Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(cyber security). Showing records 1 – 30 of 336 total matches.

[1] [2] [3] [4] [5] … [12]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Cranfield University

1. Lewis, P S. The global vulnerability discovery and disclosure system: a thematic system dynamics approach.

Degree: PhD, 2017, Cranfield University

 Vulnerabilities within software are the fundamental issue that provide both the means, and opportunity for malicious threat actors to compromise critical IT systems (Younis et… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lewis, P. S. (2017). The global vulnerability discovery and disclosure system: a thematic system dynamics approach. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12665

Chicago Manual of Style (16th Edition):

Lewis, P S. “The global vulnerability discovery and disclosure system: a thematic system dynamics approach.” 2017. Doctoral Dissertation, Cranfield University. Accessed September 17, 2019. http://dspace.lib.cranfield.ac.uk/handle/1826/12665.

MLA Handbook (7th Edition):

Lewis, P S. “The global vulnerability discovery and disclosure system: a thematic system dynamics approach.” 2017. Web. 17 Sep 2019.

Vancouver:

Lewis PS. The global vulnerability discovery and disclosure system: a thematic system dynamics approach. [Internet] [Doctoral dissertation]. Cranfield University; 2017. [cited 2019 Sep 17]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665.

Council of Science Editors:

Lewis PS. The global vulnerability discovery and disclosure system: a thematic system dynamics approach. [Doctoral Dissertation]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665


California State University – Sacramento

2. Vyas, Mruga. Security issues in distributed energy resources (DER) in smart grid.

Degree: MS, Computer Science, 2011, California State University – Sacramento

 One of the main goals of smart grid is to create a decentralized and consumer controlled power system which can increase efficiency, reliability and reduce… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vyas, M. (2011). Security issues in distributed energy resources (DER) in smart grid. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/1229

Chicago Manual of Style (16th Edition):

Vyas, Mruga. “Security issues in distributed energy resources (DER) in smart grid.” 2011. Masters Thesis, California State University – Sacramento. Accessed September 17, 2019. http://hdl.handle.net/10211.9/1229.

MLA Handbook (7th Edition):

Vyas, Mruga. “Security issues in distributed energy resources (DER) in smart grid.” 2011. Web. 17 Sep 2019.

Vancouver:

Vyas M. Security issues in distributed energy resources (DER) in smart grid. [Internet] [Masters thesis]. California State University – Sacramento; 2011. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/10211.9/1229.

Council of Science Editors:

Vyas M. Security issues in distributed energy resources (DER) in smart grid. [Masters Thesis]. California State University – Sacramento; 2011. Available from: http://hdl.handle.net/10211.9/1229


Cranfield University

3. Humphrey, M. Identifying the critical success factors to improve information security incident reporting.

Degree: 2017, Cranfield University

 There is a perception amongst security professionals that the true scale of information security incidents is unknown due to under reporting. This potentially leads to… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humphrey, M. (2017). Identifying the critical success factors to improve information security incident reporting. (Thesis). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Humphrey, M. “Identifying the critical success factors to improve information security incident reporting.” 2017. Thesis, Cranfield University. Accessed September 17, 2019. http://dspace.lib.cranfield.ac.uk/handle/1826/12739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Humphrey, M. “Identifying the critical success factors to improve information security incident reporting.” 2017. Web. 17 Sep 2019.

Vancouver:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Internet] [Thesis]. Cranfield University; 2017. [cited 2019 Sep 17]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Thesis]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Cranfield University

4. Humphrey, Mike. Identifying the critical success factors to improve information security incident reporting.

Degree: PhD, 2017, Cranfield University

 There is a perception amongst security professionals that the true scale of information security incidents is unknown due to under reporting. This potentially leads to… (more)

Subjects/Keywords: Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humphrey, M. (2017). Identifying the critical success factors to improve information security incident reporting. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627

Chicago Manual of Style (16th Edition):

Humphrey, Mike. “Identifying the critical success factors to improve information security incident reporting.” 2017. Doctoral Dissertation, Cranfield University. Accessed September 17, 2019. http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627.

MLA Handbook (7th Edition):

Humphrey, Mike. “Identifying the critical success factors to improve information security incident reporting.” 2017. Web. 17 Sep 2019.

Vancouver:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Internet] [Doctoral dissertation]. Cranfield University; 2017. [cited 2019 Sep 17]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627.

Council of Science Editors:

Humphrey M. Identifying the critical success factors to improve information security incident reporting. [Doctoral Dissertation]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12739 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738627


Northeastern University

5. Cohen, Matthew S. Beyond theory: applying empirical evidence to cyberspace theories.

Degree: PhD, Department of Political Science, 2018, Northeastern University

 Political science has made progress in the study of how actors behave in cyber-space, but it is still an emerging field. Much of the academic… (more)

Subjects/Keywords: cyber-defense; cyber-offense; cyber-security; cyber-space; cyber-weapons

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cohen, M. S. (2018). Beyond theory: applying empirical evidence to cyberspace theories. (Doctoral Dissertation). Northeastern University. Retrieved from http://hdl.handle.net/2047/D20272930

Chicago Manual of Style (16th Edition):

Cohen, Matthew S. “Beyond theory: applying empirical evidence to cyberspace theories.” 2018. Doctoral Dissertation, Northeastern University. Accessed September 17, 2019. http://hdl.handle.net/2047/D20272930.

MLA Handbook (7th Edition):

Cohen, Matthew S. “Beyond theory: applying empirical evidence to cyberspace theories.” 2018. Web. 17 Sep 2019.

Vancouver:

Cohen MS. Beyond theory: applying empirical evidence to cyberspace theories. [Internet] [Doctoral dissertation]. Northeastern University; 2018. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/2047/D20272930.

Council of Science Editors:

Cohen MS. Beyond theory: applying empirical evidence to cyberspace theories. [Doctoral Dissertation]. Northeastern University; 2018. Available from: http://hdl.handle.net/2047/D20272930


Victoria University of Wellington

6. Gordon, Richard. Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack.

Degree: 2014, Victoria University of Wellington

Cyber-attacks present significant challenges to a modern, globalised world. Progressively used by criminal and terrorist organisations to attack or victimise non-state actors, governments are increasingly… (more)

Subjects/Keywords: Cyber; Privacy; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gordon, R. (2014). Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/3565

Chicago Manual of Style (16th Edition):

Gordon, Richard. “Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack.” 2014. Masters Thesis, Victoria University of Wellington. Accessed September 17, 2019. http://hdl.handle.net/10063/3565.

MLA Handbook (7th Edition):

Gordon, Richard. “Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack.” 2014. Web. 17 Sep 2019.

Vancouver:

Gordon R. Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack. [Internet] [Masters thesis]. Victoria University of Wellington; 2014. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/10063/3565.

Council of Science Editors:

Gordon R. Privacy, Security and the Cyber Dilemma: An Examination of New Zealand’s Response to the Rising Threat of Cyber-attack. [Masters Thesis]. Victoria University of Wellington; 2014. Available from: http://hdl.handle.net/10063/3565

7. Puttaroo, Mohammad Ally Rehaz. A behavioural study in runtime analysis environments and drive-by download attacks.

Degree: PhD, 2017, University of West London

 In the information age, the growth in availability of both technology and exploit kits have continuously contributed in a large volume of websites being compromised… (more)

Subjects/Keywords: Cyber security; Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Puttaroo, M. A. R. (2017). A behavioural study in runtime analysis environments and drive-by download attacks. (Doctoral Dissertation). University of West London. Retrieved from https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802

Chicago Manual of Style (16th Edition):

Puttaroo, Mohammad Ally Rehaz. “A behavioural study in runtime analysis environments and drive-by download attacks.” 2017. Doctoral Dissertation, University of West London. Accessed September 17, 2019. https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802.

MLA Handbook (7th Edition):

Puttaroo, Mohammad Ally Rehaz. “A behavioural study in runtime analysis environments and drive-by download attacks.” 2017. Web. 17 Sep 2019.

Vancouver:

Puttaroo MAR. A behavioural study in runtime analysis environments and drive-by download attacks. [Internet] [Doctoral dissertation]. University of West London; 2017. [cited 2019 Sep 17]. Available from: https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802.

Council of Science Editors:

Puttaroo MAR. A behavioural study in runtime analysis environments and drive-by download attacks. [Doctoral Dissertation]. University of West London; 2017. Available from: https://repository.uwl.ac.uk/id/eprint/4751/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.737802


Cranfield University

8. Lewis, Paul Simon. The global vulnerability discovery and disclosure system : a thematic system dynamics approach.

Degree: PhD, 2017, Cranfield University

 Vulnerabilities within software are the fundamental issue that provide both the means, and opportunity for malicious threat actors to compromise critical IT systems (Younis et… (more)

Subjects/Keywords: 005.8; Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lewis, P. S. (2017). The global vulnerability discovery and disclosure system : a thematic system dynamics approach. (Doctoral Dissertation). Cranfield University. Retrieved from http://dspace.lib.cranfield.ac.uk/handle/1826/12665 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.725729

Chicago Manual of Style (16th Edition):

Lewis, Paul Simon. “The global vulnerability discovery and disclosure system : a thematic system dynamics approach.” 2017. Doctoral Dissertation, Cranfield University. Accessed September 17, 2019. http://dspace.lib.cranfield.ac.uk/handle/1826/12665 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.725729.

MLA Handbook (7th Edition):

Lewis, Paul Simon. “The global vulnerability discovery and disclosure system : a thematic system dynamics approach.” 2017. Web. 17 Sep 2019.

Vancouver:

Lewis PS. The global vulnerability discovery and disclosure system : a thematic system dynamics approach. [Internet] [Doctoral dissertation]. Cranfield University; 2017. [cited 2019 Sep 17]. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.725729.

Council of Science Editors:

Lewis PS. The global vulnerability discovery and disclosure system : a thematic system dynamics approach. [Doctoral Dissertation]. Cranfield University; 2017. Available from: http://dspace.lib.cranfield.ac.uk/handle/1826/12665 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.725729


Leiden University

9. Ossip, Silja-Madli. Cyber threats and cybercrime – a disruption of human security?.

Degree: 2017, Leiden University

 Cyberspace is everywhere in the world nowadays – all our activities are connected to the internet, devices are connected to each other and at least… (more)

Subjects/Keywords: cybercrime; cyber threats; cyber hygiene; human security; cyber education; cyber crime

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ossip, S. (2017). Cyber threats and cybercrime – a disruption of human security?. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/52314

Chicago Manual of Style (16th Edition):

Ossip, Silja-Madli. “Cyber threats and cybercrime – a disruption of human security?.” 2017. Masters Thesis, Leiden University. Accessed September 17, 2019. http://hdl.handle.net/1887/52314.

MLA Handbook (7th Edition):

Ossip, Silja-Madli. “Cyber threats and cybercrime – a disruption of human security?.” 2017. Web. 17 Sep 2019.

Vancouver:

Ossip S. Cyber threats and cybercrime – a disruption of human security?. [Internet] [Masters thesis]. Leiden University; 2017. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/1887/52314.

Council of Science Editors:

Ossip S. Cyber threats and cybercrime – a disruption of human security?. [Masters Thesis]. Leiden University; 2017. Available from: http://hdl.handle.net/1887/52314

10. Tan, Song. On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform.

Degree: PhD, Computer Science, 2016, Georgia State University

  A Smart Grid is a digitally enabled electric power grid that integrates the computation and communication technologies from cyber world with the sensors and… (more)

Subjects/Keywords: Cyber Security; Testbed; Smart Grid

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tan, S. (2016). On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform. (Doctoral Dissertation). Georgia State University. Retrieved from https://scholarworks.gsu.edu/cs_diss/103

Chicago Manual of Style (16th Edition):

Tan, Song. “On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform.” 2016. Doctoral Dissertation, Georgia State University. Accessed September 17, 2019. https://scholarworks.gsu.edu/cs_diss/103.

MLA Handbook (7th Edition):

Tan, Song. “On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform.” 2016. Web. 17 Sep 2019.

Vancouver:

Tan S. On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform. [Internet] [Doctoral dissertation]. Georgia State University; 2016. [cited 2019 Sep 17]. Available from: https://scholarworks.gsu.edu/cs_diss/103.

Council of Science Editors:

Tan S. On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform. [Doctoral Dissertation]. Georgia State University; 2016. Available from: https://scholarworks.gsu.edu/cs_diss/103


Penn State University

11. McLaughlin, Stephen Elliot. Specification-based Attacks and Defenses in Sequential Control Systems.

Degree: PhD, Computer Science and Engineering, 2014, Penn State University

Cyber physical systems, such as control systems use general purpose computation to govern the behavior of physical systems in the manufacturing, transportation, and energy sectors.… (more)

Subjects/Keywords: Security; Cyber-Physical; Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McLaughlin, S. E. (2014). Specification-based Attacks and Defenses in Sequential Control Systems. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/21556

Chicago Manual of Style (16th Edition):

McLaughlin, Stephen Elliot. “Specification-based Attacks and Defenses in Sequential Control Systems.” 2014. Doctoral Dissertation, Penn State University. Accessed September 17, 2019. https://etda.libraries.psu.edu/catalog/21556.

MLA Handbook (7th Edition):

McLaughlin, Stephen Elliot. “Specification-based Attacks and Defenses in Sequential Control Systems.” 2014. Web. 17 Sep 2019.

Vancouver:

McLaughlin SE. Specification-based Attacks and Defenses in Sequential Control Systems. [Internet] [Doctoral dissertation]. Penn State University; 2014. [cited 2019 Sep 17]. Available from: https://etda.libraries.psu.edu/catalog/21556.

Council of Science Editors:

McLaughlin SE. Specification-based Attacks and Defenses in Sequential Control Systems. [Doctoral Dissertation]. Penn State University; 2014. Available from: https://etda.libraries.psu.edu/catalog/21556

12. Ridderman, Lindsey. The Effects of a Factory Reset on an iPhone 8 Plus.

Degree: 2018, Ferris State University

 With the rapid evolution of the Apple iPhone and the high rate of cybercrime it seems impossible to keep up on the everchanging security features… (more)

Subjects/Keywords: iPhone; Cyber security.; Factory reset.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ridderman, L. (2018). The Effects of a Factory Reset on an iPhone 8 Plus. (Thesis). Ferris State University. Retrieved from http://hdl.handle.net/2323/6377

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ridderman, Lindsey. “The Effects of a Factory Reset on an iPhone 8 Plus.” 2018. Thesis, Ferris State University. Accessed September 17, 2019. http://hdl.handle.net/2323/6377.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ridderman, Lindsey. “The Effects of a Factory Reset on an iPhone 8 Plus.” 2018. Web. 17 Sep 2019.

Vancouver:

Ridderman L. The Effects of a Factory Reset on an iPhone 8 Plus. [Internet] [Thesis]. Ferris State University; 2018. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/2323/6377.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ridderman L. The Effects of a Factory Reset on an iPhone 8 Plus. [Thesis]. Ferris State University; 2018. Available from: http://hdl.handle.net/2323/6377

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Mitchell, Scott. H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography.

Degree: Doctoral Thesis, Cyber Security, 2018, Abertay University

 A steganographic method was developed based on the temporal redundancies present in digital video streams, these redundancies are utilised by the H.264 encoding standard to… (more)

Subjects/Keywords: Cyber Security; Steganography; Digital Video

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mitchell, S. (2018). H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography. (Thesis). Abertay University. Retrieved from https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mitchell, Scott. “H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography.” 2018. Thesis, Abertay University. Accessed September 17, 2019. https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mitchell, Scott. “H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography.” 2018. Web. 17 Sep 2019.

Vancouver:

Mitchell S. H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography. [Internet] [Thesis]. Abertay University; 2018. [cited 2019 Sep 17]. Available from: https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mitchell S. H.264 Encoded Digital Video Protection using Temporal Redundancy LSB Steganography. [Thesis]. Abertay University; 2018. Available from: https://rke.abertay.ac.uk/en/studentTheses/acd0ada5-d0d4-4be8-ac1d-ef947b96753a

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

14. Krall, Alexander Leon. Comparing Cyber Defense Alternatives Using Rare-Event Simulation Techniques to Compute Network Risk.

Degree: MS, Industrial and Systems Engineering, 2018, Rochester Institute of Technology

  Vulnerabilities inherent in a cyber network can be exploited by individuals with malicious intent. Thus, machines on the network are at risk. Formally, security(more)

Subjects/Keywords: Cyber security; Importance sampling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krall, A. L. (2018). Comparing Cyber Defense Alternatives Using Rare-Event Simulation Techniques to Compute Network Risk. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9778

Chicago Manual of Style (16th Edition):

Krall, Alexander Leon. “Comparing Cyber Defense Alternatives Using Rare-Event Simulation Techniques to Compute Network Risk.” 2018. Masters Thesis, Rochester Institute of Technology. Accessed September 17, 2019. https://scholarworks.rit.edu/theses/9778.

MLA Handbook (7th Edition):

Krall, Alexander Leon. “Comparing Cyber Defense Alternatives Using Rare-Event Simulation Techniques to Compute Network Risk.” 2018. Web. 17 Sep 2019.

Vancouver:

Krall AL. Comparing Cyber Defense Alternatives Using Rare-Event Simulation Techniques to Compute Network Risk. [Internet] [Masters thesis]. Rochester Institute of Technology; 2018. [cited 2019 Sep 17]. Available from: https://scholarworks.rit.edu/theses/9778.

Council of Science Editors:

Krall AL. Comparing Cyber Defense Alternatives Using Rare-Event Simulation Techniques to Compute Network Risk. [Masters Thesis]. Rochester Institute of Technology; 2018. Available from: https://scholarworks.rit.edu/theses/9778


University of Sydney

15. Andal, Stephenie Lois. Cyber Sovereignty: A New Vision in China .

Degree: 2018, University of Sydney

 Research on China’s strategy of cyber sovereignty to date has been inadequate, conceiving of the blueprint as a domestic Party censorship and surveillance mechanism, effectively… (more)

Subjects/Keywords: China; cyber sovereignty; Internet governance; cyber security; Hong Kong; cyber governance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andal, S. L. (2018). Cyber Sovereignty: A New Vision in China . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/18137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Andal, Stephenie Lois. “Cyber Sovereignty: A New Vision in China .” 2018. Thesis, University of Sydney. Accessed September 17, 2019. http://hdl.handle.net/2123/18137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Andal, Stephenie Lois. “Cyber Sovereignty: A New Vision in China .” 2018. Web. 17 Sep 2019.

Vancouver:

Andal SL. Cyber Sovereignty: A New Vision in China . [Internet] [Thesis]. University of Sydney; 2018. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/2123/18137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Andal SL. Cyber Sovereignty: A New Vision in China . [Thesis]. University of Sydney; 2018. Available from: http://hdl.handle.net/2123/18137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

16. Verkerke, A.T. Towards a cyber approach for large organisations:.

Degree: 2015, Delft University of Technology

 Participation in cyberspace is of key importance for large organisations (and the functioning of our society), but to participate responsibly a comprehensive cyber approach is… (more)

Subjects/Keywords: cyber security; standards; cyber resilience; cyber governance; risk management; situational awareness

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Verkerke, A. T. (2015). Towards a cyber approach for large organisations:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e

Chicago Manual of Style (16th Edition):

Verkerke, A T. “Towards a cyber approach for large organisations:.” 2015. Masters Thesis, Delft University of Technology. Accessed September 17, 2019. http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e.

MLA Handbook (7th Edition):

Verkerke, A T. “Towards a cyber approach for large organisations:.” 2015. Web. 17 Sep 2019.

Vancouver:

Verkerke AT. Towards a cyber approach for large organisations:. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2019 Sep 17]. Available from: http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e.

Council of Science Editors:

Verkerke AT. Towards a cyber approach for large organisations:. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:31a67615-89c6-40d5-9f48-d73c0a7e832e

17. Van De Sandt, Erik. Deviant security : the technical computer security practices of cyber criminals.

Degree: PhD, 2019, University of Bristol

 The dominant academic and practitioners' perspective on security evolves around law-abiding referent objects of security who are under attack by law-breaking threat agents. This study… (more)

Subjects/Keywords: cyber crime; cyber security; cyber criminals; deviant security; investigations; police; law-enforcement

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van De Sandt, E. (2019). Deviant security : the technical computer security practices of cyber criminals. (Doctoral Dissertation). University of Bristol. Retrieved from http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb

Chicago Manual of Style (16th Edition):

Van De Sandt, Erik. “Deviant security : the technical computer security practices of cyber criminals.” 2019. Doctoral Dissertation, University of Bristol. Accessed September 17, 2019. http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb.

MLA Handbook (7th Edition):

Van De Sandt, Erik. “Deviant security : the technical computer security practices of cyber criminals.” 2019. Web. 17 Sep 2019.

Vancouver:

Van De Sandt E. Deviant security : the technical computer security practices of cyber criminals. [Internet] [Doctoral dissertation]. University of Bristol; 2019. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb.

Council of Science Editors:

Van De Sandt E. Deviant security : the technical computer security practices of cyber criminals. [Doctoral Dissertation]. University of Bristol; 2019. Available from: http://hdl.handle.net/1983/5159c595-b3a6-4908-8054-aadc3d948ebb


Luleå University of Technology

18. Fumudoh, Samar. Exploring the Relationship between Online Privacy on Cyber Security.

Degree: 2014, Luleå University of Technology

The aim of this research is to explore the relationship between online privacy and cybersecurity. With the birth of the internet and the recent… (more)

Subjects/Keywords: Technology; Privacy; Security; Cyber; Online privacy and cyber security; Teknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fumudoh, S. (2014). Exploring the Relationship between Online Privacy on Cyber Security. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fumudoh, Samar. “Exploring the Relationship between Online Privacy on Cyber Security.” 2014. Thesis, Luleå University of Technology. Accessed September 17, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fumudoh, Samar. “Exploring the Relationship between Online Privacy on Cyber Security.” 2014. Web. 17 Sep 2019.

Vancouver:

Fumudoh S. Exploring the Relationship between Online Privacy on Cyber Security. [Internet] [Thesis]. Luleå University of Technology; 2014. [cited 2019 Sep 17]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fumudoh S. Exploring the Relationship between Online Privacy on Cyber Security. [Thesis]. Luleå University of Technology; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-53114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Leiden University

19. Pakalniškis, S. What factors explain why there is not a common and comprehensive global response to cyber threats?.

Degree: 2012, Leiden University

Analysis of the main causes why there is not a comprehensive global response to cyber threats. Analysis focuses on state interactions in the UN and CoE. Advisors/Committee Members: Chalmers, Dr. A.W (advisor), Hosli, Prof.dr. M.O (advisor).

Subjects/Keywords: cyber security; cyber threats; united nations; council of europe; cybercrime

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pakalniškis, S. (2012). What factors explain why there is not a common and comprehensive global response to cyber threats?. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/19509

Chicago Manual of Style (16th Edition):

Pakalniškis, S. “What factors explain why there is not a common and comprehensive global response to cyber threats?.” 2012. Masters Thesis, Leiden University. Accessed September 17, 2019. http://hdl.handle.net/1887/19509.

MLA Handbook (7th Edition):

Pakalniškis, S. “What factors explain why there is not a common and comprehensive global response to cyber threats?.” 2012. Web. 17 Sep 2019.

Vancouver:

Pakalniškis S. What factors explain why there is not a common and comprehensive global response to cyber threats?. [Internet] [Masters thesis]. Leiden University; 2012. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/1887/19509.

Council of Science Editors:

Pakalniškis S. What factors explain why there is not a common and comprehensive global response to cyber threats?. [Masters Thesis]. Leiden University; 2012. Available from: http://hdl.handle.net/1887/19509


Delft University of Technology

20. Zhu, Y. Attack pattern ontology: A common language for attack information sharing between organizations :.

Degree: 2015, Delft University of Technology

Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacker’s perspective in order to accurately anticipate threats and effectively mitigate attacks.… (more)

Subjects/Keywords: cyber security; information sharing; cyber attack; attack pattern; ontology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, Y. (2015). Attack pattern ontology: A common language for attack information sharing between organizations :. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46

Chicago Manual of Style (16th Edition):

Zhu, Y. “Attack pattern ontology: A common language for attack information sharing between organizations :.” 2015. Masters Thesis, Delft University of Technology. Accessed September 17, 2019. http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46.

MLA Handbook (7th Edition):

Zhu, Y. “Attack pattern ontology: A common language for attack information sharing between organizations :.” 2015. Web. 17 Sep 2019.

Vancouver:

Zhu Y. Attack pattern ontology: A common language for attack information sharing between organizations :. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2019 Sep 17]. Available from: http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46.

Council of Science Editors:

Zhu Y. Attack pattern ontology: A common language for attack information sharing between organizations :. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:611583f1-b200-4851-915e-76a43c42fd46


University of Wisconsin – Milwaukee

21. Xiang, Yingmeng. Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems.

Degree: PhD, Engineering, 2017, University of Wisconsin – Milwaukee

  With the smart grid initiatives in recent years, the electric power grid is rapidly evolving into a complicated and interconnected cyber-physical system. Unfortunately, the… (more)

Subjects/Keywords: Cyber-physical System; Smart Grid Cyber Security; Electrical and Electronics; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xiang, Y. (2017). Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems. (Doctoral Dissertation). University of Wisconsin – Milwaukee. Retrieved from https://dc.uwm.edu/etd/1725

Chicago Manual of Style (16th Edition):

Xiang, Yingmeng. “Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems.” 2017. Doctoral Dissertation, University of Wisconsin – Milwaukee. Accessed September 17, 2019. https://dc.uwm.edu/etd/1725.

MLA Handbook (7th Edition):

Xiang, Yingmeng. “Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems.” 2017. Web. 17 Sep 2019.

Vancouver:

Xiang Y. Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems. [Internet] [Doctoral dissertation]. University of Wisconsin – Milwaukee; 2017. [cited 2019 Sep 17]. Available from: https://dc.uwm.edu/etd/1725.

Council of Science Editors:

Xiang Y. Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems. [Doctoral Dissertation]. University of Wisconsin – Milwaukee; 2017. Available from: https://dc.uwm.edu/etd/1725


Rochester Institute of Technology

22. Bean, Jordan. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.

Degree: MS, Computer Engineering, 2009, Rochester Institute of Technology

  On secure networks, even sophisticated cyber hackers must perform multiple steps to implement attacks on sensitive data and critical servers hidden behind layers of… (more)

Subjects/Keywords: Attack track; Cyber alert attribute analysis; Cyber security; Longest common subsequence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bean, J. (2009). CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9095

Chicago Manual of Style (16th Edition):

Bean, Jordan. “CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.” 2009. Masters Thesis, Rochester Institute of Technology. Accessed September 17, 2019. https://scholarworks.rit.edu/theses/9095.

MLA Handbook (7th Edition):

Bean, Jordan. “CHAracterization of Relevant Attributes using Cyber Trajectory Similarities.” 2009. Web. 17 Sep 2019.

Vancouver:

Bean J. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. [Internet] [Masters thesis]. Rochester Institute of Technology; 2009. [cited 2019 Sep 17]. Available from: https://scholarworks.rit.edu/theses/9095.

Council of Science Editors:

Bean J. CHAracterization of Relevant Attributes using Cyber Trajectory Similarities. [Masters Thesis]. Rochester Institute of Technology; 2009. Available from: https://scholarworks.rit.edu/theses/9095


University of South Florida

23. Johnson, Kim. Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors.

Degree: 2018, University of South Florida

 Information security is of vital importance to organizations. Breaches in security very often stem from behaviors of the system operator. Cyber misbehaviors on the part… (more)

Subjects/Keywords: cyber risk; cyber safety; cybersecurity; information security; Psychology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Johnson, K. (2018). Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors. (Thesis). University of South Florida. Retrieved from https://scholarcommons.usf.edu/etd/7630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Johnson, Kim. “Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors.” 2018. Thesis, University of South Florida. Accessed September 17, 2019. https://scholarcommons.usf.edu/etd/7630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Johnson, Kim. “Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors.” 2018. Web. 17 Sep 2019.

Vancouver:

Johnson K. Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors. [Internet] [Thesis]. University of South Florida; 2018. [cited 2019 Sep 17]. Available from: https://scholarcommons.usf.edu/etd/7630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Johnson K. Better Safe than Sorry: The Relationship Between Locus of Control, Perception of Risk, and Cyber Misbehaviors. [Thesis]. University of South Florida; 2018. Available from: https://scholarcommons.usf.edu/etd/7630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Louisiana State University

24. Davis, Sarah. Cyber-Physical Security Strategies.

Degree: MSEE, Electrical and Computer Engineering, 2014, Louisiana State University

Cyber-physical security describes the protection of systems with close relationships between computational functions and physical ones and addresses the issue of vulnerability to attack through… (more)

Subjects/Keywords: cyber-physical security; control sytem security; sensor network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Davis, S. (2014). Cyber-Physical Security Strategies. (Masters Thesis). Louisiana State University. Retrieved from etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147

Chicago Manual of Style (16th Edition):

Davis, Sarah. “Cyber-Physical Security Strategies.” 2014. Masters Thesis, Louisiana State University. Accessed September 17, 2019. etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147.

MLA Handbook (7th Edition):

Davis, Sarah. “Cyber-Physical Security Strategies.” 2014. Web. 17 Sep 2019.

Vancouver:

Davis S. Cyber-Physical Security Strategies. [Internet] [Masters thesis]. Louisiana State University; 2014. [cited 2019 Sep 17]. Available from: etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147.

Council of Science Editors:

Davis S. Cyber-Physical Security Strategies. [Masters Thesis]. Louisiana State University; 2014. Available from: etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147


De Montfort University

25. Nicholson, Andrew. Wide spectrum attribution : using deception for attribution intelligence in cyber attacks.

Degree: PhD, 2015, De Montfort University

 Modern cyber attacks have evolved considerably. The skill level required to conduct a cyber attack is low. Computing power is cheap, targets are diverse and… (more)

Subjects/Keywords: 600; cyber security; attack atribution; deception; honeynet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nicholson, A. (2015). Wide spectrum attribution : using deception for attribution intelligence in cyber attacks. (Doctoral Dissertation). De Montfort University. Retrieved from http://hdl.handle.net/2086/11418

Chicago Manual of Style (16th Edition):

Nicholson, Andrew. “Wide spectrum attribution : using deception for attribution intelligence in cyber attacks.” 2015. Doctoral Dissertation, De Montfort University. Accessed September 17, 2019. http://hdl.handle.net/2086/11418.

MLA Handbook (7th Edition):

Nicholson, Andrew. “Wide spectrum attribution : using deception for attribution intelligence in cyber attacks.” 2015. Web. 17 Sep 2019.

Vancouver:

Nicholson A. Wide spectrum attribution : using deception for attribution intelligence in cyber attacks. [Internet] [Doctoral dissertation]. De Montfort University; 2015. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/2086/11418.

Council of Science Editors:

Nicholson A. Wide spectrum attribution : using deception for attribution intelligence in cyber attacks. [Doctoral Dissertation]. De Montfort University; 2015. Available from: http://hdl.handle.net/2086/11418


University of Nairobi

26. Waithaka, Samuel W. Factors Affecting Cyber Security In National Government Ministries In Kenya .

Degree: 2016, University of Nairobi

 The main justification of e-government systems is to offer public services conveniently and continuously over open and distributed networks. Security reliability of information connected over… (more)

Subjects/Keywords: Cyber Security In National Government Ministries

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Waithaka, S. W. (2016). Factors Affecting Cyber Security In National Government Ministries In Kenya . (Thesis). University of Nairobi. Retrieved from http://hdl.handle.net/11295/100423

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Waithaka, Samuel W. “Factors Affecting Cyber Security In National Government Ministries In Kenya .” 2016. Thesis, University of Nairobi. Accessed September 17, 2019. http://hdl.handle.net/11295/100423.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Waithaka, Samuel W. “Factors Affecting Cyber Security In National Government Ministries In Kenya .” 2016. Web. 17 Sep 2019.

Vancouver:

Waithaka SW. Factors Affecting Cyber Security In National Government Ministries In Kenya . [Internet] [Thesis]. University of Nairobi; 2016. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/11295/100423.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Waithaka SW. Factors Affecting Cyber Security In National Government Ministries In Kenya . [Thesis]. University of Nairobi; 2016. Available from: http://hdl.handle.net/11295/100423

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Southern California

27. Al Majali, Anas. A function-based methodology for evaluating resilience in smart grids.

Degree: PhD, Computer Engineering, 2014, University of Southern California

 Utilizing communication, control and computation technologies in the modern smart grid can enhance the reliability of the smart grid, reduce electricity costs and provide new… (more)

Subjects/Keywords: resilience; smart grids; cyber-physical security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Majali, A. (2014). A function-based methodology for evaluating resilience in smart grids. (Doctoral Dissertation). University of Southern California. Retrieved from http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/481892/rec/197

Chicago Manual of Style (16th Edition):

Al Majali, Anas. “A function-based methodology for evaluating resilience in smart grids.” 2014. Doctoral Dissertation, University of Southern California. Accessed September 17, 2019. http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/481892/rec/197.

MLA Handbook (7th Edition):

Al Majali, Anas. “A function-based methodology for evaluating resilience in smart grids.” 2014. Web. 17 Sep 2019.

Vancouver:

Al Majali A. A function-based methodology for evaluating resilience in smart grids. [Internet] [Doctoral dissertation]. University of Southern California; 2014. [cited 2019 Sep 17]. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/481892/rec/197.

Council of Science Editors:

Al Majali A. A function-based methodology for evaluating resilience in smart grids. [Doctoral Dissertation]. University of Southern California; 2014. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/481892/rec/197

28. Barnes, John. Capstone Project: Cyber Security Analysis for IKANOW .

Degree: 2017, California State University – San Marcos

This paper utilizes a plethora of resources to evaluate the cyber security firm IKANOW???s position in the market. Advisors/Committee Members: Grooms, David (advisor), Oskoorouchi, Mohammad (committeemember).

Subjects/Keywords: Cyber security Market research; IKANOW; Evaluation Resources

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barnes, J. (2017). Capstone Project: Cyber Security Analysis for IKANOW . (Thesis). California State University – San Marcos. Retrieved from http://hdl.handle.net/10211.3/194703

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Barnes, John. “Capstone Project: Cyber Security Analysis for IKANOW .” 2017. Thesis, California State University – San Marcos. Accessed September 17, 2019. http://hdl.handle.net/10211.3/194703.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Barnes, John. “Capstone Project: Cyber Security Analysis for IKANOW .” 2017. Web. 17 Sep 2019.

Vancouver:

Barnes J. Capstone Project: Cyber Security Analysis for IKANOW . [Internet] [Thesis]. California State University – San Marcos; 2017. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/10211.3/194703.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Barnes J. Capstone Project: Cyber Security Analysis for IKANOW . [Thesis]. California State University – San Marcos; 2017. Available from: http://hdl.handle.net/10211.3/194703

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

29. Guymon, Daniel Wade. Cyber-physical Algorithms for Enhancing Collaboration.

Degree: MS, Electrical and Computer Engineering, 2012, Virginia Tech

 The research presented in this thesis covers two specific problems within the larger domain of cyber-physical algorithms for enhancing collaboration between one or more people.… (more)

Subjects/Keywords: cyber-physical systems; mobile computing; smartphones; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guymon, D. W. (2012). Cyber-physical Algorithms for Enhancing Collaboration. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/31919

Chicago Manual of Style (16th Edition):

Guymon, Daniel Wade. “Cyber-physical Algorithms for Enhancing Collaboration.” 2012. Masters Thesis, Virginia Tech. Accessed September 17, 2019. http://hdl.handle.net/10919/31919.

MLA Handbook (7th Edition):

Guymon, Daniel Wade. “Cyber-physical Algorithms for Enhancing Collaboration.” 2012. Web. 17 Sep 2019.

Vancouver:

Guymon DW. Cyber-physical Algorithms for Enhancing Collaboration. [Internet] [Masters thesis]. Virginia Tech; 2012. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/10919/31919.

Council of Science Editors:

Guymon DW. Cyber-physical Algorithms for Enhancing Collaboration. [Masters Thesis]. Virginia Tech; 2012. Available from: http://hdl.handle.net/10919/31919


California State University – Channel Islands

30. Agarwal, Geetanjali. Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm .

Degree: 2018, California State University – Channel Islands

 Digital imaging has experienced tremendous growth in recent decades, and have been used in a growing number of applications. With such increasing popularity and the… (more)

Subjects/Keywords: Image recognition; Cyber security; Computer Science thesis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Agarwal, G. (2018). Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm . (Thesis). California State University – Channel Islands. Retrieved from http://hdl.handle.net/10211.3/207494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Agarwal, Geetanjali. “Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm .” 2018. Thesis, California State University – Channel Islands. Accessed September 17, 2019. http://hdl.handle.net/10211.3/207494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Agarwal, Geetanjali. “Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm .” 2018. Web. 17 Sep 2019.

Vancouver:

Agarwal G. Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm . [Internet] [Thesis]. California State University – Channel Islands; 2018. [cited 2019 Sep 17]. Available from: http://hdl.handle.net/10211.3/207494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Agarwal G. Aneka- Detecting various forms of the same Wavelet Image Hashing Algorithm . [Thesis]. California State University – Channel Islands; 2018. Available from: http://hdl.handle.net/10211.3/207494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [12]

.