Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(network security). Showing records 1 – 30 of 1165 total matches.

[1] [2] [3] [4] [5] … [39]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Halmstad University

1. Rojas, Jose Enrique Charpentier. Web application Security.

Degree: Computer and Electrical Engineering (IDE), 2013, Halmstad University

  Problems related to web application security comes in many ways, one example is inexperience programmers but not only in the way they code and… (more)

Subjects/Keywords: Web Application Security; Network Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rojas, J. E. C. (2013). Web application Security. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rojas, Jose Enrique Charpentier. “Web application Security.” 2013. Thesis, Halmstad University. Accessed October 25, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rojas, Jose Enrique Charpentier. “Web application Security.” 2013. Web. 25 Oct 2020.

Vancouver:

Rojas JEC. Web application Security. [Internet] [Thesis]. Halmstad University; 2013. [cited 2020 Oct 25]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rojas JEC. Web application Security. [Thesis]. Halmstad University; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

2. DeMarinis, Nicholas AF. On LTE Security: Closing the Gap Between Standards and Implementation.

Degree: MS, 2015, Worcester Polytechnic Institute

 Modern cellular networks including LTE (Long Term Evolution) and the evolving LTE- Advanced provide high-speed and high-capacity data services for mobile users. As we become… (more)

Subjects/Keywords: cellular networks; network security; cellular network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

DeMarinis, N. A. (2015). On LTE Security: Closing the Gap Between Standards and Implementation. (Thesis). Worcester Polytechnic Institute. Retrieved from etd-050815-095939 ; https://digitalcommons.wpi.edu/etd-theses/791

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

DeMarinis, Nicholas AF. “On LTE Security: Closing the Gap Between Standards and Implementation.” 2015. Thesis, Worcester Polytechnic Institute. Accessed October 25, 2020. etd-050815-095939 ; https://digitalcommons.wpi.edu/etd-theses/791.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

DeMarinis, Nicholas AF. “On LTE Security: Closing the Gap Between Standards and Implementation.” 2015. Web. 25 Oct 2020.

Vancouver:

DeMarinis NA. On LTE Security: Closing the Gap Between Standards and Implementation. [Internet] [Thesis]. Worcester Polytechnic Institute; 2015. [cited 2020 Oct 25]. Available from: etd-050815-095939 ; https://digitalcommons.wpi.edu/etd-theses/791.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

DeMarinis NA. On LTE Security: Closing the Gap Between Standards and Implementation. [Thesis]. Worcester Polytechnic Institute; 2015. Available from: etd-050815-095939 ; https://digitalcommons.wpi.edu/etd-theses/791

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

3. Gowrison G. Study and analysis of network intrusion detection system by designing rule based filter.

Degree: Information and Communication, 2011, Anna University

The world is linked and interconnected by means of computer networks in various extents of processes, events and applications. The networks must be scalable to… (more)

Subjects/Keywords: Network security system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

G, G. (2011). Study and analysis of network intrusion detection system by designing rule based filter. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/9850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

G, Gowrison. “Study and analysis of network intrusion detection system by designing rule based filter.” 2011. Thesis, Anna University. Accessed October 25, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/9850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

G, Gowrison. “Study and analysis of network intrusion detection system by designing rule based filter.” 2011. Web. 25 Oct 2020.

Vancouver:

G G. Study and analysis of network intrusion detection system by designing rule based filter. [Internet] [Thesis]. Anna University; 2011. [cited 2020 Oct 25]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/9850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

G G. Study and analysis of network intrusion detection system by designing rule based filter. [Thesis]. Anna University; 2011. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/9850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Cincinnati

4. Hausrath, Nathaniel L. Methods for Hospital Network and Computer Security.

Degree: MS, Engineering and Applied Science: Computer Science, 2011, University of Cincinnati

 Hospital IT security presents many unique challenges that must be solved by the entire organization. Network and computer threats can cause thousands of dollars in… (more)

Subjects/Keywords: Information Technology; hospital it Security; information security; network security; computer security; hospital information security; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hausrath, N. L. (2011). Methods for Hospital Network and Computer Security. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234

Chicago Manual of Style (16th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Masters Thesis, University of Cincinnati. Accessed October 25, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

MLA Handbook (7th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Web. 25 Oct 2020.

Vancouver:

Hausrath NL. Methods for Hospital Network and Computer Security. [Internet] [Masters thesis]. University of Cincinnati; 2011. [cited 2020 Oct 25]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

Council of Science Editors:

Hausrath NL. Methods for Hospital Network and Computer Security. [Masters Thesis]. University of Cincinnati; 2011. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234


University of Texas – Austin

5. -2587-3671. On the (in)security of service APIs.

Degree: PhD, Computer science, 2015, University of Texas – Austin

 Today's systems abstract the implementation details of common services such as secure client-server communication, access to native device resources (e.g. camera), access to cloud-stored files… (more)

Subjects/Keywords: Web security; Mobile security; Network protocol security; Security vulnerabilities

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-2587-3671. (2015). On the (in)security of service APIs. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/32586

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-2587-3671. “On the (in)security of service APIs.” 2015. Doctoral Dissertation, University of Texas – Austin. Accessed October 25, 2020. http://hdl.handle.net/2152/32586.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-2587-3671. “On the (in)security of service APIs.” 2015. Web. 25 Oct 2020.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-2587-3671. On the (in)security of service APIs. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2015. [cited 2020 Oct 25]. Available from: http://hdl.handle.net/2152/32586.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-2587-3671. On the (in)security of service APIs. [Doctoral Dissertation]. University of Texas – Austin; 2015. Available from: http://hdl.handle.net/2152/32586

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


University of Wollongong

6. Elashry, Ibrahim. Pairing-free identity-based cryptography.

Degree: PhD, 2015, University of Wollongong

  Identity-based cryptography (IBC) is considered nowadays as the evolution of public key cryptography because it completely eliminates the use of digital certificates by representing… (more)

Subjects/Keywords: Information security-cryptography; key exchange; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elashry, I. (2015). Pairing-free identity-based cryptography. (Doctoral Dissertation). University of Wollongong. Retrieved from ; https://ro.uow.edu.au/theses/4409

Chicago Manual of Style (16th Edition):

Elashry, Ibrahim. “Pairing-free identity-based cryptography.” 2015. Doctoral Dissertation, University of Wollongong. Accessed October 25, 2020. ; https://ro.uow.edu.au/theses/4409.

MLA Handbook (7th Edition):

Elashry, Ibrahim. “Pairing-free identity-based cryptography.” 2015. Web. 25 Oct 2020.

Vancouver:

Elashry I. Pairing-free identity-based cryptography. [Internet] [Doctoral dissertation]. University of Wollongong; 2015. [cited 2020 Oct 25]. Available from: ; https://ro.uow.edu.au/theses/4409.

Council of Science Editors:

Elashry I. Pairing-free identity-based cryptography. [Doctoral Dissertation]. University of Wollongong; 2015. Available from: ; https://ro.uow.edu.au/theses/4409


University of Tennessee – Knoxville

7. Smith, Jared Michael. Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing.

Degree: MS, Computer Science, 2017, University of Tennessee – Knoxville

 In this work, we present Nyx, a system for mitigating Distributed Denial of Service (DDoS) attacks by routing critical traffic from known benign networks around… (more)

Subjects/Keywords: DDoS; security; network security; BGP; distributed systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smith, J. M. (2017). Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing. (Thesis). University of Tennessee – Knoxville. Retrieved from https://trace.tennessee.edu/utk_gradthes/4994

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Smith, Jared Michael. “Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing.” 2017. Thesis, University of Tennessee – Knoxville. Accessed October 25, 2020. https://trace.tennessee.edu/utk_gradthes/4994.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Smith, Jared Michael. “Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing.” 2017. Web. 25 Oct 2020.

Vancouver:

Smith JM. Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing. [Internet] [Thesis]. University of Tennessee – Knoxville; 2017. [cited 2020 Oct 25]. Available from: https://trace.tennessee.edu/utk_gradthes/4994.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Smith JM. Taking Back the Internet: Defeating DDoS and Adverse Network Conditions via Reactive BGP Routing. [Thesis]. University of Tennessee – Knoxville; 2017. Available from: https://trace.tennessee.edu/utk_gradthes/4994

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

8. Spinapolice, Matthew. Mitigating the risk of social engineering attacks.

Degree: MS, Information Sciences and Technologies (GCCIS), 2011, Rochester Institute of Technology

  The topic of social engineering is only covered briefly in today's system administration and security coursework. This lack of coverage leaves many Administrators ill-equipped… (more)

Subjects/Keywords: Network security; Social engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Spinapolice, M. (2011). Mitigating the risk of social engineering attacks. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/394

Chicago Manual of Style (16th Edition):

Spinapolice, Matthew. “Mitigating the risk of social engineering attacks.” 2011. Masters Thesis, Rochester Institute of Technology. Accessed October 25, 2020. https://scholarworks.rit.edu/theses/394.

MLA Handbook (7th Edition):

Spinapolice, Matthew. “Mitigating the risk of social engineering attacks.” 2011. Web. 25 Oct 2020.

Vancouver:

Spinapolice M. Mitigating the risk of social engineering attacks. [Internet] [Masters thesis]. Rochester Institute of Technology; 2011. [cited 2020 Oct 25]. Available from: https://scholarworks.rit.edu/theses/394.

Council of Science Editors:

Spinapolice M. Mitigating the risk of social engineering attacks. [Masters Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/394


Oregon State University

9. Adeli, Majid. Security protocols for linear network coding.

Degree: PhD, Electrical and Computer Engineering, 2013, Oregon State University

Network coding, as the next generation of data routing protocols, enables each intermediate node in a network to process and encode its received data before… (more)

Subjects/Keywords: Linear network coding; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Adeli, M. (2013). Security protocols for linear network coding. (Doctoral Dissertation). Oregon State University. Retrieved from http://hdl.handle.net/1957/40079

Chicago Manual of Style (16th Edition):

Adeli, Majid. “Security protocols for linear network coding.” 2013. Doctoral Dissertation, Oregon State University. Accessed October 25, 2020. http://hdl.handle.net/1957/40079.

MLA Handbook (7th Edition):

Adeli, Majid. “Security protocols for linear network coding.” 2013. Web. 25 Oct 2020.

Vancouver:

Adeli M. Security protocols for linear network coding. [Internet] [Doctoral dissertation]. Oregon State University; 2013. [cited 2020 Oct 25]. Available from: http://hdl.handle.net/1957/40079.

Council of Science Editors:

Adeli M. Security protocols for linear network coding. [Doctoral Dissertation]. Oregon State University; 2013. Available from: http://hdl.handle.net/1957/40079

10. 宇野, 真純. エントロピーを特徴として用いた初期潜入段階におけるRATの通信検知 : A RAT detection method by using packet entropy on early intrusion stage; エントロピー オ トクチョウ ト シテ モチイタ ショキ センニュウ ダンカイ ニ オケル RAT ノ ツウシン ケンチ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: Network Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

宇野, . (n.d.). エントロピーを特徴として用いた初期潜入段階におけるRATの通信検知 : A RAT detection method by using packet entropy on early intrusion stage; エントロピー オ トクチョウ ト シテ モチイタ ショキ センニュウ ダンカイ ニ オケル RAT ノ ツウシン ケンチ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/11551

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

宇野, 真純. “エントロピーを特徴として用いた初期潜入段階におけるRATの通信検知 : A RAT detection method by using packet entropy on early intrusion stage; エントロピー オ トクチョウ ト シテ モチイタ ショキ センニュウ ダンカイ ニ オケル RAT ノ ツウシン ケンチ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed October 25, 2020. http://hdl.handle.net/10061/11551.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

宇野, 真純. “エントロピーを特徴として用いた初期潜入段階におけるRATの通信検知 : A RAT detection method by using packet entropy on early intrusion stage; エントロピー オ トクチョウ ト シテ モチイタ ショキ センニュウ ダンカイ ニ オケル RAT ノ ツウシン ケンチ.” Web. 25 Oct 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

宇野 . エントロピーを特徴として用いた初期潜入段階におけるRATの通信検知 : A RAT detection method by using packet entropy on early intrusion stage; エントロピー オ トクチョウ ト シテ モチイタ ショキ センニュウ ダンカイ ニ オケル RAT ノ ツウシン ケンチ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2020 Oct 25]. Available from: http://hdl.handle.net/10061/11551.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

宇野 . エントロピーを特徴として用いた初期潜入段階におけるRATの通信検知 : A RAT detection method by using packet entropy on early intrusion stage; エントロピー オ トクチョウ ト シテ モチイタ ショキ センニュウ ダンカイ ニ オケル RAT ノ ツウシン ケンチ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/11551

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

11. Jason Haydaman. Application of machine learning to computer network security.

Degree: Electrical and Computer Engineering, 2017, University of Manitoba

 Computer Security covers a wide array of topics, with much of the development in the field happening outside academia. We look at intrusion detection, and… (more)

Subjects/Keywords: Machine learning; Computer network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Haydaman, J. (2017). Application of machine learning to computer network security. (Masters Thesis). University of Manitoba. Retrieved from http://hdl.handle.net/1993/32543

Chicago Manual of Style (16th Edition):

Haydaman, Jason. “Application of machine learning to computer network security.” 2017. Masters Thesis, University of Manitoba. Accessed October 25, 2020. http://hdl.handle.net/1993/32543.

MLA Handbook (7th Edition):

Haydaman, Jason. “Application of machine learning to computer network security.” 2017. Web. 25 Oct 2020.

Vancouver:

Haydaman J. Application of machine learning to computer network security. [Internet] [Masters thesis]. University of Manitoba; 2017. [cited 2020 Oct 25]. Available from: http://hdl.handle.net/1993/32543.

Council of Science Editors:

Haydaman J. Application of machine learning to computer network security. [Masters Thesis]. University of Manitoba; 2017. Available from: http://hdl.handle.net/1993/32543


University of Technology, Sydney

12. Yu, D. Generic benchmarking for application specific wireless sensor networks multi criteria performance.

Degree: 2012, University of Technology, Sydney

 Due to stringent energy constraint and demand for performance requirement, a generic architecture like TCP/IP or Internet is not feasible with sensors used across various… (more)

Subjects/Keywords: Wireless sensor network.; Evaluation.; Security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, D. (2012). Generic benchmarking for application specific wireless sensor networks multi criteria performance. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/21812

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu, D. “Generic benchmarking for application specific wireless sensor networks multi criteria performance.” 2012. Thesis, University of Technology, Sydney. Accessed October 25, 2020. http://hdl.handle.net/10453/21812.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu, D. “Generic benchmarking for application specific wireless sensor networks multi criteria performance.” 2012. Web. 25 Oct 2020.

Vancouver:

Yu D. Generic benchmarking for application specific wireless sensor networks multi criteria performance. [Internet] [Thesis]. University of Technology, Sydney; 2012. [cited 2020 Oct 25]. Available from: http://hdl.handle.net/10453/21812.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu D. Generic benchmarking for application specific wireless sensor networks multi criteria performance. [Thesis]. University of Technology, Sydney; 2012. Available from: http://hdl.handle.net/10453/21812

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Windsor

13. Zhao, Shushan. ISSUES AND SOLUTIONS OF APPLYING IDENTITY-BASED CRYPTOGRAPHY TO MOBILE AD-HOC NETWORKS.

Degree: PhD, Computer Science, 2012, University of Windsor

 Concept of Mobile Ad-hoc Networks (MANETs) was brought up a few decades ago with assumed prosperous future. Unfortunately, we do not see many practical applications… (more)

Subjects/Keywords: ad-hoc network; cryptography; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhao, S. (2012). ISSUES AND SOLUTIONS OF APPLYING IDENTITY-BASED CRYPTOGRAPHY TO MOBILE AD-HOC NETWORKS. (Doctoral Dissertation). University of Windsor. Retrieved from https://scholar.uwindsor.ca/etd/5414

Chicago Manual of Style (16th Edition):

Zhao, Shushan. “ISSUES AND SOLUTIONS OF APPLYING IDENTITY-BASED CRYPTOGRAPHY TO MOBILE AD-HOC NETWORKS.” 2012. Doctoral Dissertation, University of Windsor. Accessed October 25, 2020. https://scholar.uwindsor.ca/etd/5414.

MLA Handbook (7th Edition):

Zhao, Shushan. “ISSUES AND SOLUTIONS OF APPLYING IDENTITY-BASED CRYPTOGRAPHY TO MOBILE AD-HOC NETWORKS.” 2012. Web. 25 Oct 2020.

Vancouver:

Zhao S. ISSUES AND SOLUTIONS OF APPLYING IDENTITY-BASED CRYPTOGRAPHY TO MOBILE AD-HOC NETWORKS. [Internet] [Doctoral dissertation]. University of Windsor; 2012. [cited 2020 Oct 25]. Available from: https://scholar.uwindsor.ca/etd/5414.

Council of Science Editors:

Zhao S. ISSUES AND SOLUTIONS OF APPLYING IDENTITY-BASED CRYPTOGRAPHY TO MOBILE AD-HOC NETWORKS. [Doctoral Dissertation]. University of Windsor; 2012. Available from: https://scholar.uwindsor.ca/etd/5414


University of Waterloo

14. Zhang, Kuan. Security and Privacy for Mobile Social Networks.

Degree: 2016, University of Waterloo

 With the ever-increasing demands of people's social interactions, traditional online social networking applications are being shifted to the mobile ones, enabling users' social networking and… (more)

Subjects/Keywords: Mobile social network; Security; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, K. (2016). Security and Privacy for Mobile Social Networks. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/10418

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Kuan. “Security and Privacy for Mobile Social Networks.” 2016. Thesis, University of Waterloo. Accessed October 25, 2020. http://hdl.handle.net/10012/10418.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Kuan. “Security and Privacy for Mobile Social Networks.” 2016. Web. 25 Oct 2020.

Vancouver:

Zhang K. Security and Privacy for Mobile Social Networks. [Internet] [Thesis]. University of Waterloo; 2016. [cited 2020 Oct 25]. Available from: http://hdl.handle.net/10012/10418.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang K. Security and Privacy for Mobile Social Networks. [Thesis]. University of Waterloo; 2016. Available from: http://hdl.handle.net/10012/10418

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Louisiana State University

15. Koopari Roopkumar, Bharath Kumar. Ethical Hacking Using Penetration Testing.

Degree: MS, Electrical and Computer Engineering, 2014, Louisiana State University

 This thesis provides details of the hardware architecture and the software scripting, which are employed to demonstrate penetration testing in a laboratory setup. The architecture… (more)

Subjects/Keywords: penetration testing; network security; hacking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koopari Roopkumar, B. K. (2014). Ethical Hacking Using Penetration Testing. (Masters Thesis). Louisiana State University. Retrieved from etd-11072014-122259 ; https://digitalcommons.lsu.edu/gradschool_theses/3238

Chicago Manual of Style (16th Edition):

Koopari Roopkumar, Bharath Kumar. “Ethical Hacking Using Penetration Testing.” 2014. Masters Thesis, Louisiana State University. Accessed October 25, 2020. etd-11072014-122259 ; https://digitalcommons.lsu.edu/gradschool_theses/3238.

MLA Handbook (7th Edition):

Koopari Roopkumar, Bharath Kumar. “Ethical Hacking Using Penetration Testing.” 2014. Web. 25 Oct 2020.

Vancouver:

Koopari Roopkumar BK. Ethical Hacking Using Penetration Testing. [Internet] [Masters thesis]. Louisiana State University; 2014. [cited 2020 Oct 25]. Available from: etd-11072014-122259 ; https://digitalcommons.lsu.edu/gradschool_theses/3238.

Council of Science Editors:

Koopari Roopkumar BK. Ethical Hacking Using Penetration Testing. [Masters Thesis]. Louisiana State University; 2014. Available from: etd-11072014-122259 ; https://digitalcommons.lsu.edu/gradschool_theses/3238


Virginia Tech

16. Groat, Stephen Lawrence. Privacy and Security in IPv6 Addressing.

Degree: MS, Electrical and Computer Engineering, 2011, Virginia Tech

 Due to an exponentially larger address space than Internet Protocol version 4 (IPv4), the Internet Protocol version 6 (IPv6) uses new methods to assign network(more)

Subjects/Keywords: Security; Network Addressing; Privacy; Pv6

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Groat, S. L. (2011). Privacy and Security in IPv6 Addressing. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/76978

Chicago Manual of Style (16th Edition):

Groat, Stephen Lawrence. “Privacy and Security in IPv6 Addressing.” 2011. Masters Thesis, Virginia Tech. Accessed October 25, 2020. http://hdl.handle.net/10919/76978.

MLA Handbook (7th Edition):

Groat, Stephen Lawrence. “Privacy and Security in IPv6 Addressing.” 2011. Web. 25 Oct 2020.

Vancouver:

Groat SL. Privacy and Security in IPv6 Addressing. [Internet] [Masters thesis]. Virginia Tech; 2011. [cited 2020 Oct 25]. Available from: http://hdl.handle.net/10919/76978.

Council of Science Editors:

Groat SL. Privacy and Security in IPv6 Addressing. [Masters Thesis]. Virginia Tech; 2011. Available from: http://hdl.handle.net/10919/76978


University of Texas – Austin

17. Chen, Chia-Ju. Statistical analysis of identity risk of exposure and cost using the ecosystem of identity attributes.

Degree: MSin Engineering, Electrical and Computer Engineering, 2019, University of Texas – Austin

 Personally Identifiable Information (PII) is often called the "currency of the Internet" as identity assets are collected, shared, sold, and used for almost every transaction… (more)

Subjects/Keywords: Security; Social network analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, C. (2019). Statistical analysis of identity risk of exposure and cost using the ecosystem of identity attributes. (Masters Thesis). University of Texas – Austin. Retrieved from http://dx.doi.org/10.26153/tsw/7425

Chicago Manual of Style (16th Edition):

Chen, Chia-Ju. “Statistical analysis of identity risk of exposure and cost using the ecosystem of identity attributes.” 2019. Masters Thesis, University of Texas – Austin. Accessed October 25, 2020. http://dx.doi.org/10.26153/tsw/7425.

MLA Handbook (7th Edition):

Chen, Chia-Ju. “Statistical analysis of identity risk of exposure and cost using the ecosystem of identity attributes.” 2019. Web. 25 Oct 2020.

Vancouver:

Chen C. Statistical analysis of identity risk of exposure and cost using the ecosystem of identity attributes. [Internet] [Masters thesis]. University of Texas – Austin; 2019. [cited 2020 Oct 25]. Available from: http://dx.doi.org/10.26153/tsw/7425.

Council of Science Editors:

Chen C. Statistical analysis of identity risk of exposure and cost using the ecosystem of identity attributes. [Masters Thesis]. University of Texas – Austin; 2019. Available from: http://dx.doi.org/10.26153/tsw/7425


Oklahoma State University

18. Koskei, Jordan Kiprop. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.

Degree: Computer Science Department, 2011, Oklahoma State University

 Currently deployed intrusion detection systems (IDS) have no capacity to discover attacker high level intentions. Understanding an intruder's intention greatly enhances network security as it… (more)

Subjects/Keywords: intrusion detection; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koskei, J. K. (2011). Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Koskei, Jordan Kiprop. “Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.” 2011. Thesis, Oklahoma State University. Accessed October 25, 2020. http://hdl.handle.net/11244/8184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Koskei, Jordan Kiprop. “Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models.” 2011. Web. 25 Oct 2020.

Vancouver:

Koskei JK. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2020 Oct 25]. Available from: http://hdl.handle.net/11244/8184.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Koskei JK. Attacker Intention Discovery Layer for Intrusion Detection Systems Using Hidden Markov Models. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8184

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Princeton University

19. Sun, Yixin. Enhancing Anonymity Systems under Network and User Dynamics .

Degree: PhD, 2020, Princeton University

 Privacy on the Internet is eroding rapidly. Anonymity systems have been designed to protect the identity and privacy of users from untrusted destinations and third… (more)

Subjects/Keywords: Anonymity; Network Privacy; Routing security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, Y. (2020). Enhancing Anonymity Systems under Network and User Dynamics . (Doctoral Dissertation). Princeton University. Retrieved from http://arks.princeton.edu/ark:/88435/dsp01z316q454h

Chicago Manual of Style (16th Edition):

Sun, Yixin. “Enhancing Anonymity Systems under Network and User Dynamics .” 2020. Doctoral Dissertation, Princeton University. Accessed October 25, 2020. http://arks.princeton.edu/ark:/88435/dsp01z316q454h.

MLA Handbook (7th Edition):

Sun, Yixin. “Enhancing Anonymity Systems under Network and User Dynamics .” 2020. Web. 25 Oct 2020.

Vancouver:

Sun Y. Enhancing Anonymity Systems under Network and User Dynamics . [Internet] [Doctoral dissertation]. Princeton University; 2020. [cited 2020 Oct 25]. Available from: http://arks.princeton.edu/ark:/88435/dsp01z316q454h.

Council of Science Editors:

Sun Y. Enhancing Anonymity Systems under Network and User Dynamics . [Doctoral Dissertation]. Princeton University; 2020. Available from: http://arks.princeton.edu/ark:/88435/dsp01z316q454h

20. Wu, Ben. Physical Layer Security Based on Optical Steganography and Optical Encryption .

Degree: PhD, 2015, Princeton University

 The communication network has experienced enormous growth in the past few decades. The growth of communication network requires the data to be transmitted at a… (more)

Subjects/Keywords: Fiber-optic communication; Network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, B. (2015). Physical Layer Security Based on Optical Steganography and Optical Encryption . (Doctoral Dissertation). Princeton University. Retrieved from http://arks.princeton.edu/ark:/88435/dsp01pv63g2566

Chicago Manual of Style (16th Edition):

Wu, Ben. “Physical Layer Security Based on Optical Steganography and Optical Encryption .” 2015. Doctoral Dissertation, Princeton University. Accessed October 25, 2020. http://arks.princeton.edu/ark:/88435/dsp01pv63g2566.

MLA Handbook (7th Edition):

Wu, Ben. “Physical Layer Security Based on Optical Steganography and Optical Encryption .” 2015. Web. 25 Oct 2020.

Vancouver:

Wu B. Physical Layer Security Based on Optical Steganography and Optical Encryption . [Internet] [Doctoral dissertation]. Princeton University; 2015. [cited 2020 Oct 25]. Available from: http://arks.princeton.edu/ark:/88435/dsp01pv63g2566.

Council of Science Editors:

Wu B. Physical Layer Security Based on Optical Steganography and Optical Encryption . [Doctoral Dissertation]. Princeton University; 2015. Available from: http://arks.princeton.edu/ark:/88435/dsp01pv63g2566


Georgia Tech

21. Formby, David. Network based fingerprinting techniques for industrial control systems.

Degree: PhD, Electrical and Computer Engineering, 2017, Georgia Tech

 Fingerprinting techniques operating over the network are proposed to identify various aspects of industrial control systems (ICSs) including software, hardware, and physical devices. First, a… (more)

Subjects/Keywords: Network security; Industrial control systems; Network characterization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Formby, D. (2017). Network based fingerprinting techniques for industrial control systems. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/60668

Chicago Manual of Style (16th Edition):

Formby, David. “Network based fingerprinting techniques for industrial control systems.” 2017. Doctoral Dissertation, Georgia Tech. Accessed October 25, 2020. http://hdl.handle.net/1853/60668.

MLA Handbook (7th Edition):

Formby, David. “Network based fingerprinting techniques for industrial control systems.” 2017. Web. 25 Oct 2020.

Vancouver:

Formby D. Network based fingerprinting techniques for industrial control systems. [Internet] [Doctoral dissertation]. Georgia Tech; 2017. [cited 2020 Oct 25]. Available from: http://hdl.handle.net/1853/60668.

Council of Science Editors:

Formby D. Network based fingerprinting techniques for industrial control systems. [Doctoral Dissertation]. Georgia Tech; 2017. Available from: http://hdl.handle.net/1853/60668


University of North Texas

22. Ganduri, Rajasekhar. Network Security Tool for a Novice.

Degree: 2016, University of North Texas

Network security is a complex field that is handled by security professionals who need certain expertise and experience to configure security systems. With the ever… (more)

Subjects/Keywords: Network Security; Cloud Computing; OpenStack; Network Security Functions

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ganduri, R. (2016). Network Security Tool for a Novice. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc862873/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ganduri, Rajasekhar. “Network Security Tool for a Novice.” 2016. Thesis, University of North Texas. Accessed October 25, 2020. https://digital.library.unt.edu/ark:/67531/metadc862873/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ganduri, Rajasekhar. “Network Security Tool for a Novice.” 2016. Web. 25 Oct 2020.

Vancouver:

Ganduri R. Network Security Tool for a Novice. [Internet] [Thesis]. University of North Texas; 2016. [cited 2020 Oct 25]. Available from: https://digital.library.unt.edu/ark:/67531/metadc862873/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ganduri R. Network Security Tool for a Novice. [Thesis]. University of North Texas; 2016. Available from: https://digital.library.unt.edu/ark:/67531/metadc862873/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Louisiana State University

23. Davis, Sarah. Cyber-Physical Security Strategies.

Degree: MSEE, Electrical and Computer Engineering, 2014, Louisiana State University

 Cyber-physical security describes the protection of systems with close relationships between computational functions and physical ones and addresses the issue of vulnerability to attack through… (more)

Subjects/Keywords: cyber-physical security; control sytem security; sensor network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Davis, S. (2014). Cyber-Physical Security Strategies. (Masters Thesis). Louisiana State University. Retrieved from etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147

Chicago Manual of Style (16th Edition):

Davis, Sarah. “Cyber-Physical Security Strategies.” 2014. Masters Thesis, Louisiana State University. Accessed October 25, 2020. etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147.

MLA Handbook (7th Edition):

Davis, Sarah. “Cyber-Physical Security Strategies.” 2014. Web. 25 Oct 2020.

Vancouver:

Davis S. Cyber-Physical Security Strategies. [Internet] [Masters thesis]. Louisiana State University; 2014. [cited 2020 Oct 25]. Available from: etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147.

Council of Science Editors:

Davis S. Cyber-Physical Security Strategies. [Masters Thesis]. Louisiana State University; 2014. Available from: etd-04072014-162250 ; https://digitalcommons.lsu.edu/gradschool_theses/1147


University of Canterbury

24. Hong, Jin Bum. Scalable and adaptable security modelling and analysis.

Degree: PhD, Computer Science, 2015, University of Canterbury

 Modern networked systems are complex in such a way that assessing the security of them is a difficult task. Security models are widely used to… (more)

Subjects/Keywords: adaptability; network security; scalability; security analysis; security modelling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hong, J. B. (2015). Scalable and adaptable security modelling and analysis. (Doctoral Dissertation). University of Canterbury. Retrieved from http://dx.doi.org/10.26021/2743

Chicago Manual of Style (16th Edition):

Hong, Jin Bum. “Scalable and adaptable security modelling and analysis.” 2015. Doctoral Dissertation, University of Canterbury. Accessed October 25, 2020. http://dx.doi.org/10.26021/2743.

MLA Handbook (7th Edition):

Hong, Jin Bum. “Scalable and adaptable security modelling and analysis.” 2015. Web. 25 Oct 2020.

Vancouver:

Hong JB. Scalable and adaptable security modelling and analysis. [Internet] [Doctoral dissertation]. University of Canterbury; 2015. [cited 2020 Oct 25]. Available from: http://dx.doi.org/10.26021/2743.

Council of Science Editors:

Hong JB. Scalable and adaptable security modelling and analysis. [Doctoral Dissertation]. University of Canterbury; 2015. Available from: http://dx.doi.org/10.26021/2743


University of Newcastle

25. Karmakar , Kallol Krishna. Techniques for securing software defined networks and services.

Degree: PhD, 2019, University of Newcastle

Research Doctorate - Doctor of Philosophy (PhD)

Software Defined Network (SDN) is rapidly developing to be a disruptive technology in the world of networking. It… (more)

Subjects/Keywords: software defined network security; policy-based network security; security architecture; SDN attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Karmakar , K. K. (2019). Techniques for securing software defined networks and services. (Doctoral Dissertation). University of Newcastle. Retrieved from http://hdl.handle.net/1959.13/1408434

Chicago Manual of Style (16th Edition):

Karmakar , Kallol Krishna. “Techniques for securing software defined networks and services.” 2019. Doctoral Dissertation, University of Newcastle. Accessed October 25, 2020. http://hdl.handle.net/1959.13/1408434.

MLA Handbook (7th Edition):

Karmakar , Kallol Krishna. “Techniques for securing software defined networks and services.” 2019. Web. 25 Oct 2020.

Vancouver:

Karmakar KK. Techniques for securing software defined networks and services. [Internet] [Doctoral dissertation]. University of Newcastle; 2019. [cited 2020 Oct 25]. Available from: http://hdl.handle.net/1959.13/1408434.

Council of Science Editors:

Karmakar KK. Techniques for securing software defined networks and services. [Doctoral Dissertation]. University of Newcastle; 2019. Available from: http://hdl.handle.net/1959.13/1408434

26. Viduto, Valentina. A risk assessment and optimisation model for minimising network security risk and cost.

Degree: PhD, 2012, University of Bedfordshire

Network security risk analysis has received great attention within the scientific community, due to the current proliferation of network attacks and threats. Although, considerable effort… (more)

Subjects/Keywords: 005.8; G420 Networks and Communications; network security risk analysis; computer security; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Viduto, V. (2012). A risk assessment and optimisation model for minimising network security risk and cost. (Doctoral Dissertation). University of Bedfordshire. Retrieved from http://hdl.handle.net/10547/270440

Chicago Manual of Style (16th Edition):

Viduto, Valentina. “A risk assessment and optimisation model for minimising network security risk and cost.” 2012. Doctoral Dissertation, University of Bedfordshire. Accessed October 25, 2020. http://hdl.handle.net/10547/270440.

MLA Handbook (7th Edition):

Viduto, Valentina. “A risk assessment and optimisation model for minimising network security risk and cost.” 2012. Web. 25 Oct 2020.

Vancouver:

Viduto V. A risk assessment and optimisation model for minimising network security risk and cost. [Internet] [Doctoral dissertation]. University of Bedfordshire; 2012. [cited 2020 Oct 25]. Available from: http://hdl.handle.net/10547/270440.

Council of Science Editors:

Viduto V. A risk assessment and optimisation model for minimising network security risk and cost. [Doctoral Dissertation]. University of Bedfordshire; 2012. Available from: http://hdl.handle.net/10547/270440


University of Pretoria

27. [No author]. Link layer topology discovery in an uncooperative ethernet environment .

Degree: 2008, University of Pretoria

 Knowledge of a network’s entities and the physical connections between them, a network’s physical topology, can be useful in a variety of network scenarios and… (more)

Subjects/Keywords: Network management; Ethernet; Network security; Network topology discovery; Network mapping; Network monitoring; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2008). Link layer topology discovery in an uncooperative ethernet environment . (Masters Thesis). University of Pretoria. Retrieved from http://upetd.up.ac.za/thesis/available/etd-08272008-161605/

Chicago Manual of Style (16th Edition):

author], [No. “Link layer topology discovery in an uncooperative ethernet environment .” 2008. Masters Thesis, University of Pretoria. Accessed October 25, 2020. http://upetd.up.ac.za/thesis/available/etd-08272008-161605/.

MLA Handbook (7th Edition):

author], [No. “Link layer topology discovery in an uncooperative ethernet environment .” 2008. Web. 25 Oct 2020.

Vancouver:

author] [. Link layer topology discovery in an uncooperative ethernet environment . [Internet] [Masters thesis]. University of Pretoria; 2008. [cited 2020 Oct 25]. Available from: http://upetd.up.ac.za/thesis/available/etd-08272008-161605/.

Council of Science Editors:

author] [. Link layer topology discovery in an uncooperative ethernet environment . [Masters Thesis]. University of Pretoria; 2008. Available from: http://upetd.up.ac.za/thesis/available/etd-08272008-161605/


University of Pretoria

28. Delport, Johannes Petrus. Link layer topology discovery in an uncooperative ethernet environment.

Degree: Computer Science, 2008, University of Pretoria

 Knowledge of a network’s entities and the physical connections between them, a network’s physical topology, can be useful in a variety of network scenarios and… (more)

Subjects/Keywords: Network management; Ethernet; Network security; Network topology discovery; Network mapping; Network monitoring; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Delport, J. (2008). Link layer topology discovery in an uncooperative ethernet environment. (Masters Thesis). University of Pretoria. Retrieved from http://hdl.handle.net/2263/27589

Chicago Manual of Style (16th Edition):

Delport, Johannes. “Link layer topology discovery in an uncooperative ethernet environment.” 2008. Masters Thesis, University of Pretoria. Accessed October 25, 2020. http://hdl.handle.net/2263/27589.

MLA Handbook (7th Edition):

Delport, Johannes. “Link layer topology discovery in an uncooperative ethernet environment.” 2008. Web. 25 Oct 2020.

Vancouver:

Delport J. Link layer topology discovery in an uncooperative ethernet environment. [Internet] [Masters thesis]. University of Pretoria; 2008. [cited 2020 Oct 25]. Available from: http://hdl.handle.net/2263/27589.

Council of Science Editors:

Delport J. Link layer topology discovery in an uncooperative ethernet environment. [Masters Thesis]. University of Pretoria; 2008. Available from: http://hdl.handle.net/2263/27589


University of Bradford

29. Miskeen, Guzlan Mohamed Alzaroug. Performance and security trade-offs in high-speed networks : an investigation into the performance and security modelling and evaluation of high-speed networks based on the quantitative analysis and experimentation of queueing networks and generalised stochastic Petri nets.

Degree: PhD, 2013, University of Bradford

 Most used security mechanisms in high-speed networks have been adopted without adequate quantification of their impact on performance degradation. Appropriate quantitative network models may be… (more)

Subjects/Keywords: 004; Performance; Security; High-speed network; Queueing network; Generalised stochastic; Petri net; Network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Miskeen, G. M. A. (2013). Performance and security trade-offs in high-speed networks : an investigation into the performance and security modelling and evaluation of high-speed networks based on the quantitative analysis and experimentation of queueing networks and generalised stochastic Petri nets. (Doctoral Dissertation). University of Bradford. Retrieved from http://hdl.handle.net/10454/6362

Chicago Manual of Style (16th Edition):

Miskeen, Guzlan Mohamed Alzaroug. “Performance and security trade-offs in high-speed networks : an investigation into the performance and security modelling and evaluation of high-speed networks based on the quantitative analysis and experimentation of queueing networks and generalised stochastic Petri nets.” 2013. Doctoral Dissertation, University of Bradford. Accessed October 25, 2020. http://hdl.handle.net/10454/6362.

MLA Handbook (7th Edition):

Miskeen, Guzlan Mohamed Alzaroug. “Performance and security trade-offs in high-speed networks : an investigation into the performance and security modelling and evaluation of high-speed networks based on the quantitative analysis and experimentation of queueing networks and generalised stochastic Petri nets.” 2013. Web. 25 Oct 2020.

Vancouver:

Miskeen GMA. Performance and security trade-offs in high-speed networks : an investigation into the performance and security modelling and evaluation of high-speed networks based on the quantitative analysis and experimentation of queueing networks and generalised stochastic Petri nets. [Internet] [Doctoral dissertation]. University of Bradford; 2013. [cited 2020 Oct 25]. Available from: http://hdl.handle.net/10454/6362.

Council of Science Editors:

Miskeen GMA. Performance and security trade-offs in high-speed networks : an investigation into the performance and security modelling and evaluation of high-speed networks based on the quantitative analysis and experimentation of queueing networks and generalised stochastic Petri nets. [Doctoral Dissertation]. University of Bradford; 2013. Available from: http://hdl.handle.net/10454/6362


Kansas State University

30. Zhuang, Rui. A theory for understanding and quantifying moving target defense.

Degree: PhD, Computing and Information Sciences, 2015, Kansas State University

 The static nature of cyber systems gives attackers a valuable and asymmetric advantage - time. To eliminate this asymmetric advantage, a new approach, called Moving… (more)

Subjects/Keywords: Moving Target Defense; Network Security; Computer Security; Science of Security; Cloud Security; Computer Science (0984)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhuang, R. (2015). A theory for understanding and quantifying moving target defense. (Doctoral Dissertation). Kansas State University. Retrieved from http://hdl.handle.net/2097/20525

Chicago Manual of Style (16th Edition):

Zhuang, Rui. “A theory for understanding and quantifying moving target defense.” 2015. Doctoral Dissertation, Kansas State University. Accessed October 25, 2020. http://hdl.handle.net/2097/20525.

MLA Handbook (7th Edition):

Zhuang, Rui. “A theory for understanding and quantifying moving target defense.” 2015. Web. 25 Oct 2020.

Vancouver:

Zhuang R. A theory for understanding and quantifying moving target defense. [Internet] [Doctoral dissertation]. Kansas State University; 2015. [cited 2020 Oct 25]. Available from: http://hdl.handle.net/2097/20525.

Council of Science Editors:

Zhuang R. A theory for understanding and quantifying moving target defense. [Doctoral Dissertation]. Kansas State University; 2015. Available from: http://hdl.handle.net/2097/20525

[1] [2] [3] [4] [5] … [39]

.