Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(intrusion). Showing records 1 – 30 of 1061 total matches.

[1] [2] [3] [4] [5] … [36]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Texas A&M University

1. Rice, Alec J. Stability of Mini-Screw Assisted Orthopedic Correction of Growing Retrognathic Hyperdivergent Patients.

Degree: MS, Oral Biology, 2016, Texas A&M University

 Purpose: To determine if non-surgical posterior dental intrusion produces stable orthodontic and orthopedic correction in growing retrognathic hyperdivergent patients. The primary aim of this study… (more)

Subjects/Keywords: intrusion stability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rice, A. J. (2016). Stability of Mini-Screw Assisted Orthopedic Correction of Growing Retrognathic Hyperdivergent Patients. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/157044

Chicago Manual of Style (16th Edition):

Rice, Alec J. “Stability of Mini-Screw Assisted Orthopedic Correction of Growing Retrognathic Hyperdivergent Patients.” 2016. Masters Thesis, Texas A&M University. Accessed April 11, 2021. http://hdl.handle.net/1969.1/157044.

MLA Handbook (7th Edition):

Rice, Alec J. “Stability of Mini-Screw Assisted Orthopedic Correction of Growing Retrognathic Hyperdivergent Patients.” 2016. Web. 11 Apr 2021.

Vancouver:

Rice AJ. Stability of Mini-Screw Assisted Orthopedic Correction of Growing Retrognathic Hyperdivergent Patients. [Internet] [Masters thesis]. Texas A&M University; 2016. [cited 2021 Apr 11]. Available from: http://hdl.handle.net/1969.1/157044.

Council of Science Editors:

Rice AJ. Stability of Mini-Screw Assisted Orthopedic Correction of Growing Retrognathic Hyperdivergent Patients. [Masters Thesis]. Texas A&M University; 2016. Available from: http://hdl.handle.net/1969.1/157044


Texas A&M University

2. Carrillo, Roberto. Orthopedic Correction of Growing Retrognathic Hyperdivergent Patients.

Degree: PhD, Biomedical Sciences, 2014, Texas A&M University

 The purpose of this prospective study was to determine whether dental intrusion is effective in treating growing retrognathic hyperdivergent patients without negatively affecting the roots… (more)

Subjects/Keywords: intrusion; miniscrew

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Carrillo, R. (2014). Orthopedic Correction of Growing Retrognathic Hyperdivergent Patients. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/152820

Chicago Manual of Style (16th Edition):

Carrillo, Roberto. “Orthopedic Correction of Growing Retrognathic Hyperdivergent Patients.” 2014. Doctoral Dissertation, Texas A&M University. Accessed April 11, 2021. http://hdl.handle.net/1969.1/152820.

MLA Handbook (7th Edition):

Carrillo, Roberto. “Orthopedic Correction of Growing Retrognathic Hyperdivergent Patients.” 2014. Web. 11 Apr 2021.

Vancouver:

Carrillo R. Orthopedic Correction of Growing Retrognathic Hyperdivergent Patients. [Internet] [Doctoral dissertation]. Texas A&M University; 2014. [cited 2021 Apr 11]. Available from: http://hdl.handle.net/1969.1/152820.

Council of Science Editors:

Carrillo R. Orthopedic Correction of Growing Retrognathic Hyperdivergent Patients. [Doctoral Dissertation]. Texas A&M University; 2014. Available from: http://hdl.handle.net/1969.1/152820

3. Bozkurt, Ozgur. Investigation of Vapor Intrusion Scenarios Using a 3D Numerical Model.

Degree: PhD, Division of Engineering. Fluid, Thermal, and Chemical Processes, 2009, Brown University

 Among the emerging issues of National concern are the health risks associated with vapor intrusion into structures that might exist or be built on or… (more)

Subjects/Keywords: Vapor Intrusion

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bozkurt, O. (2009). Investigation of Vapor Intrusion Scenarios Using a 3D Numerical Model. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:138/

Chicago Manual of Style (16th Edition):

Bozkurt, Ozgur. “Investigation of Vapor Intrusion Scenarios Using a 3D Numerical Model.” 2009. Doctoral Dissertation, Brown University. Accessed April 11, 2021. https://repository.library.brown.edu/studio/item/bdr:138/.

MLA Handbook (7th Edition):

Bozkurt, Ozgur. “Investigation of Vapor Intrusion Scenarios Using a 3D Numerical Model.” 2009. Web. 11 Apr 2021.

Vancouver:

Bozkurt O. Investigation of Vapor Intrusion Scenarios Using a 3D Numerical Model. [Internet] [Doctoral dissertation]. Brown University; 2009. [cited 2021 Apr 11]. Available from: https://repository.library.brown.edu/studio/item/bdr:138/.

Council of Science Editors:

Bozkurt O. Investigation of Vapor Intrusion Scenarios Using a 3D Numerical Model. [Doctoral Dissertation]. Brown University; 2009. Available from: https://repository.library.brown.edu/studio/item/bdr:138/

4. Shen, Rui. Volatile Organic Compounds in Vapor Intrusion: Static and Dynamic Fate and Transport Modeling.

Degree: PhD, Fluids and Thermal Sciences, 2014, Brown University

 Vapor intrusion modeling generally involves solving the soil gas flow and volatile organic compound vapor transport equations in the soil subsurface and from there into… (more)

Subjects/Keywords: Vapor Intrusion

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shen, R. (2014). Volatile Organic Compounds in Vapor Intrusion: Static and Dynamic Fate and Transport Modeling. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:386327/

Chicago Manual of Style (16th Edition):

Shen, Rui. “Volatile Organic Compounds in Vapor Intrusion: Static and Dynamic Fate and Transport Modeling.” 2014. Doctoral Dissertation, Brown University. Accessed April 11, 2021. https://repository.library.brown.edu/studio/item/bdr:386327/.

MLA Handbook (7th Edition):

Shen, Rui. “Volatile Organic Compounds in Vapor Intrusion: Static and Dynamic Fate and Transport Modeling.” 2014. Web. 11 Apr 2021.

Vancouver:

Shen R. Volatile Organic Compounds in Vapor Intrusion: Static and Dynamic Fate and Transport Modeling. [Internet] [Doctoral dissertation]. Brown University; 2014. [cited 2021 Apr 11]. Available from: https://repository.library.brown.edu/studio/item/bdr:386327/.

Council of Science Editors:

Shen R. Volatile Organic Compounds in Vapor Intrusion: Static and Dynamic Fate and Transport Modeling. [Doctoral Dissertation]. Brown University; 2014. Available from: https://repository.library.brown.edu/studio/item/bdr:386327/


University of Nairobi

5. Kihuha, Cyrus K. Network intrusion monitoring and reporting using e-mail and sms .

Degree: 2012, University of Nairobi

 The fundamental problem with any security administrators today is its ability to cope with the rising amount of network intrusions. Network security is fast becoming… (more)

Subjects/Keywords: Network intrusion

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kihuha, C. K. (2012). Network intrusion monitoring and reporting using e-mail and sms . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20998

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kihuha, Cyrus K. “Network intrusion monitoring and reporting using e-mail and sms .” 2012. Thesis, University of Nairobi. Accessed April 11, 2021. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20998.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kihuha, Cyrus K. “Network intrusion monitoring and reporting using e-mail and sms .” 2012. Web. 11 Apr 2021.

Vancouver:

Kihuha CK. Network intrusion monitoring and reporting using e-mail and sms . [Internet] [Thesis]. University of Nairobi; 2012. [cited 2021 Apr 11]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20998.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kihuha CK. Network intrusion monitoring and reporting using e-mail and sms . [Thesis]. University of Nairobi; 2012. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20998

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

6. Yao, Yijun. Modeling Vapor Intrusion - The Influence of Biodegradation and Useful Approximation Techniques.

Degree: PhD, Fluids, Thermal, and Chemical Processing, 2012, Brown University

 Vapor intrusion models grew out of pesticide transport simulations and radon intrusion models, which focus on transport in the soil and entry into the building,… (more)

Subjects/Keywords: Vapor intrusion simulation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yao, Y. (2012). Modeling Vapor Intrusion - The Influence of Biodegradation and Useful Approximation Techniques. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:297635/

Chicago Manual of Style (16th Edition):

Yao, Yijun. “Modeling Vapor Intrusion - The Influence of Biodegradation and Useful Approximation Techniques.” 2012. Doctoral Dissertation, Brown University. Accessed April 11, 2021. https://repository.library.brown.edu/studio/item/bdr:297635/.

MLA Handbook (7th Edition):

Yao, Yijun. “Modeling Vapor Intrusion - The Influence of Biodegradation and Useful Approximation Techniques.” 2012. Web. 11 Apr 2021.

Vancouver:

Yao Y. Modeling Vapor Intrusion - The Influence of Biodegradation and Useful Approximation Techniques. [Internet] [Doctoral dissertation]. Brown University; 2012. [cited 2021 Apr 11]. Available from: https://repository.library.brown.edu/studio/item/bdr:297635/.

Council of Science Editors:

Yao Y. Modeling Vapor Intrusion - The Influence of Biodegradation and Useful Approximation Techniques. [Doctoral Dissertation]. Brown University; 2012. Available from: https://repository.library.brown.edu/studio/item/bdr:297635/

7. Chevalier, Ronny. Detecting and Surviving Intrusions : Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches : Détecter et survivre aux intrusions : exploration de nouvelles approches de détection, de restauration, et de réponse aux intrusions.

Degree: Docteur es, Informatique (STIC), 2019, CentraleSupélec

Les systèmes informatiques, tels que les ordinateurs portables ou les systèmes embarqués, sont construits avec des couches de mécanismes de sécurité préventifs afin de réduire… (more)

Subjects/Keywords: Sécurité; Détection d’intrusion; Réponse aux intrusions; Survivabilité; Security; Intrusion detection; Intrusion response; Intrusion recovery; Survivability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chevalier, R. (2019). Detecting and Surviving Intrusions : Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches : Détecter et survivre aux intrusions : exploration de nouvelles approches de détection, de restauration, et de réponse aux intrusions. (Doctoral Dissertation). CentraleSupélec. Retrieved from http://www.theses.fr/2019CSUP0003

Chicago Manual of Style (16th Edition):

Chevalier, Ronny. “Detecting and Surviving Intrusions : Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches : Détecter et survivre aux intrusions : exploration de nouvelles approches de détection, de restauration, et de réponse aux intrusions.” 2019. Doctoral Dissertation, CentraleSupélec. Accessed April 11, 2021. http://www.theses.fr/2019CSUP0003.

MLA Handbook (7th Edition):

Chevalier, Ronny. “Detecting and Surviving Intrusions : Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches : Détecter et survivre aux intrusions : exploration de nouvelles approches de détection, de restauration, et de réponse aux intrusions.” 2019. Web. 11 Apr 2021.

Vancouver:

Chevalier R. Detecting and Surviving Intrusions : Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches : Détecter et survivre aux intrusions : exploration de nouvelles approches de détection, de restauration, et de réponse aux intrusions. [Internet] [Doctoral dissertation]. CentraleSupélec; 2019. [cited 2021 Apr 11]. Available from: http://www.theses.fr/2019CSUP0003.

Council of Science Editors:

Chevalier R. Detecting and Surviving Intrusions : Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches : Détecter et survivre aux intrusions : exploration de nouvelles approches de détection, de restauration, et de réponse aux intrusions. [Doctoral Dissertation]. CentraleSupélec; 2019. Available from: http://www.theses.fr/2019CSUP0003


University of Guelph

8. Nyakundi, Eric. USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION.

Degree: MS, School of Computer Science, 2015, University of Guelph

 Recent increase in hacks and computer network attacks around the world, including Sony Pictures (2014), Home Depot (2014), and Target (2014) gives a compelling need… (more)

Subjects/Keywords: Support Vector Machines; Intrusion detection systems; Anomaly intrusion detection; Network intrusion detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nyakundi, E. (2015). USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION. (Masters Thesis). University of Guelph. Retrieved from https://atrium.lib.uoguelph.ca/xmlui/handle/10214/8880

Chicago Manual of Style (16th Edition):

Nyakundi, Eric. “USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION.” 2015. Masters Thesis, University of Guelph. Accessed April 11, 2021. https://atrium.lib.uoguelph.ca/xmlui/handle/10214/8880.

MLA Handbook (7th Edition):

Nyakundi, Eric. “USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION.” 2015. Web. 11 Apr 2021.

Vancouver:

Nyakundi E. USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION. [Internet] [Masters thesis]. University of Guelph; 2015. [cited 2021 Apr 11]. Available from: https://atrium.lib.uoguelph.ca/xmlui/handle/10214/8880.

Council of Science Editors:

Nyakundi E. USING SUPPORT VECTOR MACHINES IN ANOMALY INTRUSION DETECTION. [Masters Thesis]. University of Guelph; 2015. Available from: https://atrium.lib.uoguelph.ca/xmlui/handle/10214/8880


University of Western Ontario

9. Miriya Thanthrige, Udaya Sampath Karunathilaka Perera. Hidden Markov Model Based Intrusion Alert Prediction.

Degree: 2016, University of Western Ontario

Intrusion detection is only a starting step in securing IT infrastructure. Prediction of intrusions is the next step to provide an active defense against incoming… (more)

Subjects/Keywords: Feature Reduction; HMM; Intrusion Alerts; Intrusion Detection; Intrusion Prediction; Other Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Miriya Thanthrige, U. S. K. P. (2016). Hidden Markov Model Based Intrusion Alert Prediction. (Thesis). University of Western Ontario. Retrieved from https://ir.lib.uwo.ca/etd/4044

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Miriya Thanthrige, Udaya Sampath Karunathilaka Perera. “Hidden Markov Model Based Intrusion Alert Prediction.” 2016. Thesis, University of Western Ontario. Accessed April 11, 2021. https://ir.lib.uwo.ca/etd/4044.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Miriya Thanthrige, Udaya Sampath Karunathilaka Perera. “Hidden Markov Model Based Intrusion Alert Prediction.” 2016. Web. 11 Apr 2021.

Vancouver:

Miriya Thanthrige USKP. Hidden Markov Model Based Intrusion Alert Prediction. [Internet] [Thesis]. University of Western Ontario; 2016. [cited 2021 Apr 11]. Available from: https://ir.lib.uwo.ca/etd/4044.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Miriya Thanthrige USKP. Hidden Markov Model Based Intrusion Alert Prediction. [Thesis]. University of Western Ontario; 2016. Available from: https://ir.lib.uwo.ca/etd/4044

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Jaiganesh, V. Investigation on machine learning algorithms for network intrusion detection system;.

Degree: 2015, Manonmaniam Sundaranar University

The network security is the major research issue in the field of computer science newlineResearch Network security industry is evolving for the past several decades… (more)

Subjects/Keywords: algorithms; intrusion; Investigation; machine

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jaiganesh, V. (2015). Investigation on machine learning algorithms for network intrusion detection system;. (Thesis). Manonmaniam Sundaranar University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/40737

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jaiganesh, V. “Investigation on machine learning algorithms for network intrusion detection system;.” 2015. Thesis, Manonmaniam Sundaranar University. Accessed April 11, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/40737.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jaiganesh, V. “Investigation on machine learning algorithms for network intrusion detection system;.” 2015. Web. 11 Apr 2021.

Vancouver:

Jaiganesh V. Investigation on machine learning algorithms for network intrusion detection system;. [Internet] [Thesis]. Manonmaniam Sundaranar University; 2015. [cited 2021 Apr 11]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/40737.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jaiganesh V. Investigation on machine learning algorithms for network intrusion detection system;. [Thesis]. Manonmaniam Sundaranar University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/40737

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

11. Rathore, Saubhagya Singh Singh. Development of seawater-freshwater interface in heterogeneous coastal aquifers.

Degree: PhD, Civil and Environmental Engineering, 2020, Georgia Tech

 The effects of the hydraulic conductivity heterogeneity on seawater intrusion (SWI) and submarine groundwater discharge (SGD) was studied. We, for the first time, identified a… (more)

Subjects/Keywords: Seawater intrusion; Heterogeneous aquifers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rathore, S. S. S. (2020). Development of seawater-freshwater interface in heterogeneous coastal aquifers. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62746

Chicago Manual of Style (16th Edition):

Rathore, Saubhagya Singh Singh. “Development of seawater-freshwater interface in heterogeneous coastal aquifers.” 2020. Doctoral Dissertation, Georgia Tech. Accessed April 11, 2021. http://hdl.handle.net/1853/62746.

MLA Handbook (7th Edition):

Rathore, Saubhagya Singh Singh. “Development of seawater-freshwater interface in heterogeneous coastal aquifers.” 2020. Web. 11 Apr 2021.

Vancouver:

Rathore SSS. Development of seawater-freshwater interface in heterogeneous coastal aquifers. [Internet] [Doctoral dissertation]. Georgia Tech; 2020. [cited 2021 Apr 11]. Available from: http://hdl.handle.net/1853/62746.

Council of Science Editors:

Rathore SSS. Development of seawater-freshwater interface in heterogeneous coastal aquifers. [Doctoral Dissertation]. Georgia Tech; 2020. Available from: http://hdl.handle.net/1853/62746

12. Victor, Ganta Jacob. Intrusion Detection Systems False Positives;.

Degree: Compute Science Engineering, 2013, Jawaharlal Nehru Technological University, Hyderabad

Computers and internet have become a part of human life, to address security challenges tools like Anti-viruses, Firewalls, Intrusion Detection Systems (IDS) etc. are deployed.… (more)

Subjects/Keywords: Detection; False; Intrusion; Positives; Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Victor, G. J. (2013). Intrusion Detection Systems False Positives;. (Thesis). Jawaharlal Nehru Technological University, Hyderabad. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/19733

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Victor, Ganta Jacob. “Intrusion Detection Systems False Positives;.” 2013. Thesis, Jawaharlal Nehru Technological University, Hyderabad. Accessed April 11, 2021. http://shodhganga.inflibnet.ac.in/handle/10603/19733.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Victor, Ganta Jacob. “Intrusion Detection Systems False Positives;.” 2013. Web. 11 Apr 2021.

Vancouver:

Victor GJ. Intrusion Detection Systems False Positives;. [Internet] [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2013. [cited 2021 Apr 11]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19733.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Victor GJ. Intrusion Detection Systems False Positives;. [Thesis]. Jawaharlal Nehru Technological University, Hyderabad; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/19733

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

13. Jha, Manjari. Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection.

Degree: 2018, Penn State University

 This thesis focuses on developing probabilistic models for the analysis of diverse datasets using unsupervised clustering techniques. Primarily, we focus on two main fields: the… (more)

Subjects/Keywords: metagenomics; intrusion detection; clustering; unsupervised

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jha, M. (2018). Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15543mom5590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jha, Manjari. “Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection.” 2018. Thesis, Penn State University. Accessed April 11, 2021. https://submit-etda.libraries.psu.edu/catalog/15543mom5590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jha, Manjari. “Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection.” 2018. Web. 11 Apr 2021.

Vancouver:

Jha M. Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection. [Internet] [Thesis]. Penn State University; 2018. [cited 2021 Apr 11]. Available from: https://submit-etda.libraries.psu.edu/catalog/15543mom5590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jha M. Probabilistic Techniques for Metagenomic Clustering and Intrusion Detection. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15543mom5590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Victoria University of Wellington

14. Seifert, Christian. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots.

Degree: 2010, Victoria University of Wellington

 With the increasing connectivity of and reliance on computers and networks, important aspects of computer systems are under a constant threat. In particular, drive-by-download attacks… (more)

Subjects/Keywords: Intrusion detection; Honeypots; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Seifert, C. (2010). Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/1385

Chicago Manual of Style (16th Edition):

Seifert, Christian. “Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots.” 2010. Doctoral Dissertation, Victoria University of Wellington. Accessed April 11, 2021. http://hdl.handle.net/10063/1385.

MLA Handbook (7th Edition):

Seifert, Christian. “Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots.” 2010. Web. 11 Apr 2021.

Vancouver:

Seifert C. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2010. [cited 2021 Apr 11]. Available from: http://hdl.handle.net/10063/1385.

Council of Science Editors:

Seifert C. Cost-effective Detection of Drive-by-Download Attacks with Hybrid Client Honeypots. [Doctoral Dissertation]. Victoria University of Wellington; 2010. Available from: http://hdl.handle.net/10063/1385


North-West University

15. Ohaeri, Ifeoma Ugochi. Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri .

Degree: 2012, North-West University

 With the rapid proliferation of new technologies and services in the wireless domain, spectrum scarcity has become a major concern. Cognitive radios (CRs) arise as… (more)

Subjects/Keywords: Intrusion detection systems; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ohaeri, I. U. (2012). Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri . (Thesis). North-West University. Retrieved from http://hdl.handle.net/10394/15665

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ohaeri, Ifeoma Ugochi. “Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri .” 2012. Thesis, North-West University. Accessed April 11, 2021. http://hdl.handle.net/10394/15665.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ohaeri, Ifeoma Ugochi. “Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri .” 2012. Web. 11 Apr 2021.

Vancouver:

Ohaeri IU. Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri . [Internet] [Thesis]. North-West University; 2012. [cited 2021 Apr 11]. Available from: http://hdl.handle.net/10394/15665.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ohaeri IU. Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri . [Thesis]. North-West University; 2012. Available from: http://hdl.handle.net/10394/15665

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Louisiana State University

16. Chitsazan, Nima. Bayesian Saltwater Intrusion Prediction and Remediation Design under Uncertainty.

Degree: PhD, Civil and Environmental Engineering, 2014, Louisiana State University

 Groundwater resources are vital for sustainable economic and demographic developments. Reliable prediction of groundwater head and contaminant transport is necessary for sustainable management of the… (more)

Subjects/Keywords: Uncertainty; Saltwater Intrusion; Groundwater; Bayesian

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chitsazan, N. (2014). Bayesian Saltwater Intrusion Prediction and Remediation Design under Uncertainty. (Doctoral Dissertation). Louisiana State University. Retrieved from etd-07082014-233129 ; https://digitalcommons.lsu.edu/gradschool_dissertations/394

Chicago Manual of Style (16th Edition):

Chitsazan, Nima. “Bayesian Saltwater Intrusion Prediction and Remediation Design under Uncertainty.” 2014. Doctoral Dissertation, Louisiana State University. Accessed April 11, 2021. etd-07082014-233129 ; https://digitalcommons.lsu.edu/gradschool_dissertations/394.

MLA Handbook (7th Edition):

Chitsazan, Nima. “Bayesian Saltwater Intrusion Prediction and Remediation Design under Uncertainty.” 2014. Web. 11 Apr 2021.

Vancouver:

Chitsazan N. Bayesian Saltwater Intrusion Prediction and Remediation Design under Uncertainty. [Internet] [Doctoral dissertation]. Louisiana State University; 2014. [cited 2021 Apr 11]. Available from: etd-07082014-233129 ; https://digitalcommons.lsu.edu/gradschool_dissertations/394.

Council of Science Editors:

Chitsazan N. Bayesian Saltwater Intrusion Prediction and Remediation Design under Uncertainty. [Doctoral Dissertation]. Louisiana State University; 2014. Available from: etd-07082014-233129 ; https://digitalcommons.lsu.edu/gradschool_dissertations/394

17. Han, Lu. Indicators of Compromise of Vehicular Systems .

Degree: Chalmers tekniska högskola / Institutionen för data och informationsteknik, 2019, Chalmers University of Technology

 Modern vehicles are no longer mere mechanical devices; they are equipped with plenty of sensors and Electronic Control Units (ECUs) for their primary functions such… (more)

Subjects/Keywords: IDS; Intrusion; Detection; ECU; IOC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Han, L. (2019). Indicators of Compromise of Vehicular Systems . (Thesis). Chalmers University of Technology. Retrieved from http://hdl.handle.net/20.500.12380/300607

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Han, Lu. “Indicators of Compromise of Vehicular Systems .” 2019. Thesis, Chalmers University of Technology. Accessed April 11, 2021. http://hdl.handle.net/20.500.12380/300607.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Han, Lu. “Indicators of Compromise of Vehicular Systems .” 2019. Web. 11 Apr 2021.

Vancouver:

Han L. Indicators of Compromise of Vehicular Systems . [Internet] [Thesis]. Chalmers University of Technology; 2019. [cited 2021 Apr 11]. Available from: http://hdl.handle.net/20.500.12380/300607.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Han L. Indicators of Compromise of Vehicular Systems . [Thesis]. Chalmers University of Technology; 2019. Available from: http://hdl.handle.net/20.500.12380/300607

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

18. DeFreeuw, Jonathan Daniel. Embedding Network Information for Machine Learning-based Intrusion Detection.

Degree: MS, Computer Engineering, 2019, Virginia Tech

 As computer networks grow and demonstrate more complicated and intricate behaviors, traditional intrusion detections systems have fallen behind in their ability to protect network resources.… (more)

Subjects/Keywords: word embeddings; intrusion detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

DeFreeuw, J. D. (2019). Embedding Network Information for Machine Learning-based Intrusion Detection. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/99342

Chicago Manual of Style (16th Edition):

DeFreeuw, Jonathan Daniel. “Embedding Network Information for Machine Learning-based Intrusion Detection.” 2019. Masters Thesis, Virginia Tech. Accessed April 11, 2021. http://hdl.handle.net/10919/99342.

MLA Handbook (7th Edition):

DeFreeuw, Jonathan Daniel. “Embedding Network Information for Machine Learning-based Intrusion Detection.” 2019. Web. 11 Apr 2021.

Vancouver:

DeFreeuw JD. Embedding Network Information for Machine Learning-based Intrusion Detection. [Internet] [Masters thesis]. Virginia Tech; 2019. [cited 2021 Apr 11]. Available from: http://hdl.handle.net/10919/99342.

Council of Science Editors:

DeFreeuw JD. Embedding Network Information for Machine Learning-based Intrusion Detection. [Masters Thesis]. Virginia Tech; 2019. Available from: http://hdl.handle.net/10919/99342


University of Georgia

19. Chatterjee, Debdatta. Measurement of intrusions in a university environment.

Degree: 2014, University of Georgia

 Managing traffic of a university is extremely challenging because of the large number and type of users. Every day an academic environment is exposed to… (more)

Subjects/Keywords: Attacks; Intrusions; Intrusion Prevention System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chatterjee, D. (2014). Measurement of intrusions in a university environment. (Thesis). University of Georgia. Retrieved from http://hdl.handle.net/10724/23808

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chatterjee, Debdatta. “Measurement of intrusions in a university environment.” 2014. Thesis, University of Georgia. Accessed April 11, 2021. http://hdl.handle.net/10724/23808.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chatterjee, Debdatta. “Measurement of intrusions in a university environment.” 2014. Web. 11 Apr 2021.

Vancouver:

Chatterjee D. Measurement of intrusions in a university environment. [Internet] [Thesis]. University of Georgia; 2014. [cited 2021 Apr 11]. Available from: http://hdl.handle.net/10724/23808.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chatterjee D. Measurement of intrusions in a university environment. [Thesis]. University of Georgia; 2014. Available from: http://hdl.handle.net/10724/23808

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Georgia

20. McGee, Branden James. Using spatial analysis to determine critical areas of the encroachment of saltwater for planning.

Degree: 2015, University of Georgia

 The purpose of this study is to analyze the current conditions of a south Florida coastal area, in Miami-Dade County, and identify environmental indicators of… (more)

Subjects/Keywords: Saltwater Intrusion; Spatial Analysis; Groundwater

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McGee, B. J. (2015). Using spatial analysis to determine critical areas of the encroachment of saltwater for planning. (Thesis). University of Georgia. Retrieved from http://hdl.handle.net/10724/31006

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

McGee, Branden James. “Using spatial analysis to determine critical areas of the encroachment of saltwater for planning.” 2015. Thesis, University of Georgia. Accessed April 11, 2021. http://hdl.handle.net/10724/31006.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

McGee, Branden James. “Using spatial analysis to determine critical areas of the encroachment of saltwater for planning.” 2015. Web. 11 Apr 2021.

Vancouver:

McGee BJ. Using spatial analysis to determine critical areas of the encroachment of saltwater for planning. [Internet] [Thesis]. University of Georgia; 2015. [cited 2021 Apr 11]. Available from: http://hdl.handle.net/10724/31006.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

McGee BJ. Using spatial analysis to determine critical areas of the encroachment of saltwater for planning. [Thesis]. University of Georgia; 2015. Available from: http://hdl.handle.net/10724/31006

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oklahoma State University

21. Koskei, Jordan Kiprop. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.

Degree: Computer Science Department, 2011, Oklahoma State University

 Currently deployed intrusion detection systems (IDS) have no capacity to discover attacker high level intentions. Understanding an intruder's intention greatly enhances network security as it… (more)

Subjects/Keywords: intrusion detection; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koskei, J. K. (2011). Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Koskei, Jordan Kiprop. “Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.” 2011. Thesis, Oklahoma State University. Accessed April 11, 2021. http://hdl.handle.net/11244/8184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Koskei, Jordan Kiprop. “Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.” 2011. Web. 11 Apr 2021.

Vancouver:

Koskei JK. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2021 Apr 11]. Available from: http://hdl.handle.net/11244/8184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Koskei JK. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


North Carolina State University

22. Yadav, Meeta. Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System.

Degree: PhD, Computer Engineering, 2009, North Carolina State University

 YADAV, MEETA. Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection. (Under the direction of Professor Paul D. Franzon). Intrusion detection systems protect… (more)

Subjects/Keywords: Network Intrusion Prevention; Hardware Architecture; Security; Network Intrusion Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yadav, M. (2009). Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System. (Doctoral Dissertation). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/5601

Chicago Manual of Style (16th Edition):

Yadav, Meeta. “Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System.” 2009. Doctoral Dissertation, North Carolina State University. Accessed April 11, 2021. http://www.lib.ncsu.edu/resolver/1840.16/5601.

MLA Handbook (7th Edition):

Yadav, Meeta. “Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System.” 2009. Web. 11 Apr 2021.

Vancouver:

Yadav M. Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System. [Internet] [Doctoral dissertation]. North Carolina State University; 2009. [cited 2021 Apr 11]. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5601.

Council of Science Editors:

Yadav M. Hardware Architecture of a Behavior Modeling Coprocessor for Network Intrusion Detection System. [Doctoral Dissertation]. North Carolina State University; 2009. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5601


University of Minnesota

23. Leu, Adam. Geology and Petrology of the Wilder Lake Intrusion, Duluth Complex, Northeastern Minnesota.

Degree: MS, Geological Sciences, 2016, University of Minnesota

 Abstract The Wilder Lake Intrusion (WLI) is a well differentiated, northward-dipping, sheet-like mafic layered intrusion that is part of the 1.1 Ga Duluth Complex exposed… (more)

Subjects/Keywords: Duluth Complex; Gabbro; Layered Intrusion; Midcontinent Rift; Troctolite; Wilder Lake Intrusion

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Leu, A. (2016). Geology and Petrology of the Wilder Lake Intrusion, Duluth Complex, Northeastern Minnesota. (Masters Thesis). University of Minnesota. Retrieved from http://hdl.handle.net/11299/182146

Chicago Manual of Style (16th Edition):

Leu, Adam. “Geology and Petrology of the Wilder Lake Intrusion, Duluth Complex, Northeastern Minnesota.” 2016. Masters Thesis, University of Minnesota. Accessed April 11, 2021. http://hdl.handle.net/11299/182146.

MLA Handbook (7th Edition):

Leu, Adam. “Geology and Petrology of the Wilder Lake Intrusion, Duluth Complex, Northeastern Minnesota.” 2016. Web. 11 Apr 2021.

Vancouver:

Leu A. Geology and Petrology of the Wilder Lake Intrusion, Duluth Complex, Northeastern Minnesota. [Internet] [Masters thesis]. University of Minnesota; 2016. [cited 2021 Apr 11]. Available from: http://hdl.handle.net/11299/182146.

Council of Science Editors:

Leu A. Geology and Petrology of the Wilder Lake Intrusion, Duluth Complex, Northeastern Minnesota. [Masters Thesis]. University of Minnesota; 2016. Available from: http://hdl.handle.net/11299/182146


Uppsala University

24. Jim, Nilsson. Fracture characterization in magmatic rock, a case study of the Sosa-dyke (Neuquén Basin, Argentina).

Degree: Earth Sciences, 2020, Uppsala University

There are many examples worldwide were fossil magmatic intrusions influence the local water and energy supply. Due to that intrusions can act as a… (more)

Subjects/Keywords: dyke; magmatic intrusion; fractures; Sosa dyke; permeability; intrusion; magmatisk intrusion; sprickor; Sosa intrusionen; permeabilitet; Geology; Geologi

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jim, N. (2020). Fracture characterization in magmatic rock, a case study of the Sosa-dyke (Neuquén Basin, Argentina). (Thesis). Uppsala University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411548

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jim, Nilsson. “Fracture characterization in magmatic rock, a case study of the Sosa-dyke (Neuquén Basin, Argentina).” 2020. Thesis, Uppsala University. Accessed April 11, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411548.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jim, Nilsson. “Fracture characterization in magmatic rock, a case study of the Sosa-dyke (Neuquén Basin, Argentina).” 2020. Web. 11 Apr 2021.

Vancouver:

Jim N. Fracture characterization in magmatic rock, a case study of the Sosa-dyke (Neuquén Basin, Argentina). [Internet] [Thesis]. Uppsala University; 2020. [cited 2021 Apr 11]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411548.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jim N. Fracture characterization in magmatic rock, a case study of the Sosa-dyke (Neuquén Basin, Argentina). [Thesis]. Uppsala University; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411548

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Victoria University of Wellington

25. Fussey, William. Applying and Developing the Intrusion into Seclusion Tort in New Zealand.

Degree: 2015, Victoria University of Wellington

 As new and intrusive ways of invading a person’s privacy become increasingly common, it is important that tort law has a satisfactory way of protecting… (more)

Subjects/Keywords: Privacy; Intrusion; Seclusion; Intrusion into Seclusion; Privacy Theory; Protection of the Intrusion Interest; Reasonable Expectation of Privacy; High Offensiveness

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fussey, W. (2015). Applying and Developing the Intrusion into Seclusion Tort in New Zealand. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/4857

Chicago Manual of Style (16th Edition):

Fussey, William. “Applying and Developing the Intrusion into Seclusion Tort in New Zealand.” 2015. Masters Thesis, Victoria University of Wellington. Accessed April 11, 2021. http://hdl.handle.net/10063/4857.

MLA Handbook (7th Edition):

Fussey, William. “Applying and Developing the Intrusion into Seclusion Tort in New Zealand.” 2015. Web. 11 Apr 2021.

Vancouver:

Fussey W. Applying and Developing the Intrusion into Seclusion Tort in New Zealand. [Internet] [Masters thesis]. Victoria University of Wellington; 2015. [cited 2021 Apr 11]. Available from: http://hdl.handle.net/10063/4857.

Council of Science Editors:

Fussey W. Applying and Developing the Intrusion into Seclusion Tort in New Zealand. [Masters Thesis]. Victoria University of Wellington; 2015. Available from: http://hdl.handle.net/10063/4857


Universidade de Lisboa

26. Cogo, Vinicius Vielmo. Diversity in Automatic Cloud Computing Resource Selection.

Degree: 2011, Universidade de Lisboa

 Obtaining correct results and behaviour on computing is a long-standing concern. Such guarantee can be obtained through fault and intrusion tolerance mechanisms, which aim to… (more)

Subjects/Keywords: Diversity; Resource Management; Cloud Computing; Intrusion Tolerance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cogo, V. V. (2011). Diversity in Automatic Cloud Computing Resource Selection. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13887

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cogo, Vinicius Vielmo. “Diversity in Automatic Cloud Computing Resource Selection.” 2011. Thesis, Universidade de Lisboa. Accessed April 11, 2021. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13887.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cogo, Vinicius Vielmo. “Diversity in Automatic Cloud Computing Resource Selection.” 2011. Web. 11 Apr 2021.

Vancouver:

Cogo VV. Diversity in Automatic Cloud Computing Resource Selection. [Internet] [Thesis]. Universidade de Lisboa; 2011. [cited 2021 Apr 11]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13887.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cogo VV. Diversity in Automatic Cloud Computing Resource Selection. [Thesis]. Universidade de Lisboa; 2011. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13887

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade de Lisboa

27. Ferreira, Paulo Jorge Botelho. Diverse intrusion-tolerant database replication.

Degree: 2012, Universidade de Lisboa

 The combination of database replication with Byzantine fault tolerance mechanism is a recent field of research with projects appearing in the last few years. However… (more)

Subjects/Keywords: Replication; Diversity; Middleware; Intrusion Tolerance; Databases

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ferreira, P. J. B. (2012). Diverse intrusion-tolerant database replication. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14036

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ferreira, Paulo Jorge Botelho. “Diverse intrusion-tolerant database replication.” 2012. Thesis, Universidade de Lisboa. Accessed April 11, 2021. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14036.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ferreira, Paulo Jorge Botelho. “Diverse intrusion-tolerant database replication.” 2012. Web. 11 Apr 2021.

Vancouver:

Ferreira PJB. Diverse intrusion-tolerant database replication. [Internet] [Thesis]. Universidade de Lisboa; 2012. [cited 2021 Apr 11]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14036.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ferreira PJB. Diverse intrusion-tolerant database replication. [Thesis]. Universidade de Lisboa; 2012. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/14036

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

28. Lin, Cheng-Wei. Numerical study of wave effect on seawater intrusion.

Degree: Master, Marine Environment and Engineering, 2006, NSYSU

 A two-dimensional finite difference model is developed for the simulation of saltwater intrusion in wave-induced aquifer system with either a confined or phreatic aquifer. The… (more)

Subjects/Keywords: wave; seawater intrusion

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, C. (2006). Numerical study of wave effect on seawater intrusion. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729106-220242

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Cheng-Wei. “Numerical study of wave effect on seawater intrusion.” 2006. Thesis, NSYSU. Accessed April 11, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729106-220242.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Cheng-Wei. “Numerical study of wave effect on seawater intrusion.” 2006. Web. 11 Apr 2021.

Vancouver:

Lin C. Numerical study of wave effect on seawater intrusion. [Internet] [Thesis]. NSYSU; 2006. [cited 2021 Apr 11]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729106-220242.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin C. Numerical study of wave effect on seawater intrusion. [Thesis]. NSYSU; 2006. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729106-220242

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

29. Yu Yang, Peng. Detecting Botnet-based Joint Attacks by Hidden Markov Model.

Degree: Master, Information Management, 2012, NSYSU

 We present a new detection model include monitoring network perimeter and hosts logs to counter the new method of attacking involve different hosts source during… (more)

Subjects/Keywords: Intrusion Detection System; Botnet; Hidden Markov Chain

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu Yang, P. (2012). Detecting Botnet-based Joint Attacks by Hidden Markov Model. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu Yang, Peng. “Detecting Botnet-based Joint Attacks by Hidden Markov Model.” 2012. Thesis, NSYSU. Accessed April 11, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu Yang, Peng. “Detecting Botnet-based Joint Attacks by Hidden Markov Model.” 2012. Web. 11 Apr 2021.

Vancouver:

Yu Yang P. Detecting Botnet-based Joint Attacks by Hidden Markov Model. [Internet] [Thesis]. NSYSU; 2012. [cited 2021 Apr 11]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu Yang P. Detecting Botnet-based Joint Attacks by Hidden Markov Model. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0906112-214543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universiteit Utrecht

30. Rosado de Palacio, C. Water system analysis and numerical modelling of a coastal aquifer in western Mexico: a case study.

Degree: 2014, Universiteit Utrecht

 This study combines a water system analysis of a coastal aquifer in western Mexico that is subject to seawater intrusion, where a hydrogeological characterisation of… (more)

Subjects/Keywords: Seawater intrusion; coastal aquifer; modelling; MOCDENS3D; hypersaline

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rosado de Palacio, C. (2014). Water system analysis and numerical modelling of a coastal aquifer in western Mexico: a case study. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/296739

Chicago Manual of Style (16th Edition):

Rosado de Palacio, C. “Water system analysis and numerical modelling of a coastal aquifer in western Mexico: a case study.” 2014. Masters Thesis, Universiteit Utrecht. Accessed April 11, 2021. http://dspace.library.uu.nl:8080/handle/1874/296739.

MLA Handbook (7th Edition):

Rosado de Palacio, C. “Water system analysis and numerical modelling of a coastal aquifer in western Mexico: a case study.” 2014. Web. 11 Apr 2021.

Vancouver:

Rosado de Palacio C. Water system analysis and numerical modelling of a coastal aquifer in western Mexico: a case study. [Internet] [Masters thesis]. Universiteit Utrecht; 2014. [cited 2021 Apr 11]. Available from: http://dspace.library.uu.nl:8080/handle/1874/296739.

Council of Science Editors:

Rosado de Palacio C. Water system analysis and numerical modelling of a coastal aquifer in western Mexico: a case study. [Masters Thesis]. Universiteit Utrecht; 2014. Available from: http://dspace.library.uu.nl:8080/handle/1874/296739

[1] [2] [3] [4] [5] … [36]

.