight Secure Development Process for Developers.” 2019. Web. 15 Nov 2019.

Vancouver:

Hellström J. A Lightweight Secure Development Process for Developers. [Internet] [Thesis]. Linköping University; 2019. [cited 2019 Nov 15]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hellström J. A Lightweight Secure Development Process for Developers. [Thesis]. Linköping University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Limerick

25. Schramm, Martin. Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor.

Degree: 2011, University of Limerick

peer-reviewed

Trusted Computing is a relatively new approach to computer security in which a system should be permanently maintained in a well-defined state - and… (more)

Subjects/Keywords: computer security; virtualization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Schramm, M. (2011). Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor. (Thesis). University of Limerick. Retrieved from http://hdl.handle.net/10344/1688

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Schramm, Martin. “Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor.” 2011. Thesis, University of Limerick. Accessed November 15, 2019. http://hdl.handle.net/10344/1688.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Schramm, Martin. “Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor.” 2011. Web. 15 Nov 2019.

Vancouver:

Schramm M. Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor. [Internet] [Thesis]. University of Limerick; 2011. [cited 2019 Nov 15]. Available from: http://hdl.handle.net/10344/1688.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Schramm M. Investigation and development of a hypervisor-based security architecture utilising a state-of-the-art hardware trust anchor. [Thesis]. University of Limerick; 2011. Available from: http://hdl.handle.net/10344/1688

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Aberdeen

26. Taylor, Barry. Identitying vulnerabilities and controls in complex composite security architectures.

Degree: PhD, 2014, University of Aberdeen

 The ability to design and reason about architectures (here understood as organisations which are designed according to hierarchies of roles and those processes that link… (more)

Subjects/Keywords: 004; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Taylor, B. (2014). Identitying vulnerabilities and controls in complex composite security architectures. (Doctoral Dissertation). University of Aberdeen. Retrieved from http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.646105

Chicago Manual of Style (16th Edition):

Taylor, Barry. “Identitying vulnerabilities and controls in complex composite security architectures.” 2014. Doctoral Dissertation, University of Aberdeen. Accessed November 15, 2019. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.646105.

MLA Handbook (7th Edition):

Taylor, Barry. “Identitying vulnerabilities and controls in complex composite security architectures.” 2014. Web. 15 Nov 2019.

Vancouver:

Taylor B. Identitying vulnerabilities and controls in complex composite security architectures. [Internet] [Doctoral dissertation]. University of Aberdeen; 2014. [cited 2019 Nov 15]. Available from: http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.646105.

Council of Science Editors:

Taylor B. Identitying vulnerabilities and controls in complex composite security architectures. [Doctoral Dissertation]. University of Aberdeen; 2014. Available from: http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.646105


University of Hong Kong

27. Zhang, Ping, Echo. Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware.

Degree: PhD, 2012, University of Hong Kong

Secure Multi-party Computation (SMC) is one significant research area in information security. In SMC, multiple parties jointly work on some function and no parties take… (more)

Subjects/Keywords: Computer security.; Cryptography.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, Ping, E. (2012). Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware. (Doctoral Dissertation). University of Hong Kong. Retrieved from Zhang, P. E. [张萍]. (2012). Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4961789 ; http://dx.doi.org/10.5353/th_b4961789 ; http://hdl.handle.net/10722/180969

Chicago Manual of Style (16th Edition):

Zhang, Ping, Echo. “Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware.” 2012. Doctoral Dissertation, University of Hong Kong. Accessed November 15, 2019. Zhang, P. E. [张萍]. (2012). Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4961789 ; http://dx.doi.org/10.5353/th_b4961789 ; http://hdl.handle.net/10722/180969.

MLA Handbook (7th Edition):

Zhang, Ping, Echo. “Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware.” 2012. Web. 15 Nov 2019.

Vancouver:

Zhang, Ping E. Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware. [Internet] [Doctoral dissertation]. University of Hong Kong; 2012. [cited 2019 Nov 15]. Available from: Zhang, P. E. [张萍]. (2012). Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4961789 ; http://dx.doi.org/10.5353/th_b4961789 ; http://hdl.handle.net/10722/180969.

Council of Science Editors:

Zhang, Ping E. Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware. [Doctoral Dissertation]. University of Hong Kong; 2012. Available from: Zhang, P. E. [张萍]. (2012). Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4961789 ; http://dx.doi.org/10.5353/th_b4961789 ; http://hdl.handle.net/10722/180969

28. Freed, Sarah E. Examination of personality characteristics among cybersecurity and information technology professionals.

Degree: 2014, University of Tennessee – Chattanooga

 An influx of cyber-attacks throughout the past decade has resulted in an increase in demand for cybersecurity professionals. However, the rapid growth of this field… (more)

Subjects/Keywords: Computer security  – Training.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Freed, S. E. (2014). Examination of personality characteristics among cybersecurity and information technology professionals. (Masters Thesis). University of Tennessee – Chattanooga. Retrieved from https://scholar.utc.edu/theses/127

Chicago Manual of Style (16th Edition):

Freed, Sarah E. “Examination of personality characteristics among cybersecurity and information technology professionals.” 2014. Masters Thesis, University of Tennessee – Chattanooga. Accessed November 15, 2019. https://scholar.utc.edu/theses/127.

MLA Handbook (7th Edition):

Freed, Sarah E. “Examination of personality characteristics among cybersecurity and information technology professionals.” 2014. Web. 15 Nov 2019.

Vancouver:

Freed SE. Examination of personality characteristics among cybersecurity and information technology professionals. [Internet] [Masters thesis]. University of Tennessee – Chattanooga; 2014. [cited 2019 Nov 15]. Available from: https://scholar.utc.edu/theses/127.

Council of Science Editors:

Freed SE. Examination of personality characteristics among cybersecurity and information technology professionals. [Masters Thesis]. University of Tennessee – Chattanooga; 2014. Available from: https://scholar.utc.edu/theses/127


Dublin City University

29. Benger, Naomi. Cryptographic Pairings: Efficiency and DLP security.

Degree: School of Computing, 2010, Dublin City University

 This thesis studies two important aspects of the use of pairings in cryptography, efficient algorithms and security. Pairings are very useful tools in cryptography, originally… (more)

Subjects/Keywords: Computer security; Cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Benger, N. (2010). Cryptographic Pairings: Efficiency and DLP security. (Thesis). Dublin City University. Retrieved from http://doras.dcu.ie/15546/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Benger, Naomi. “Cryptographic Pairings: Efficiency and DLP security.” 2010. Thesis, Dublin City University. Accessed November 15, 2019. http://doras.dcu.ie/15546/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Benger, Naomi. “Cryptographic Pairings: Efficiency and DLP security.” 2010. Web. 15 Nov 2019.

Vancouver:

Benger N. Cryptographic Pairings: Efficiency and DLP security. [Internet] [Thesis]. Dublin City University; 2010. [cited 2019 Nov 15]. Available from: http://doras.dcu.ie/15546/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Benger N. Cryptographic Pairings: Efficiency and DLP security. [Thesis]. Dublin City University; 2010. Available from: http://doras.dcu.ie/15546/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Dublin City University

30. Luan, Hai Ying. Intrusion detection and management over the world wide web.

Degree: School of Computing, 2010, Dublin City University

 As the Internet and society become ever more integrated so the number of Internet users continues to grow. Today there are 1.6 billion Internet users.… (more)

Subjects/Keywords: Computer networks; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luan, H. Y. (2010). Intrusion detection and management over the world wide web. (Thesis). Dublin City University. Retrieved from http://doras.dcu.ie/15091/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Luan, Hai Ying. “Intrusion detection and management over the world wide web.” 2010. Thesis, Dublin City University. Accessed November 15, 2019. http://doras.dcu.ie/15091/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Luan, Hai Ying. “Intrusion detection and management over the world wide web.” 2010. Web. 15 Nov 2019.

Vancouver:

Luan HY. Intrusion detection and management over the world wide web. [Internet] [Thesis]. Dublin City University; 2010. [cited 2019 Nov 15]. Available from: http://doras.dcu.ie/15091/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Luan HY. Intrusion detection and management over the world wide web. [Thesis]. Dublin City University; 2010. Available from: http://doras.dcu.ie/15091/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [83]

.