Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(network security). Showing records 1 – 30 of 1055 total matches.

[1] [2] [3] [4] [5] … [36]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Halmstad University

1. Rojas, Jose Enrique Charpentier. Web application Security.

Degree: Computer and Electrical Engineering (IDE), 2013, Halmstad University

  Problems related to web application security comes in many ways, one example is inexperience programmers but not only in the way they code and… (more)

Subjects/Keywords: Web Application Security; Network Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rojas, J. E. C. (2013). Web application Security. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rojas, Jose Enrique Charpentier. “Web application Security.” 2013. Thesis, Halmstad University. Accessed October 19, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rojas, Jose Enrique Charpentier. “Web application Security.” 2013. Web. 19 Oct 2019.

Vancouver:

Rojas JEC. Web application Security. [Internet] [Thesis]. Halmstad University; 2013. [cited 2019 Oct 19]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rojas JEC. Web application Security. [Thesis]. Halmstad University; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

2. Gowrison G. Study and analysis of network intrusion detection system by designing rule based filter.

Degree: Information and Communication, 2011, Anna University

The world is linked and interconnected by means of computer networks in various extents of processes, events and applications. The networks must be scalable to… (more)

Subjects/Keywords: Network security system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

G, G. (2011). Study and analysis of network intrusion detection system by designing rule based filter. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/9850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

G, Gowrison. “Study and analysis of network intrusion detection system by designing rule based filter.” 2011. Thesis, Anna University. Accessed October 19, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/9850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

G, Gowrison. “Study and analysis of network intrusion detection system by designing rule based filter.” 2011. Web. 19 Oct 2019.

Vancouver:

G G. Study and analysis of network intrusion detection system by designing rule based filter. [Internet] [Thesis]. Anna University; 2011. [cited 2019 Oct 19]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/9850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

G G. Study and analysis of network intrusion detection system by designing rule based filter. [Thesis]. Anna University; 2011. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/9850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

3. Kamath, Radhesh Muralidhara. Applying Netlabel to Network Access Control in a Virtualized Environment.

Degree: MS, Computer Science and Engineering, 2008, Penn State University

 We consider the problem of transmitting authorization data in a distributed environment comprised of applications hosted on paravirtualized Virtual Machines. The current mechanism, called Labeled… (more)

Subjects/Keywords: network security; virtualization; security; system security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kamath, R. M. (2008). Applying Netlabel to Network Access Control in a Virtualized Environment. (Masters Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/8454

Chicago Manual of Style (16th Edition):

Kamath, Radhesh Muralidhara. “Applying Netlabel to Network Access Control in a Virtualized Environment.” 2008. Masters Thesis, Penn State University. Accessed October 19, 2019. https://etda.libraries.psu.edu/catalog/8454.

MLA Handbook (7th Edition):

Kamath, Radhesh Muralidhara. “Applying Netlabel to Network Access Control in a Virtualized Environment.” 2008. Web. 19 Oct 2019.

Vancouver:

Kamath RM. Applying Netlabel to Network Access Control in a Virtualized Environment. [Internet] [Masters thesis]. Penn State University; 2008. [cited 2019 Oct 19]. Available from: https://etda.libraries.psu.edu/catalog/8454.

Council of Science Editors:

Kamath RM. Applying Netlabel to Network Access Control in a Virtualized Environment. [Masters Thesis]. Penn State University; 2008. Available from: https://etda.libraries.psu.edu/catalog/8454


University of Cincinnati

4. Hausrath, Nathaniel L. Methods for Hospital Network and Computer Security.

Degree: MS, Engineering and Applied Science: Computer Science, 2011, University of Cincinnati

 Hospital IT security presents many unique challenges that must be solved by the entire organization. Network and computer threats can cause thousands of dollars in… (more)

Subjects/Keywords: Information Technology; hospital it Security; information security; network security; computer security; hospital information security; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hausrath, N. L. (2011). Methods for Hospital Network and Computer Security. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234

Chicago Manual of Style (16th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Masters Thesis, University of Cincinnati. Accessed October 19, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

MLA Handbook (7th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Web. 19 Oct 2019.

Vancouver:

Hausrath NL. Methods for Hospital Network and Computer Security. [Internet] [Masters thesis]. University of Cincinnati; 2011. [cited 2019 Oct 19]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

Council of Science Editors:

Hausrath NL. Methods for Hospital Network and Computer Security. [Masters Thesis]. University of Cincinnati; 2011. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234


Victoria University of Wellington

5. Stirling, David. Enhancing Client Honeypots with Grid Services and Workflows.

Degree: 2009, Victoria University of Wellington

 Client honeypots are devices for detecting malicious servers on a network. They interact with potentially malicious servers and analyse the Web pages returned to assess… (more)

Subjects/Keywords: Honeypot (computing); Network security; Security; Distributed systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stirling, D. (2009). Enhancing Client Honeypots with Grid Services and Workflows. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/1177

Chicago Manual of Style (16th Edition):

Stirling, David. “Enhancing Client Honeypots with Grid Services and Workflows.” 2009. Masters Thesis, Victoria University of Wellington. Accessed October 19, 2019. http://hdl.handle.net/10063/1177.

MLA Handbook (7th Edition):

Stirling, David. “Enhancing Client Honeypots with Grid Services and Workflows.” 2009. Web. 19 Oct 2019.

Vancouver:

Stirling D. Enhancing Client Honeypots with Grid Services and Workflows. [Internet] [Masters thesis]. Victoria University of Wellington; 2009. [cited 2019 Oct 19]. Available from: http://hdl.handle.net/10063/1177.

Council of Science Editors:

Stirling D. Enhancing Client Honeypots with Grid Services and Workflows. [Masters Thesis]. Victoria University of Wellington; 2009. Available from: http://hdl.handle.net/10063/1177


University of Tennessee – Knoxville

6. Smith, Jared Michael. Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing.

Degree: MS, Computer Science, 2017, University of Tennessee – Knoxville

 In this work, we present Nyx, a system for mitigating Distributed Denial of Service (DDoS) attacks by routing critical traffic from known benign networks around… (more)

Subjects/Keywords: DDoS; security; network security; BGP; distributed systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smith, J. M. (2017). Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing. (Thesis). University of Tennessee – Knoxville. Retrieved from https://trace.tennessee.edu/utk_gradthes/4994

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Smith, Jared Michael. “Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing.” 2017. Thesis, University of Tennessee – Knoxville. Accessed October 19, 2019. https://trace.tennessee.edu/utk_gradthes/4994.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Smith, Jared Michael. “Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing.” 2017. Web. 19 Oct 2019.

Vancouver:

Smith JM. Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing. [Internet] [Thesis]. University of Tennessee – Knoxville; 2017. [cited 2019 Oct 19]. Available from: https://trace.tennessee.edu/utk_gradthes/4994.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Smith JM. Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing. [Thesis]. University of Tennessee – Knoxville; 2017. Available from: https://trace.tennessee.edu/utk_gradthes/4994

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Wollongong

7. Elashry, Ibrahim. Pairing-free identity-based cryptography.

Degree: PhD, 2015, University of Wollongong

  Identity-based cryptography (IBC) is considered nowadays as the evolution of public key cryptography because it completely eliminates the use of digital certificates by representing… (more)

Subjects/Keywords: Information security-cryptography; key exchange; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elashry, I. (2015). Pairing-free identity-based cryptography. (Doctoral Dissertation). University of Wollongong. Retrieved from ; https://ro.uow.edu.au/theses/4409

Chicago Manual of Style (16th Edition):

Elashry, Ibrahim. “Pairing-free identity-based cryptography.” 2015. Doctoral Dissertation, University of Wollongong. Accessed October 19, 2019. ; https://ro.uow.edu.au/theses/4409.

MLA Handbook (7th Edition):

Elashry, Ibrahim. “Pairing-free identity-based cryptography.” 2015. Web. 19 Oct 2019.

Vancouver:

Elashry I. Pairing-free identity-based cryptography. [Internet] [Doctoral dissertation]. University of Wollongong; 2015. [cited 2019 Oct 19]. Available from: ; https://ro.uow.edu.au/theses/4409.

Council of Science Editors:

Elashry I. Pairing-free identity-based cryptography. [Doctoral Dissertation]. University of Wollongong; 2015. Available from: ; https://ro.uow.edu.au/theses/4409


Rochester Institute of Technology

8. Henríquez Badía, Héctor. Identifying a weak link in the network chain: Determining how prepared Dominican IT administrators are to confront today’s security issues.

Degree: 2010, Rochester Institute of Technology

 Enterprises in Dominican Republic are growing in size; this means that sooner or later these enterprises will have the necessity to create an IT department… (more)

Subjects/Keywords: Dominican IT administrators; Enterprise network security; IT administrators; Network security; Network systems security; Weakest link

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Henríquez Badía, H. (2010). Identifying a weak link in the network chain: Determining how prepared Dominican IT administrators are to confront today’s security issues. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/826

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Henríquez Badía, Héctor. “Identifying a weak link in the network chain: Determining how prepared Dominican IT administrators are to confront today’s security issues.” 2010. Thesis, Rochester Institute of Technology. Accessed October 19, 2019. https://scholarworks.rit.edu/theses/826.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Henríquez Badía, Héctor. “Identifying a weak link in the network chain: Determining how prepared Dominican IT administrators are to confront today’s security issues.” 2010. Web. 19 Oct 2019.

Vancouver:

Henríquez Badía H. Identifying a weak link in the network chain: Determining how prepared Dominican IT administrators are to confront today’s security issues. [Internet] [Thesis]. Rochester Institute of Technology; 2010. [cited 2019 Oct 19]. Available from: https://scholarworks.rit.edu/theses/826.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Henríquez Badía H. Identifying a weak link in the network chain: Determining how prepared Dominican IT administrators are to confront today’s security issues. [Thesis]. Rochester Institute of Technology; 2010. Available from: https://scholarworks.rit.edu/theses/826

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Georgia

9. Rahbarinia, Babak. Behavioral analysis of network traffic for detecting advanced cyber-threats.

Degree: PhD, Computer Science, 2015, University of Georgia

 Internet miscreants continue to spread malware on thousands of users' machines and they have become stealthier than ever before. Current prevention and detection technologies to… (more)

Subjects/Keywords: Network security and intelligence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rahbarinia, B. (2015). Behavioral analysis of network traffic for detecting advanced cyber-threats. (Doctoral Dissertation). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/rahbarinia_babak_201505_phd

Chicago Manual of Style (16th Edition):

Rahbarinia, Babak. “Behavioral analysis of network traffic for detecting advanced cyber-threats.” 2015. Doctoral Dissertation, University of Georgia. Accessed October 19, 2019. http://purl.galileo.usg.edu/uga_etd/rahbarinia_babak_201505_phd.

MLA Handbook (7th Edition):

Rahbarinia, Babak. “Behavioral analysis of network traffic for detecting advanced cyber-threats.” 2015. Web. 19 Oct 2019.

Vancouver:

Rahbarinia B. Behavioral analysis of network traffic for detecting advanced cyber-threats. [Internet] [Doctoral dissertation]. University of Georgia; 2015. [cited 2019 Oct 19]. Available from: http://purl.galileo.usg.edu/uga_etd/rahbarinia_babak_201505_phd.

Council of Science Editors:

Rahbarinia B. Behavioral analysis of network traffic for detecting advanced cyber-threats. [Doctoral Dissertation]. University of Georgia; 2015. Available from: http://purl.galileo.usg.edu/uga_etd/rahbarinia_babak_201505_phd


University of Technology, Sydney

10. Yu, Dong. Generic benchmarking for application specific wireless sensor networks multi criteria performance.

Degree: 2012, University of Technology, Sydney

 Due to stringent energy constraint and demand for performance requirement, a generic architecture like TCP/IP or Internet is not feasible with sensors used across various… (more)

Subjects/Keywords: Wireless sensor network.; Evaluation.; Security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, D. (2012). Generic benchmarking for application specific wireless sensor networks multi criteria performance. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/21812

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu, Dong. “Generic benchmarking for application specific wireless sensor networks multi criteria performance.” 2012. Thesis, University of Technology, Sydney. Accessed October 19, 2019. http://hdl.handle.net/10453/21812.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu, Dong. “Generic benchmarking for application specific wireless sensor networks multi criteria performance.” 2012. Web. 19 Oct 2019.

Vancouver:

Yu D. Generic benchmarking for application specific wireless sensor networks multi criteria performance. [Internet] [Thesis]. University of Technology, Sydney; 2012. [cited 2019 Oct 19]. Available from: http://hdl.handle.net/10453/21812.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu D. Generic benchmarking for application specific wireless sensor networks multi criteria performance. [Thesis]. University of Technology, Sydney; 2012. Available from: http://hdl.handle.net/10453/21812

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Louisiana State University

11. Koopari Roopkumar, Bharath Kumar. Ethical Hacking Using Penetration Testing.

Degree: MS, Electrical and Computer Engineering, 2014, Louisiana State University

 This thesis provides details of the hardware architecture and the software scripting, which are employed to demonstrate penetration testing in a laboratory setup. The architecture… (more)

Subjects/Keywords: penetration testing; network security; hacking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koopari Roopkumar, B. K. (2014). Ethical Hacking Using Penetration Testing. (Masters Thesis). Louisiana State University. Retrieved from etd-11072014-122259 ; https://digitalcommons.lsu.edu/gradschool_theses/3238

Chicago Manual of Style (16th Edition):

Koopari Roopkumar, Bharath Kumar. “Ethical Hacking Using Penetration Testing.” 2014. Masters Thesis, Louisiana State University. Accessed October 19, 2019. etd-11072014-122259 ; https://digitalcommons.lsu.edu/gradschool_theses/3238.

MLA Handbook (7th Edition):

Koopari Roopkumar, Bharath Kumar. “Ethical Hacking Using Penetration Testing.” 2014. Web. 19 Oct 2019.

Vancouver:

Koopari Roopkumar BK. Ethical Hacking Using Penetration Testing. [Internet] [Masters thesis]. Louisiana State University; 2014. [cited 2019 Oct 19]. Available from: etd-11072014-122259 ; https://digitalcommons.lsu.edu/gradschool_theses/3238.

Council of Science Editors:

Koopari Roopkumar BK. Ethical Hacking Using Penetration Testing. [Masters Thesis]. Louisiana State University; 2014. Available from: etd-11072014-122259 ; https://digitalcommons.lsu.edu/gradschool_theses/3238


Oregon State University

12. Adeli, Majid. Security protocols for linear network coding.

Degree: PhD, Electrical and Computer Engineering, 2013, Oregon State University

Network coding, as the next generation of data routing protocols, enables each intermediate node in a network to process and encode its received data before… (more)

Subjects/Keywords: Linear network coding; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Adeli, M. (2013). Security protocols for linear network coding. (Doctoral Dissertation). Oregon State University. Retrieved from http://hdl.handle.net/1957/40079

Chicago Manual of Style (16th Edition):

Adeli, Majid. “Security protocols for linear network coding.” 2013. Doctoral Dissertation, Oregon State University. Accessed October 19, 2019. http://hdl.handle.net/1957/40079.

MLA Handbook (7th Edition):

Adeli, Majid. “Security protocols for linear network coding.” 2013. Web. 19 Oct 2019.

Vancouver:

Adeli M. Security protocols for linear network coding. [Internet] [Doctoral dissertation]. Oregon State University; 2013. [cited 2019 Oct 19]. Available from: http://hdl.handle.net/1957/40079.

Council of Science Editors:

Adeli M. Security protocols for linear network coding. [Doctoral Dissertation]. Oregon State University; 2013. Available from: http://hdl.handle.net/1957/40079

13. 宇野, 真純. エントロピーを特徴として用いた初期潜入段階におけるRATの通信検知 : A RAT detection method by using packet entropy on early intrusion stage; エントロピー オ トクチョウ ト シテ モチイタ ショキ センニュウ ダンカイ ニ オケル RAT ノ ツウシン ケンチ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: Network Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

宇野, . (n.d.). エントロピーを特徴として用いた初期潜入段階におけるRATの通信検知 : A RAT detection method by using packet entropy on early intrusion stage; エントロピー オ トクチョウ ト シテ モチイタ ショキ センニュウ ダンカイ ニ オケル RAT ノ ツウシン ケンチ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/11551

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

宇野, 真純. “エントロピーを特徴として用いた初期潜入段階におけるRATの通信検知 : A RAT detection method by using packet entropy on early intrusion stage; エントロピー オ トクチョウ ト シテ モチイタ ショキ センニュウ ダンカイ ニ オケル RAT ノ ツウシン ケンチ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed October 19, 2019. http://hdl.handle.net/10061/11551.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

宇野, 真純. “エントロピーを特徴として用いた初期潜入段階におけるRATの通信検知 : A RAT detection method by using packet entropy on early intrusion stage; エントロピー オ トクチョウ ト シテ モチイタ ショキ センニュウ ダンカイ ニ オケル RAT ノ ツウシン ケンチ.” Web. 19 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

宇野 . エントロピーを特徴として用いた初期潜入段階におけるRATの通信検知 : A RAT detection method by using packet entropy on early intrusion stage; エントロピー オ トクチョウ ト シテ モチイタ ショキ センニュウ ダンカイ ニ オケル RAT ノ ツウシン ケンチ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2019 Oct 19]. Available from: http://hdl.handle.net/10061/11551.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

宇野 . エントロピーを特徴として用いた初期潜入段階におけるRATの通信検知 : A RAT detection method by using packet entropy on early intrusion stage; エントロピー オ トクチョウ ト シテ モチイタ ショキ センニュウ ダンカイ ニ オケル RAT ノ ツウシン ケンチ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/11551

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Virginia Tech

14. Groat, Stephen Lawrence. Privacy and Security in IPv6 Addressing.

Degree: MS, Electrical and Computer Engineering, 2011, Virginia Tech

 Due to an exponentially larger address space than Internet Protocol version 4 (IPv4), the Internet Protocol version 6 (IPv6) uses new methods to assign network(more)

Subjects/Keywords: Security; Network Addressing; Privacy; Pv6

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Groat, S. L. (2011). Privacy and Security in IPv6 Addressing. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/76978

Chicago Manual of Style (16th Edition):

Groat, Stephen Lawrence. “Privacy and Security in IPv6 Addressing.” 2011. Masters Thesis, Virginia Tech. Accessed October 19, 2019. http://hdl.handle.net/10919/76978.

MLA Handbook (7th Edition):

Groat, Stephen Lawrence. “Privacy and Security in IPv6 Addressing.” 2011. Web. 19 Oct 2019.

Vancouver:

Groat SL. Privacy and Security in IPv6 Addressing. [Internet] [Masters thesis]. Virginia Tech; 2011. [cited 2019 Oct 19]. Available from: http://hdl.handle.net/10919/76978.

Council of Science Editors:

Groat SL. Privacy and Security in IPv6 Addressing. [Masters Thesis]. Virginia Tech; 2011. Available from: http://hdl.handle.net/10919/76978


Oklahoma State University

15. Koskei, Jordan Kiprop. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.

Degree: Computer Science Department, 2011, Oklahoma State University

 Currently deployed intrusion detection systems (IDS) have no capacity to discover attacker high level intentions. Understanding an intruder's intention greatly enhances network security as it… (more)

Subjects/Keywords: intrusion detection; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koskei, J. K. (2011). Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Koskei, Jordan Kiprop. “Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.” 2011. Thesis, Oklahoma State University. Accessed October 19, 2019. http://hdl.handle.net/11244/8184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Koskei, Jordan Kiprop. “Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.” 2011. Web. 19 Oct 2019.

Vancouver:

Koskei JK. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2019 Oct 19]. Available from: http://hdl.handle.net/11244/8184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Koskei JK. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

16. Zhang, Kuan. Security and Privacy for Mobile Social Networks.

Degree: 2016, University of Waterloo

 With the ever-increasing demands of people's social interactions, traditional online social networking applications are being shifted to the mobile ones, enabling users' social networking and… (more)

Subjects/Keywords: Mobile social network; Security; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, K. (2016). Security and Privacy for Mobile Social Networks. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/10418

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Kuan. “Security and Privacy for Mobile Social Networks.” 2016. Thesis, University of Waterloo. Accessed October 19, 2019. http://hdl.handle.net/10012/10418.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Kuan. “Security and Privacy for Mobile Social Networks.” 2016. Web. 19 Oct 2019.

Vancouver:

Zhang K. Security and Privacy for Mobile Social Networks. [Internet] [Thesis]. University of Waterloo; 2016. [cited 2019 Oct 19]. Available from: http://hdl.handle.net/10012/10418.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang K. Security and Privacy for Mobile Social Networks. [Thesis]. University of Waterloo; 2016. Available from: http://hdl.handle.net/10012/10418

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

17. Weiss, Martin S. Network Defense: The Attacks of Today and How Can We Improve?.

Degree: MS, 2009, Rochester Institute of Technology

  The practices of Network Defense were analyzed in this research paper. The Internet has become a very dangerous place for computer systems and networks… (more)

Subjects/Keywords: Firewalls; Network security; Telecommunications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Weiss, M. S. (2009). Network Defense: The Attacks of Today and How Can We Improve?. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9133

Chicago Manual of Style (16th Edition):

Weiss, Martin S. “Network Defense: The Attacks of Today and How Can We Improve?.” 2009. Masters Thesis, Rochester Institute of Technology. Accessed October 19, 2019. https://scholarworks.rit.edu/theses/9133.

MLA Handbook (7th Edition):

Weiss, Martin S. “Network Defense: The Attacks of Today and How Can We Improve?.” 2009. Web. 19 Oct 2019.

Vancouver:

Weiss MS. Network Defense: The Attacks of Today and How Can We Improve?. [Internet] [Masters thesis]. Rochester Institute of Technology; 2009. [cited 2019 Oct 19]. Available from: https://scholarworks.rit.edu/theses/9133.

Council of Science Editors:

Weiss MS. Network Defense: The Attacks of Today and How Can We Improve?. [Masters Thesis]. Rochester Institute of Technology; 2009. Available from: https://scholarworks.rit.edu/theses/9133


Rochester Institute of Technology

18. María, Yudit. PCI DSS case study: Impact in network design and security.

Degree: 2010, Rochester Institute of Technology

 The Payment Card Industry Data Security Standard is a set of twelve security requirements applicable to all institutions and systems handling, storing or transmitting cardholder… (more)

Subjects/Keywords: Compliance; Network security; PCI DSS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

María, Y. (2010). PCI DSS case study: Impact in network design and security. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/824

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

María, Yudit. “PCI DSS case study: Impact in network design and security.” 2010. Thesis, Rochester Institute of Technology. Accessed October 19, 2019. https://scholarworks.rit.edu/theses/824.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

María, Yudit. “PCI DSS case study: Impact in network design and security.” 2010. Web. 19 Oct 2019.

Vancouver:

María Y. PCI DSS case study: Impact in network design and security. [Internet] [Thesis]. Rochester Institute of Technology; 2010. [cited 2019 Oct 19]. Available from: https://scholarworks.rit.edu/theses/824.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

María Y. PCI DSS case study: Impact in network design and security. [Thesis]. Rochester Institute of Technology; 2010. Available from: https://scholarworks.rit.edu/theses/824

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

19. Spinapolice, Matthew. Mitigating the risk of social engineering attacks.

Degree: MS, Information Sciences and Technologies (GCCIS), 2011, Rochester Institute of Technology

  The topic of social engineering is only covered briefly in today's system administration and security coursework. This lack of coverage leaves many Administrators ill-equipped… (more)

Subjects/Keywords: Network security; Social engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Spinapolice, M. (2011). Mitigating the risk of social engineering attacks. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/394

Chicago Manual of Style (16th Edition):

Spinapolice, Matthew. “Mitigating the risk of social engineering attacks.” 2011. Masters Thesis, Rochester Institute of Technology. Accessed October 19, 2019. https://scholarworks.rit.edu/theses/394.

MLA Handbook (7th Edition):

Spinapolice, Matthew. “Mitigating the risk of social engineering attacks.” 2011. Web. 19 Oct 2019.

Vancouver:

Spinapolice M. Mitigating the risk of social engineering attacks. [Internet] [Masters thesis]. Rochester Institute of Technology; 2011. [cited 2019 Oct 19]. Available from: https://scholarworks.rit.edu/theses/394.

Council of Science Editors:

Spinapolice M. Mitigating the risk of social engineering attacks. [Masters Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/394


University of Manitoba

20. Jason Haydaman. Application of machine learning to computer network security.

Degree: Electrical and Computer Engineering, 2017, University of Manitoba

 Computer Security covers a wide array of topics, with much of the development in the field happening outside academia. We look at intrusion detection, and… (more)

Subjects/Keywords: Machine learning; Computer network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Haydaman, J. (2017). Application of machine learning to computer network security. (Masters Thesis). University of Manitoba. Retrieved from http://hdl.handle.net/1993/32543

Chicago Manual of Style (16th Edition):

Haydaman, Jason. “Application of machine learning to computer network security.” 2017. Masters Thesis, University of Manitoba. Accessed October 19, 2019. http://hdl.handle.net/1993/32543.

MLA Handbook (7th Edition):

Haydaman, Jason. “Application of machine learning to computer network security.” 2017. Web. 19 Oct 2019.

Vancouver:

Haydaman J. Application of machine learning to computer network security. [Internet] [Masters thesis]. University of Manitoba; 2017. [cited 2019 Oct 19]. Available from: http://hdl.handle.net/1993/32543.

Council of Science Editors:

Haydaman J. Application of machine learning to computer network security. [Masters Thesis]. University of Manitoba; 2017. Available from: http://hdl.handle.net/1993/32543


Virginia Tech

21. DeYoung, Mark Edward. Privacy Preserving Network Security Data Analytics.

Degree: PhD, Electrical and Computer Engineering, 2018, Virginia Tech

 The problem of revealing accurate statistics about a population while maintaining privacy of individuals is extensively studied in several related disciplines. Statisticians, information security experts,… (more)

Subjects/Keywords: Privacy; Data Analytics; Network Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

DeYoung, M. E. (2018). Privacy Preserving Network Security Data Analytics. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/82909

Chicago Manual of Style (16th Edition):

DeYoung, Mark Edward. “Privacy Preserving Network Security Data Analytics.” 2018. Doctoral Dissertation, Virginia Tech. Accessed October 19, 2019. http://hdl.handle.net/10919/82909.

MLA Handbook (7th Edition):

DeYoung, Mark Edward. “Privacy Preserving Network Security Data Analytics.” 2018. Web. 19 Oct 2019.

Vancouver:

DeYoung ME. Privacy Preserving Network Security Data Analytics. [Internet] [Doctoral dissertation]. Virginia Tech; 2018. [cited 2019 Oct 19]. Available from: http://hdl.handle.net/10919/82909.

Council of Science Editors:

DeYoung ME. Privacy Preserving Network Security Data Analytics. [Doctoral Dissertation]. Virginia Tech; 2018. Available from: http://hdl.handle.net/10919/82909


University of Windsor

22. Zhao, Shushan. ISSUES AND SOLUTIONS OF APPLYING IDENTITY-BASED CRYPTOGRAPHY TO MOBILE AD-HOC NETWORKS.

Degree: PhD, Computer Science, 2012, University of Windsor

 Concept of Mobile Ad-hoc Networks (MANETs) was brought up a few decades ago with assumed prosperous future. Unfortunately, we do not see many practical applications… (more)

Subjects/Keywords: ad-hoc network; cryptography; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhao, S. (2012). ISSUES AND SOLUTIONS OF APPLYING IDENTITY-BASED CRYPTOGRAPHY TO MOBILE AD-HOC NETWORKS. (Doctoral Dissertation). University of Windsor. Retrieved from https://scholar.uwindsor.ca/etd/5414

Chicago Manual of Style (16th Edition):

Zhao, Shushan. “ISSUES AND SOLUTIONS OF APPLYING IDENTITY-BASED CRYPTOGRAPHY TO MOBILE AD-HOC NETWORKS.” 2012. Doctoral Dissertation, University of Windsor. Accessed October 19, 2019. https://scholar.uwindsor.ca/etd/5414.

MLA Handbook (7th Edition):

Zhao, Shushan. “ISSUES AND SOLUTIONS OF APPLYING IDENTITY-BASED CRYPTOGRAPHY TO MOBILE AD-HOC NETWORKS.” 2012. Web. 19 Oct 2019.

Vancouver:

Zhao S. ISSUES AND SOLUTIONS OF APPLYING IDENTITY-BASED CRYPTOGRAPHY TO MOBILE AD-HOC NETWORKS. [Internet] [Doctoral dissertation]. University of Windsor; 2012. [cited 2019 Oct 19]. Available from: https://scholar.uwindsor.ca/etd/5414.

Council of Science Editors:

Zhao S. ISSUES AND SOLUTIONS OF APPLYING IDENTITY-BASED CRYPTOGRAPHY TO MOBILE AD-HOC NETWORKS. [Doctoral Dissertation]. University of Windsor; 2012. Available from: https://scholar.uwindsor.ca/etd/5414

23. Wu, Ben. Physical Layer Security Based on Optical Steganography and Optical Encryption .

Degree: PhD, 2015, Princeton University

 The communication network has experienced enormous growth in the past few decades. The growth of communication network requires the data to be transmitted at a… (more)

Subjects/Keywords: Fiber-optic communication; Network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, B. (2015). Physical Layer Security Based on Optical Steganography and Optical Encryption . (Doctoral Dissertation). Princeton University. Retrieved from http://arks.princeton.edu/ark:/88435/dsp01pv63g2566

Chicago Manual of Style (16th Edition):

Wu, Ben. “Physical Layer Security Based on Optical Steganography and Optical Encryption .” 2015. Doctoral Dissertation, Princeton University. Accessed October 19, 2019. http://arks.princeton.edu/ark:/88435/dsp01pv63g2566.

MLA Handbook (7th Edition):

Wu, Ben. “Physical Layer Security Based on Optical Steganography and Optical Encryption .” 2015. Web. 19 Oct 2019.

Vancouver:

Wu B. Physical Layer Security Based on Optical Steganography and Optical Encryption . [Internet] [Doctoral dissertation]. Princeton University; 2015. [cited 2019 Oct 19]. Available from: http://arks.princeton.edu/ark:/88435/dsp01pv63g2566.

Council of Science Editors:

Wu B. Physical Layer Security Based on Optical Steganography and Optical Encryption . [Doctoral Dissertation]. Princeton University; 2015. Available from: http://arks.princeton.edu/ark:/88435/dsp01pv63g2566


Georgia Tech

24. Formby, David. Network based fingerprinting techniques for industrial control systems.

Degree: PhD, Electrical and Computer Engineering, 2017, Georgia Tech

 Fingerprinting techniques operating over the network are proposed to identify various aspects of industrial control systems (ICSs) including software, hardware, and physical devices. First, a… (more)

Subjects/Keywords: Network security; Industrial control systems; Network characterization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Formby, D. (2017). Network based fingerprinting techniques for industrial control systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/60668

Chicago Manual of Style (16th Edition):

Formby, David. “Network based fingerprinting techniques for industrial control systems.” 2017. Doctoral Dissertation, Georgia Tech. Accessed October 19, 2019. http://hdl.handle.net/1853/60668.

MLA Handbook (7th Edition):

Formby, David. “Network based fingerprinting techniques for industrial control systems.” 2017. Web. 19 Oct 2019.

Vancouver:

Formby D. Network based fingerprinting techniques for industrial control systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2019 Oct 19]. Available from: http://hdl.handle.net/1853/60668.

Council of Science Editors:

Formby D. Network based fingerprinting techniques for industrial control systems. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/60668


Lehigh University

25. Liu, Zhiheng. Towards a Secure Zero-rating Framework with Three Parties.

Degree: MS, Computer Science, 2018, Lehigh University

 Zero-rating services allow mobile users to access contents from contracted CP free of data charge. In this thesis, we introduce attacks against the zero rating… (more)

Subjects/Keywords: core-network; ISP; Network; Security; System; Zero-rating; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, Z. (2018). Towards a Secure Zero-rating Framework with Three Parties. (Thesis). Lehigh University. Retrieved from https://preserve.lehigh.edu/etd/4357

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Zhiheng. “Towards a Secure Zero-rating Framework with Three Parties.” 2018. Thesis, Lehigh University. Accessed October 19, 2019. https://preserve.lehigh.edu/etd/4357.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Zhiheng. “Towards a Secure Zero-rating Framework with Three Parties.” 2018. Web. 19 Oct 2019.

Vancouver:

Liu Z. Towards a Secure Zero-rating Framework with Three Parties. [Internet] [Thesis]. Lehigh University; 2018. [cited 2019 Oct 19]. Available from: https://preserve.lehigh.edu/etd/4357.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu Z. Towards a Secure Zero-rating Framework with Three Parties. [Thesis]. Lehigh University; 2018. Available from: https://preserve.lehigh.edu/etd/4357

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Texas

26. Ganduri, Rajasekhar. Network Security Tool for a Novice.

Degree: 2016, University of North Texas

Network security is a complex field that is handled by security professionals who need certain expertise and experience to configure security systems. With the ever… (more)

Subjects/Keywords: Network Security; Cloud Computing; OpenStack; Network Security Functions

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ganduri, R. (2016). Network Security Tool for a Novice. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc862873/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ganduri, Rajasekhar. “Network Security Tool for a Novice.” 2016. Thesis, University of North Texas. Accessed October 19, 2019. https://digital.library.unt.edu/ark:/67531/metadc862873/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ganduri, Rajasekhar. “Network Security Tool for a Novice.” 2016. Web. 19 Oct 2019.

Vancouver:

Ganduri R. Network Security Tool for a Novice. [Internet] [Thesis]. University of North Texas; 2016. [cited 2019 Oct 19]. Available from: https://digital.library.unt.edu/ark:/67531/metadc862873/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ganduri R. Network Security Tool for a Novice. [Thesis]. University of North Texas; 2016. Available from: https://digital.library.unt.edu/ark:/67531/metadc862873/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Canterbury

27. Hong, Jin Bum. Scalable and adaptable security modelling and analysis.

Degree: Computer Science and Software Engineering, 2015, University of Canterbury

 Modern networked systems are complex in such a way that assessing the security of them is a difficult task. Security models are widely used to… (more)

Subjects/Keywords: adaptability; network security; scalability; security analysis; security modelling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hong, J. B. (2015). Scalable and adaptable security modelling and analysis. (Thesis). University of Canterbury. Retrieved from http://hdl.handle.net/10092/10246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hong, Jin Bum. “Scalable and adaptable security modelling and analysis.” 2015. Thesis, University of Canterbury. Accessed October 19, 2019. http://hdl.handle.net/10092/10246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hong, Jin Bum. “Scalable and adaptable security modelling and analysis.” 2015. Web. 19 Oct 2019.

Vancouver:

Hong JB. Scalable and adaptable security modelling and analysis. [Internet] [Thesis]. University of Canterbury; 2015. [cited 2019 Oct 19]. Available from: http://hdl.handle.net/10092/10246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hong JB. Scalable and adaptable security modelling and analysis. [Thesis]. University of Canterbury; 2015. Available from: http://hdl.handle.net/10092/10246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Louisiana State University

28. Davis, Sarah. Cyber-Physical Security Strategies.

Degree: MSEE, Electrical and Computer Engineering, 2014, Louisiana State University

 Cyber-physical security describes the protection of systems with close relationships between computational functions and physical ones and addresses the issue of vulnerability to attack through… (more)

Subjects/Keywords: cyber-physical security; control sytem security; sensor network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Davis, S. (2014). Cyber-Physical Security Strategies. (Masters Thesis). Louisiana State University. Retrieved from etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147

Chicago Manual of Style (16th Edition):

Davis, Sarah. “Cyber-Physical Security Strategies.” 2014. Masters Thesis, Louisiana State University. Accessed October 19, 2019. etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147.

MLA Handbook (7th Edition):

Davis, Sarah. “Cyber-Physical Security Strategies.” 2014. Web. 19 Oct 2019.

Vancouver:

Davis S. Cyber-Physical Security Strategies. [Internet] [Masters thesis]. Louisiana State University; 2014. [cited 2019 Oct 19]. Available from: etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147.

Council of Science Editors:

Davis S. Cyber-Physical Security Strategies. [Masters Thesis]. Louisiana State University; 2014. Available from: etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147

29. Viduto, Valentina. A risk assessment and optimisation model for minimising network security risk and cost.

Degree: PhD, 2012, University of Bedfordshire

Network security risk analysis has received great attention within the scientific community, due to the current proliferation of network attacks and threats. Although, considerable effort… (more)

Subjects/Keywords: 005.8; G420 Networks and Communications; network security risk analysis; computer security; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Viduto, V. (2012). A risk assessment and optimisation model for minimising network security risk and cost. (Doctoral Dissertation). University of Bedfordshire. Retrieved from http://hdl.handle.net/10547/270440

Chicago Manual of Style (16th Edition):

Viduto, Valentina. “A risk assessment and optimisation model for minimising network security risk and cost.” 2012. Doctoral Dissertation, University of Bedfordshire. Accessed October 19, 2019. http://hdl.handle.net/10547/270440.

MLA Handbook (7th Edition):

Viduto, Valentina. “A risk assessment and optimisation model for minimising network security risk and cost.” 2012. Web. 19 Oct 2019.

Vancouver:

Viduto V. A risk assessment and optimisation model for minimising network security risk and cost. [Internet] [Doctoral dissertation]. University of Bedfordshire; 2012. [cited 2019 Oct 19]. Available from: http://hdl.handle.net/10547/270440.

Council of Science Editors:

Viduto V. A risk assessment and optimisation model for minimising network security risk and cost. [Doctoral Dissertation]. University of Bedfordshire; 2012. Available from: http://hdl.handle.net/10547/270440


University of Pretoria

30. Delport, Johannes Petrus. Link layer topology discovery in an uncooperative ethernet environment.

Degree: Computer Science, 2008, University of Pretoria

 Knowledge of a network’s entities and the physical connections between them, a network’s physical topology, can be useful in a variety of network scenarios and… (more)

Subjects/Keywords: Network management; Ethernet; Network security; Network topology discovery; Network mapping; Network monitoring; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Delport, J. (2008). Link layer topology discovery in an uncooperative ethernet environment. (Masters Thesis). University of Pretoria. Retrieved from http://hdl.handle.net/2263/27589

Chicago Manual of Style (16th Edition):

Delport, Johannes. “Link layer topology discovery in an uncooperative ethernet environment.” 2008. Masters Thesis, University of Pretoria. Accessed October 19, 2019. http://hdl.handle.net/2263/27589.

MLA Handbook (7th Edition):

Delport, Johannes. “Link layer topology discovery in an uncooperative ethernet environment.” 2008. Web. 19 Oct 2019.

Vancouver:

Delport J. Link layer topology discovery in an uncooperative ethernet environment. [Internet] [Masters thesis]. University of Pretoria; 2008. [cited 2019 Oct 19]. Available from: http://hdl.handle.net/2263/27589.

Council of Science Editors:

Delport J. Link layer topology discovery in an uncooperative ethernet environment. [Masters Thesis]. University of Pretoria; 2008. Available from: http://hdl.handle.net/2263/27589

[1] [2] [3] [4] [5] … [36]

.