Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(physical security system). Showing records 1 – 30 of 46 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

Levels

▼ Search Limiters


Texas A&M University

1. Conchewski, Curtis. Physical Security System Sensitivity to DBT Perturbations.

Degree: MS, Nuclear Engineering, 2012, Texas A&M University

 This thesis examines how perturbing selected adversary capabilities in a design basis threat (DBT) may affect the assessment of a facility's security system performance. We… (more)

Subjects/Keywords: physical protection system; PPS; physical security system; design basis threat; DBT; nonproliferation; physical security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Conchewski, C. (2012). Physical Security System Sensitivity to DBT Perturbations. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2012-08-11753

Chicago Manual of Style (16th Edition):

Conchewski, Curtis. “Physical Security System Sensitivity to DBT Perturbations.” 2012. Masters Thesis, Texas A&M University. Accessed September 25, 2020. http://hdl.handle.net/1969.1/ETD-TAMU-2012-08-11753.

MLA Handbook (7th Edition):

Conchewski, Curtis. “Physical Security System Sensitivity to DBT Perturbations.” 2012. Web. 25 Sep 2020.

Vancouver:

Conchewski C. Physical Security System Sensitivity to DBT Perturbations. [Internet] [Masters thesis]. Texas A&M University; 2012. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2012-08-11753.

Council of Science Editors:

Conchewski C. Physical Security System Sensitivity to DBT Perturbations. [Masters Thesis]. Texas A&M University; 2012. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2012-08-11753


Texas State University – San Marcos

2. Siddique, Khan. A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks.

Degree: MS, Engineering, 2018, Texas State University – San Marcos

 Cyber-Physical Systems (CPS) is a term describing a broad range of complex, multi-disciplinary, physically-aware next generation engineered systems that integrate embedded computing technologies (cyber part)… (more)

Subjects/Keywords: Game theory; Cyber physical system; Cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Siddique, K. (2018). A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks. (Masters Thesis). Texas State University – San Marcos. Retrieved from https://digital.library.txstate.edu/handle/10877/9284

Chicago Manual of Style (16th Edition):

Siddique, Khan. “A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks.” 2018. Masters Thesis, Texas State University – San Marcos. Accessed September 25, 2020. https://digital.library.txstate.edu/handle/10877/9284.

MLA Handbook (7th Edition):

Siddique, Khan. “A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks.” 2018. Web. 25 Sep 2020.

Vancouver:

Siddique K. A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks. [Internet] [Masters thesis]. Texas State University – San Marcos; 2018. [cited 2020 Sep 25]. Available from: https://digital.library.txstate.edu/handle/10877/9284.

Council of Science Editors:

Siddique K. A Game Theoretic Framework to Secure Cyber Physical Systems (CPS) against Cyber Attacks. [Masters Thesis]. Texas State University – San Marcos; 2018. Available from: https://digital.library.txstate.edu/handle/10877/9284


Iowa State University

3. Al Ghazo, Alaa. A framework for Cybersecurity of Supervisory Control and Data Acquisition (SCADA) Systems and Industrial Control Systems (ICS).

Degree: 2020, Iowa State University

 The motivation behind this thesis is to provide an efficient and comprehensive solution to secure Supervisory Control and Data Acquisition (SCADA) systems and Industrial Control… (more)

Subjects/Keywords: Cyber security; Cyber-physical system; industrial control system; IoT; SCADA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Ghazo, A. (2020). A framework for Cybersecurity of Supervisory Control and Data Acquisition (SCADA) Systems and Industrial Control Systems (ICS). (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/17834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Al Ghazo, Alaa. “A framework for Cybersecurity of Supervisory Control and Data Acquisition (SCADA) Systems and Industrial Control Systems (ICS).” 2020. Thesis, Iowa State University. Accessed September 25, 2020. https://lib.dr.iastate.edu/etd/17834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Al Ghazo, Alaa. “A framework for Cybersecurity of Supervisory Control and Data Acquisition (SCADA) Systems and Industrial Control Systems (ICS).” 2020. Web. 25 Sep 2020.

Vancouver:

Al Ghazo A. A framework for Cybersecurity of Supervisory Control and Data Acquisition (SCADA) Systems and Industrial Control Systems (ICS). [Internet] [Thesis]. Iowa State University; 2020. [cited 2020 Sep 25]. Available from: https://lib.dr.iastate.edu/etd/17834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Al Ghazo A. A framework for Cybersecurity of Supervisory Control and Data Acquisition (SCADA) Systems and Industrial Control Systems (ICS). [Thesis]. Iowa State University; 2020. Available from: https://lib.dr.iastate.edu/etd/17834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

4. Guo, Pinyao. Detection and Prevention: Toward Secure Mobile Robotic Systems.

Degree: 2018, Penn State University

 Mobile robotic systems are widely deployed and are rapidly evolving in almost every aspect of the modern society, including household, entertainment, manufacturing, security and national… (more)

Subjects/Keywords: secure mobile robotic system; cyber-physical system security; intrusion detection; anomaly detection; vehicle security; robot security; intrusion prevention

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Guo, P. (2018). Detection and Prevention: Toward Secure Mobile Robotic Systems. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/15835pug132

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Guo, Pinyao. “Detection and Prevention: Toward Secure Mobile Robotic Systems.” 2018. Thesis, Penn State University. Accessed September 25, 2020. https://submit-etda.libraries.psu.edu/catalog/15835pug132.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Guo, Pinyao. “Detection and Prevention: Toward Secure Mobile Robotic Systems.” 2018. Web. 25 Sep 2020.

Vancouver:

Guo P. Detection and Prevention: Toward Secure Mobile Robotic Systems. [Internet] [Thesis]. Penn State University; 2018. [cited 2020 Sep 25]. Available from: https://submit-etda.libraries.psu.edu/catalog/15835pug132.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Guo P. Detection and Prevention: Toward Secure Mobile Robotic Systems. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/15835pug132

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Florida

5. Wang, Xiaolong. A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems.

Degree: 2018, University of South Florida

 Building Automation System (BAS) is a complex distributed control system that is widely deployed in commercial, residential, industrial buildings for monitoring and controlling mechanical/electrical equipment.… (more)

Subjects/Keywords: Cyber-Physical Systems; Distributed System; Embedded System; Internet of Things; System Security; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, X. (2018). A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems. (Thesis). University of South Florida. Retrieved from https://scholarcommons.usf.edu/etd/7589

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Xiaolong. “A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems.” 2018. Thesis, University of South Florida. Accessed September 25, 2020. https://scholarcommons.usf.edu/etd/7589.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Xiaolong. “A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems.” 2018. Web. 25 Sep 2020.

Vancouver:

Wang X. A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems. [Internet] [Thesis]. University of South Florida; 2018. [cited 2020 Sep 25]. Available from: https://scholarcommons.usf.edu/etd/7589.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang X. A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems. [Thesis]. University of South Florida; 2018. Available from: https://scholarcommons.usf.edu/etd/7589

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oregon State University

6. Patapanchala, Panini Sai. Exploring Security Metrics for Electric Grid Infrastructure Leveraging Attack Graphs.

Degree: MS, Computer Science, 2016, Oregon State University

 Electric grid is a critical cyber-physical infrastructure that serves as lifeline for modern society. With the increasing trend of cyber-attacks, electric grid security has become… (more)

Subjects/Keywords: cyber physical system; Cooperating objects (Computer systems)  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Patapanchala, P. S. (2016). Exploring Security Metrics for Electric Grid Infrastructure Leveraging Attack Graphs. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/59808

Chicago Manual of Style (16th Edition):

Patapanchala, Panini Sai. “Exploring Security Metrics for Electric Grid Infrastructure Leveraging Attack Graphs.” 2016. Masters Thesis, Oregon State University. Accessed September 25, 2020. http://hdl.handle.net/1957/59808.

MLA Handbook (7th Edition):

Patapanchala, Panini Sai. “Exploring Security Metrics for Electric Grid Infrastructure Leveraging Attack Graphs.” 2016. Web. 25 Sep 2020.

Vancouver:

Patapanchala PS. Exploring Security Metrics for Electric Grid Infrastructure Leveraging Attack Graphs. [Internet] [Masters thesis]. Oregon State University; 2016. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/1957/59808.

Council of Science Editors:

Patapanchala PS. Exploring Security Metrics for Electric Grid Infrastructure Leveraging Attack Graphs. [Masters Thesis]. Oregon State University; 2016. Available from: http://hdl.handle.net/1957/59808


University of Wisconsin – Milwaukee

7. Xiang, Yingmeng. Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems.

Degree: PhD, Engineering, 2017, University of Wisconsin – Milwaukee

  With the smart grid initiatives in recent years, the electric power grid is rapidly evolving into a complicated and interconnected cyber-physical system. Unfortunately, the… (more)

Subjects/Keywords: Cyber-physical System; Smart Grid Cyber Security; Electrical and Electronics; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xiang, Y. (2017). Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems. (Doctoral Dissertation). University of Wisconsin – Milwaukee. Retrieved from https://dc.uwm.edu/etd/1725

Chicago Manual of Style (16th Edition):

Xiang, Yingmeng. “Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems.” 2017. Doctoral Dissertation, University of Wisconsin – Milwaukee. Accessed September 25, 2020. https://dc.uwm.edu/etd/1725.

MLA Handbook (7th Edition):

Xiang, Yingmeng. “Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems.” 2017. Web. 25 Sep 2020.

Vancouver:

Xiang Y. Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems. [Internet] [Doctoral dissertation]. University of Wisconsin – Milwaukee; 2017. [cited 2020 Sep 25]. Available from: https://dc.uwm.edu/etd/1725.

Council of Science Editors:

Xiang Y. Reliability Evaluation and Defense Strategy Development for Cyber-physical Power Systems. [Doctoral Dissertation]. University of Wisconsin – Milwaukee; 2017. Available from: https://dc.uwm.edu/etd/1725


University of Victoria

8. Bao, Tingnan. Physical layer security in emerging wireless transmission systems.

Degree: Department of Electrical and Computer Engineering, 2020, University of Victoria

 Traditional cryptographic encryption techniques at higher layers require a certain form of information sharing between the transmitter and the legitimate user to achieve security. Besides,… (more)

Subjects/Keywords: physical layer security; deep learning; system performance analysis; UAV; beamforming

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bao, T. (2020). Physical layer security in emerging wireless transmission systems. (Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/11912

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bao, Tingnan. “Physical layer security in emerging wireless transmission systems.” 2020. Thesis, University of Victoria. Accessed September 25, 2020. http://hdl.handle.net/1828/11912.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bao, Tingnan. “Physical layer security in emerging wireless transmission systems.” 2020. Web. 25 Sep 2020.

Vancouver:

Bao T. Physical layer security in emerging wireless transmission systems. [Internet] [Thesis]. University of Victoria; 2020. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/1828/11912.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bao T. Physical layer security in emerging wireless transmission systems. [Thesis]. University of Victoria; 2020. Available from: http://hdl.handle.net/1828/11912

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

9. Moravec, Lukáš. Management zabezpečovacího systému firmy: Security System Management of the Company.

Degree: 2018, Brno University of Technology

 This master thesis deals with the design of complex security system for company area with using PZTS and CCTV system. The thesis is divided into… (more)

Subjects/Keywords: Zabezpečovací systém; Kamerový systém; Management bezpečnosti; Fyzická bezpečnost; Kamera; Detektor; Čidlo; Prostorová a perimetrická ochrana; Security system; CCTV system; Security management; Physical security; Camera; Detector; Sensor; Space and perimeter protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moravec, L. (2018). Management zabezpečovacího systému firmy: Security System Management of the Company. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/59489

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Moravec, Lukáš. “Management zabezpečovacího systému firmy: Security System Management of the Company.” 2018. Thesis, Brno University of Technology. Accessed September 25, 2020. http://hdl.handle.net/11012/59489.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Moravec, Lukáš. “Management zabezpečovacího systému firmy: Security System Management of the Company.” 2018. Web. 25 Sep 2020.

Vancouver:

Moravec L. Management zabezpečovacího systému firmy: Security System Management of the Company. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/11012/59489.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Moravec L. Management zabezpečovacího systému firmy: Security System Management of the Company. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/59489

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Utah State University

10. Taheri, Shayan. Evaluation of Tracking Regimes for, and Security of, PLI Systems.

Degree: MS, Electrical and Computer Engineering, 2015, Utah State University

  In the area of computer and network security, due to the insufficiency, high costs, and user-unfriendliness of existing defending methods against a number of… (more)

Subjects/Keywords: cyber attacks; security improvement; Physical Layer Identification; PLI; tracking system; Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Taheri, S. (2015). Evaluation of Tracking Regimes for, and Security of, PLI Systems. (Masters Thesis). Utah State University. Retrieved from https://digitalcommons.usu.edu/etd/4549

Chicago Manual of Style (16th Edition):

Taheri, Shayan. “Evaluation of Tracking Regimes for, and Security of, PLI Systems.” 2015. Masters Thesis, Utah State University. Accessed September 25, 2020. https://digitalcommons.usu.edu/etd/4549.

MLA Handbook (7th Edition):

Taheri, Shayan. “Evaluation of Tracking Regimes for, and Security of, PLI Systems.” 2015. Web. 25 Sep 2020.

Vancouver:

Taheri S. Evaluation of Tracking Regimes for, and Security of, PLI Systems. [Internet] [Masters thesis]. Utah State University; 2015. [cited 2020 Sep 25]. Available from: https://digitalcommons.usu.edu/etd/4549.

Council of Science Editors:

Taheri S. Evaluation of Tracking Regimes for, and Security of, PLI Systems. [Masters Thesis]. Utah State University; 2015. Available from: https://digitalcommons.usu.edu/etd/4549


Texas A&M University

11. Liu, Shan. Coordinated Variable Structure Switching Attacks for Smart Grid.

Degree: PhD, Electrical Engineering, 2013, Texas A&M University

 The effective modeling and analysis of large-scale power system disturbances especially those stemming from intentional attack represents an open engineering and research problem. Challenges stem… (more)

Subjects/Keywords: coordinated switching attacks; power system attacks; cyber security; smart grid modeling; variable structure systems; cyber-physical system theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, S. (2013). Coordinated Variable Structure Switching Attacks for Smart Grid. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/149223

Chicago Manual of Style (16th Edition):

Liu, Shan. “Coordinated Variable Structure Switching Attacks for Smart Grid.” 2013. Doctoral Dissertation, Texas A&M University. Accessed September 25, 2020. http://hdl.handle.net/1969.1/149223.

MLA Handbook (7th Edition):

Liu, Shan. “Coordinated Variable Structure Switching Attacks for Smart Grid.” 2013. Web. 25 Sep 2020.

Vancouver:

Liu S. Coordinated Variable Structure Switching Attacks for Smart Grid. [Internet] [Doctoral dissertation]. Texas A&M University; 2013. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/1969.1/149223.

Council of Science Editors:

Liu S. Coordinated Variable Structure Switching Attacks for Smart Grid. [Doctoral Dissertation]. Texas A&M University; 2013. Available from: http://hdl.handle.net/1969.1/149223

12. Virtnik, Saša. Varnost zaposlenih na Zavarovalnici Maribor d.d. : magistrsko delo.

Degree: 2013, Univerza v Mariboru

Varnost je vrednota, ki ima nešteto pomenov. Je ključna sestavina našega življenja in bivanja v okolju kjer živimo. Vsak človek različno dojema varnost. Nekaterim pomeni… (more)

Subjects/Keywords: gospodarske družbe; varnost; ogroženost; zaposleni; fizično varovanje; tehnično varovanje; magistrska dela; security; security as human need; security system; security policy; security function; security concept; physical and technical security;

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Virtnik, S. (2013). Varnost zaposlenih na Zavarovalnici Maribor d.d. : magistrsko delo. (Masters Thesis). Univerza v Mariboru. Retrieved from https://dk.um.si/IzpisGradiva.php?id=39916 ; https://dk.um.si/Dokument.php?id=54307&dn= ; https://plus.si.cobiss.net/opac7/bib/2573546?lang=sl

Chicago Manual of Style (16th Edition):

Virtnik, Saša. “Varnost zaposlenih na Zavarovalnici Maribor d.d. : magistrsko delo.” 2013. Masters Thesis, Univerza v Mariboru. Accessed September 25, 2020. https://dk.um.si/IzpisGradiva.php?id=39916 ; https://dk.um.si/Dokument.php?id=54307&dn= ; https://plus.si.cobiss.net/opac7/bib/2573546?lang=sl.

MLA Handbook (7th Edition):

Virtnik, Saša. “Varnost zaposlenih na Zavarovalnici Maribor d.d. : magistrsko delo.” 2013. Web. 25 Sep 2020.

Vancouver:

Virtnik S. Varnost zaposlenih na Zavarovalnici Maribor d.d. : magistrsko delo. [Internet] [Masters thesis]. Univerza v Mariboru; 2013. [cited 2020 Sep 25]. Available from: https://dk.um.si/IzpisGradiva.php?id=39916 ; https://dk.um.si/Dokument.php?id=54307&dn= ; https://plus.si.cobiss.net/opac7/bib/2573546?lang=sl.

Council of Science Editors:

Virtnik S. Varnost zaposlenih na Zavarovalnici Maribor d.d. : magistrsko delo. [Masters Thesis]. Univerza v Mariboru; 2013. Available from: https://dk.um.si/IzpisGradiva.php?id=39916 ; https://dk.um.si/Dokument.php?id=54307&dn= ; https://plus.si.cobiss.net/opac7/bib/2573546?lang=sl


Brno University of Technology

13. Hajný, Jiří. Management informační bezpečnosti ve zdravotnickém zařízení: Information Security Management in Healthcare Organization.

Degree: 2019, Brno University of Technology

 The diploma thesis focuses on implementation and deployment of information security management system (ISMS) into healthcare organizations. Specifies what is required to include in this… (more)

Subjects/Keywords: systém řízení bezpečnosti informací; ISMS; zdravotnická bezpečnost; analýza rizik; bezpečnost lidských zdrojů; fyzická bezpečnost; bezpečnost ICT; bezpečnostní směrnice; zákon o kybernetické bezpečnosti; information security management system; ISMS; health security; risk analysis; personal security; physical security; ICT security; safety guidelines; law on cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hajný, J. (2019). Management informační bezpečnosti ve zdravotnickém zařízení: Information Security Management in Healthcare Organization. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/32417

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hajný, Jiří. “Management informační bezpečnosti ve zdravotnickém zařízení: Information Security Management in Healthcare Organization.” 2019. Thesis, Brno University of Technology. Accessed September 25, 2020. http://hdl.handle.net/11012/32417.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hajný, Jiří. “Management informační bezpečnosti ve zdravotnickém zařízení: Information Security Management in Healthcare Organization.” 2019. Web. 25 Sep 2020.

Vancouver:

Hajný J. Management informační bezpečnosti ve zdravotnickém zařízení: Information Security Management in Healthcare Organization. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/11012/32417.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hajný J. Management informační bezpečnosti ve zdravotnickém zařízení: Information Security Management in Healthcare Organization. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/32417

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

14. Venugopalan, Vivek. Enhancing Trust in Reconfigurable Hardware Systems.

Degree: PhD, Electrical and Computer Engineering, 2017, Virginia Tech

 A Cyber-Physical System (CPS) is a large-scale, distributed, embedded system, consisting of various components that are glued together to realize control, computation and communication functions.… (more)

Subjects/Keywords: Secure Computing; Trusted Computing; Resilient Computing; Root of Trust; Hardware Trojans; Cyber Physical System Security; Embedded Systems; Reconfigurable Hardware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Venugopalan, V. (2017). Enhancing Trust in Reconfigurable Hardware Systems. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/75212

Chicago Manual of Style (16th Edition):

Venugopalan, Vivek. “Enhancing Trust in Reconfigurable Hardware Systems.” 2017. Doctoral Dissertation, Virginia Tech. Accessed September 25, 2020. http://hdl.handle.net/10919/75212.

MLA Handbook (7th Edition):

Venugopalan, Vivek. “Enhancing Trust in Reconfigurable Hardware Systems.” 2017. Web. 25 Sep 2020.

Vancouver:

Venugopalan V. Enhancing Trust in Reconfigurable Hardware Systems. [Internet] [Doctoral dissertation]. Virginia Tech; 2017. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/10919/75212.

Council of Science Editors:

Venugopalan V. Enhancing Trust in Reconfigurable Hardware Systems. [Doctoral Dissertation]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/75212


University of California – Irvine

15. Faezi, Sina. Data-Driven Modeling for Minimizing the Side-Channel Information Leakage in Additive Manufacturing.

Degree: Electrical and Computer Engineering, 2017, University of California – Irvine

 Cyber-physical additive manufacturing systems consists of tight integration of cyber and physical domains. This results in new cross-domain vulnerabilities that poses unique security challenges. One… (more)

Subjects/Keywords: Computer engineering; Electrical engineering; Additive Manufacturing; Cyber-Physical System; Data-Driven Modeling; Machine Learning; Mutual Information; Side-Channel Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Faezi, S. (2017). Data-Driven Modeling for Minimizing the Side-Channel Information Leakage in Additive Manufacturing. (Thesis). University of California – Irvine. Retrieved from http://www.escholarship.org/uc/item/3pt318zr

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Faezi, Sina. “Data-Driven Modeling for Minimizing the Side-Channel Information Leakage in Additive Manufacturing.” 2017. Thesis, University of California – Irvine. Accessed September 25, 2020. http://www.escholarship.org/uc/item/3pt318zr.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Faezi, Sina. “Data-Driven Modeling for Minimizing the Side-Channel Information Leakage in Additive Manufacturing.” 2017. Web. 25 Sep 2020.

Vancouver:

Faezi S. Data-Driven Modeling for Minimizing the Side-Channel Information Leakage in Additive Manufacturing. [Internet] [Thesis]. University of California – Irvine; 2017. [cited 2020 Sep 25]. Available from: http://www.escholarship.org/uc/item/3pt318zr.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Faezi S. Data-Driven Modeling for Minimizing the Side-Channel Information Leakage in Additive Manufacturing. [Thesis]. University of California – Irvine; 2017. Available from: http://www.escholarship.org/uc/item/3pt318zr

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Elamidi, Sokaina. Social hållbarhet och dagvattenhantering i Linköping : En studie om Parken Paradiset och Broparken i Vallastaden.

Degree: Society and Engineering, 2018, Mälardalen University

  There are several aspects which need to be considered while planning a building to achieve sustainable environment for people's well-being. One of the significant… (more)

Subjects/Keywords: Social sustainability; Stormwater management; Open system; Physical accessibility; Psychological accessibility; Social accessibility; identity; security; recreation; interplay; Building Technologies; Husbyggnad

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elamidi, S. (2018). Social hållbarhet och dagvattenhantering i Linköping : En studie om Parken Paradiset och Broparken i Vallastaden. (Thesis). Mälardalen University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-40285

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Elamidi, Sokaina. “Social hållbarhet och dagvattenhantering i Linköping : En studie om Parken Paradiset och Broparken i Vallastaden.” 2018. Thesis, Mälardalen University. Accessed September 25, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-40285.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Elamidi, Sokaina. “Social hållbarhet och dagvattenhantering i Linköping : En studie om Parken Paradiset och Broparken i Vallastaden.” 2018. Web. 25 Sep 2020.

Vancouver:

Elamidi S. Social hållbarhet och dagvattenhantering i Linköping : En studie om Parken Paradiset och Broparken i Vallastaden. [Internet] [Thesis]. Mälardalen University; 2018. [cited 2020 Sep 25]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-40285.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Elamidi S. Social hållbarhet och dagvattenhantering i Linköping : En studie om Parken Paradiset och Broparken i Vallastaden. [Thesis]. Mälardalen University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-40285

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Missouri University of Science and Technology

17. Jaisinghani, Manish. Multiple security domain non deducibility in the FREEDM smart grid infrastructure.

Degree: M.S. in Computer Science, Computer Science, Missouri University of Science and Technology

  "The building block of today's world are not materials, but, computers and algorithms with communication networks between physical entities. A cyber physical system (CPS)… (more)

Subjects/Keywords: Cyber Physical System; Multiple Security Domain Non Deducibility; Security; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jaisinghani, M. (n.d.). Multiple security domain non deducibility in the FREEDM smart grid infrastructure. (Masters Thesis). Missouri University of Science and Technology. Retrieved from https://scholarsmine.mst.edu/masters_theses/7763

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Chicago Manual of Style (16th Edition):

Jaisinghani, Manish. “Multiple security domain non deducibility in the FREEDM smart grid infrastructure.” Masters Thesis, Missouri University of Science and Technology. Accessed September 25, 2020. https://scholarsmine.mst.edu/masters_theses/7763.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

MLA Handbook (7th Edition):

Jaisinghani, Manish. “Multiple security domain non deducibility in the FREEDM smart grid infrastructure.” Web. 25 Sep 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Jaisinghani M. Multiple security domain non deducibility in the FREEDM smart grid infrastructure. [Internet] [Masters thesis]. Missouri University of Science and Technology; [cited 2020 Sep 25]. Available from: https://scholarsmine.mst.edu/masters_theses/7763.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Council of Science Editors:

Jaisinghani M. Multiple security domain non deducibility in the FREEDM smart grid infrastructure. [Masters Thesis]. Missouri University of Science and Technology; Available from: https://scholarsmine.mst.edu/masters_theses/7763

Note: this citation may be lacking information needed for this citation format:
No year of publication.


University of Western Ontario

18. Ning, Xirong. Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems.

Degree: 2019, University of Western Ontario

 This dissertation aims to address the security issues of insider cyber-physical attacks and provide a defense-in-depth attack-resilient control system approach for cyber-physical systems. Firstly, security(more)

Subjects/Keywords: cyber-physical system security; vulnerability analysis; insider attacks; cross-layered detection; attack-resilient control; security assessment platform; Controls and Control Theory; Systems and Communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ning, X. (2019). Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems. (Thesis). University of Western Ontario. Retrieved from https://ir.lib.uwo.ca/etd/6248

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ning, Xirong. “Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems.” 2019. Thesis, University of Western Ontario. Accessed September 25, 2020. https://ir.lib.uwo.ca/etd/6248.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ning, Xirong. “Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems.” 2019. Web. 25 Sep 2020.

Vancouver:

Ning X. Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems. [Internet] [Thesis]. University of Western Ontario; 2019. [cited 2020 Sep 25]. Available from: https://ir.lib.uwo.ca/etd/6248.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ning X. Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems. [Thesis]. University of Western Ontario; 2019. Available from: https://ir.lib.uwo.ca/etd/6248

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

19. Konečný, Pavel. Fyzická bezpečnost v průmyslovém podniku: Physical Security in an Industrial Company.

Degree: 2019, Brno University of Technology

 The diploma thesis focuses on physical security solutions in an organization acting in a metallurgy segment. The analytical part identifies the weaknesses in individual areas… (more)

Subjects/Keywords: Fyzická bezpečnost; kamerový systém; ochrana perimetru; kontrola vstupů; ISMS; strážní služba; technická ochrana; Physical security; security camera system; perimeter protection; access control; ISMS; guard service utility; technical protection measure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Konečný, P. (2019). Fyzická bezpečnost v průmyslovém podniku: Physical Security in an Industrial Company. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/66467

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Konečný, Pavel. “Fyzická bezpečnost v průmyslovém podniku: Physical Security in an Industrial Company.” 2019. Thesis, Brno University of Technology. Accessed September 25, 2020. http://hdl.handle.net/11012/66467.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Konečný, Pavel. “Fyzická bezpečnost v průmyslovém podniku: Physical Security in an Industrial Company.” 2019. Web. 25 Sep 2020.

Vancouver:

Konečný P. Fyzická bezpečnost v průmyslovém podniku: Physical Security in an Industrial Company. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/11012/66467.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Konečný P. Fyzická bezpečnost v průmyslovém podniku: Physical Security in an Industrial Company. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/66467

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

20. Mihálik, Andrej. Návrh elektronického zabezpečovacího systému jako část fyzického zabezpečení energetických objektů kritické infrastruktury: Proposal of an electronic security system as part of the physical securing of critical infrastructure energetic objects.

Degree: 2019, Brno University of Technology

 This master's thesis deals with the design of an electronic security system as part of the physical security for the energy company in the Czech… (more)

Subjects/Keywords: fyzická bezpečnosť; energetická spoločnosť; zabezpečenie; ISMS; kritická infraštruktúra; analýza rizík; poplašný zabezpečovací a tiesňový systém; dohľadový videosystém; elektronická kontrola vstupu; physical security; energy company; security; ISMS; critical infrastructure; risk analysis; alarm security and emergency system; video surveillance system; electronic entry control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mihálik, A. (2019). Návrh elektronického zabezpečovacího systému jako část fyzického zabezpečení energetických objektů kritické infrastruktury: Proposal of an electronic security system as part of the physical securing of critical infrastructure energetic objects. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/82246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mihálik, Andrej. “Návrh elektronického zabezpečovacího systému jako část fyzického zabezpečení energetických objektů kritické infrastruktury: Proposal of an electronic security system as part of the physical securing of critical infrastructure energetic objects.” 2019. Thesis, Brno University of Technology. Accessed September 25, 2020. http://hdl.handle.net/11012/82246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mihálik, Andrej. “Návrh elektronického zabezpečovacího systému jako část fyzického zabezpečení energetických objektů kritické infrastruktury: Proposal of an electronic security system as part of the physical securing of critical infrastructure energetic objects.” 2019. Web. 25 Sep 2020.

Vancouver:

Mihálik A. Návrh elektronického zabezpečovacího systému jako část fyzického zabezpečení energetických objektů kritické infrastruktury: Proposal of an electronic security system as part of the physical securing of critical infrastructure energetic objects. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/11012/82246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mihálik A. Návrh elektronického zabezpečovacího systému jako část fyzického zabezpečení energetických objektů kritické infrastruktury: Proposal of an electronic security system as part of the physical securing of critical infrastructure energetic objects. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/82246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


East Tennessee State University

21. Simons, William R. The Challenges of Network Security Remediation at a Regional University.

Degree: MS, Computer and Information Science, 2005, East Tennessee State University

  This thesis describes challenges encountered during a year-long effort to improve the security of the 3,300 node administrative computer network at East Tennessee State… (more)

Subjects/Keywords: Nmap; Nessus; security hardening; security audit; network security; system security; computer; vulnerability remediation; Computer Sciences; Physical Sciences and Mathematics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Simons, W. R. (2005). The Challenges of Network Security Remediation at a Regional University. (Masters Thesis). East Tennessee State University. Retrieved from https://dc.etsu.edu/etd/987

Chicago Manual of Style (16th Edition):

Simons, William R. “The Challenges of Network Security Remediation at a Regional University.” 2005. Masters Thesis, East Tennessee State University. Accessed September 25, 2020. https://dc.etsu.edu/etd/987.

MLA Handbook (7th Edition):

Simons, William R. “The Challenges of Network Security Remediation at a Regional University.” 2005. Web. 25 Sep 2020.

Vancouver:

Simons WR. The Challenges of Network Security Remediation at a Regional University. [Internet] [Masters thesis]. East Tennessee State University; 2005. [cited 2020 Sep 25]. Available from: https://dc.etsu.edu/etd/987.

Council of Science Editors:

Simons WR. The Challenges of Network Security Remediation at a Regional University. [Masters Thesis]. East Tennessee State University; 2005. Available from: https://dc.etsu.edu/etd/987

22. Zhang, Kaijin, ZHANG. Efficiency and security in data-driven applications.

Degree: PhD, EECS - Computer Engineering, 2018, Case Western Reserve University School of Graduate Studies

 With the rapid development of modern computation and communication infrastructure, people are embracing the age of "Big Data". People's lives are filled with data-driven applications,… (more)

Subjects/Keywords: Computer Engineering; Computer Science; transit route network; secure outsourcing; matrix convolution; privacy; security; convolution; image registration; transportation system; cyber-physical system; lyapunov optimization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, Kaijin, Z. (2018). Efficiency and security in data-driven applications. (Doctoral Dissertation). Case Western Reserve University School of Graduate Studies. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=case1522443817978176

Chicago Manual of Style (16th Edition):

Zhang, Kaijin, ZHANG. “Efficiency and security in data-driven applications.” 2018. Doctoral Dissertation, Case Western Reserve University School of Graduate Studies. Accessed September 25, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1522443817978176.

MLA Handbook (7th Edition):

Zhang, Kaijin, ZHANG. “Efficiency and security in data-driven applications.” 2018. Web. 25 Sep 2020.

Vancouver:

Zhang, Kaijin Z. Efficiency and security in data-driven applications. [Internet] [Doctoral dissertation]. Case Western Reserve University School of Graduate Studies; 2018. [cited 2020 Sep 25]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=case1522443817978176.

Council of Science Editors:

Zhang, Kaijin Z. Efficiency and security in data-driven applications. [Doctoral Dissertation]. Case Western Reserve University School of Graduate Studies; 2018. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=case1522443817978176

23. Rubio Hernan, Jose Manuel. Detection of attacks against cyber-physical industrial systems : Détection des attaques contre les systèmes cyber-physiques industriels.

Degree: Docteur es, Informatique et réseaux, 2017, Evry, Institut national des télécommunications

Nous abordons des problèmes de sécurité dans des systèmes cyber-physiques industriels. Les attaques contre ces systèmes doivent être traitées à la fois en matière de… (more)

Subjects/Keywords: Sécurité cyber-physique; Théorie du contrôle; Sécurité du réseau; Systèmes contrôlés via un réseau; Infrastructures critiques; Détection d’attaques; Modèle d’adversaire; Adversaire cyber-physique; Cyber-physical security; Control theory; Network security; Networked-control system; Critical infrastructures; Attack detection; Adversary model; Cyber-physical adversary

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rubio Hernan, J. M. (2017). Detection of attacks against cyber-physical industrial systems : Détection des attaques contre les systèmes cyber-physiques industriels. (Doctoral Dissertation). Evry, Institut national des télécommunications. Retrieved from http://www.theses.fr/2017TELE0015

Chicago Manual of Style (16th Edition):

Rubio Hernan, Jose Manuel. “Detection of attacks against cyber-physical industrial systems : Détection des attaques contre les systèmes cyber-physiques industriels.” 2017. Doctoral Dissertation, Evry, Institut national des télécommunications. Accessed September 25, 2020. http://www.theses.fr/2017TELE0015.

MLA Handbook (7th Edition):

Rubio Hernan, Jose Manuel. “Detection of attacks against cyber-physical industrial systems : Détection des attaques contre les systèmes cyber-physiques industriels.” 2017. Web. 25 Sep 2020.

Vancouver:

Rubio Hernan JM. Detection of attacks against cyber-physical industrial systems : Détection des attaques contre les systèmes cyber-physiques industriels. [Internet] [Doctoral dissertation]. Evry, Institut national des télécommunications; 2017. [cited 2020 Sep 25]. Available from: http://www.theses.fr/2017TELE0015.

Council of Science Editors:

Rubio Hernan JM. Detection of attacks against cyber-physical industrial systems : Détection des attaques contre les systèmes cyber-physiques industriels. [Doctoral Dissertation]. Evry, Institut national des télécommunications; 2017. Available from: http://www.theses.fr/2017TELE0015


East Tennessee State University

24. Ashe, James Patrick. A Vulnerability Assessment of the East Tennessee State University Administrative Computer Network.

Degree: MS, Computer and Information Science, 2004, East Tennessee State University

  A three phase audit of East Tennessee State University's administrative computer network was conducted during Fall 2001, Spring 2002, and January 2004. Nmap and… (more)

Subjects/Keywords: network security; system security; security audit; nmap; nessus; Computer Sciences; Physical Sciences and Mathematics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ashe, J. P. (2004). A Vulnerability Assessment of the East Tennessee State University Administrative Computer Network. (Masters Thesis). East Tennessee State University. Retrieved from https://dc.etsu.edu/etd/858

Chicago Manual of Style (16th Edition):

Ashe, James Patrick. “A Vulnerability Assessment of the East Tennessee State University Administrative Computer Network.” 2004. Masters Thesis, East Tennessee State University. Accessed September 25, 2020. https://dc.etsu.edu/etd/858.

MLA Handbook (7th Edition):

Ashe, James Patrick. “A Vulnerability Assessment of the East Tennessee State University Administrative Computer Network.” 2004. Web. 25 Sep 2020.

Vancouver:

Ashe JP. A Vulnerability Assessment of the East Tennessee State University Administrative Computer Network. [Internet] [Masters thesis]. East Tennessee State University; 2004. [cited 2020 Sep 25]. Available from: https://dc.etsu.edu/etd/858.

Council of Science Editors:

Ashe JP. A Vulnerability Assessment of the East Tennessee State University Administrative Computer Network. [Masters Thesis]. East Tennessee State University; 2004. Available from: https://dc.etsu.edu/etd/858


Brno University of Technology

25. Černý, Jan. Návrh zabezpečovacího systému areálu společnosti: A Proposal for a Security System of the Company Premises.

Degree: 2018, Brno University of Technology

 The content of this thesis is the complex security system proposal, specifically of PZTS system and CCTV system. The thesis is divided into three parts.… (more)

Subjects/Keywords: Bezpečnostní systém; Fyzická bezpečnost; Technická ochrana; čidlo; detektor; PZTS; CCTV; kamera; projektová dokumentace; plášťová ochrana; prostorová ochrana; perimetr; Security system; physical security; technical protection; sensitive element; detector; intruder and hold-up alarm system; close circuit television; camera; project documentation; jacket protection; space protection; perimeter

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Černý, J. (2018). Návrh zabezpečovacího systému areálu společnosti: A Proposal for a Security System of the Company Premises. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/32377

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Černý, Jan. “Návrh zabezpečovacího systému areálu společnosti: A Proposal for a Security System of the Company Premises.” 2018. Thesis, Brno University of Technology. Accessed September 25, 2020. http://hdl.handle.net/11012/32377.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Černý, Jan. “Návrh zabezpečovacího systému areálu společnosti: A Proposal for a Security System of the Company Premises.” 2018. Web. 25 Sep 2020.

Vancouver:

Černý J. Návrh zabezpečovacího systému areálu společnosti: A Proposal for a Security System of the Company Premises. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/11012/32377.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Černý J. Návrh zabezpečovacího systému areálu společnosti: A Proposal for a Security System of the Company Premises. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/32377

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Newcastle

26. Liang, Gaoqi. False data injection attacks against modern power systems: modelling and countermeasures.

Degree: PhD, 2017, University of Newcastle

Research Doctorate - Doctor of Philosophy (PhD)

The integration of information and communication technology into the power grid is a significant development trend of modern… (more)

Subjects/Keywords: cyber physical power system; smart grid; state estimation; cyber attacks; cyber security; electricity market; false data injection attacks; topology attacks; blockchain technology; thesis by publication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liang, G. (2017). False data injection attacks against modern power systems: modelling and countermeasures. (Doctoral Dissertation). University of Newcastle. Retrieved from http://hdl.handle.net/1959.13/1351286

Chicago Manual of Style (16th Edition):

Liang, Gaoqi. “False data injection attacks against modern power systems: modelling and countermeasures.” 2017. Doctoral Dissertation, University of Newcastle. Accessed September 25, 2020. http://hdl.handle.net/1959.13/1351286.

MLA Handbook (7th Edition):

Liang, Gaoqi. “False data injection attacks against modern power systems: modelling and countermeasures.” 2017. Web. 25 Sep 2020.

Vancouver:

Liang G. False data injection attacks against modern power systems: modelling and countermeasures. [Internet] [Doctoral dissertation]. University of Newcastle; 2017. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/1959.13/1351286.

Council of Science Editors:

Liang G. False data injection attacks against modern power systems: modelling and countermeasures. [Doctoral Dissertation]. University of Newcastle; 2017. Available from: http://hdl.handle.net/1959.13/1351286

27. QIAO, YUE. Attacks and Counterattacks on Physical Layer Primitives.

Degree: PhD, Computer Science and Engineering, 2017, The Ohio State University

 It has long been believed that physical layer primitives extracted from wireless channel are not breakable given certain physical constraints. This belief is built upon… (more)

Subjects/Keywords: Computer Science; wireless system; physical layer security; wireless channel

System Model . . . . . . . . . . . . . . . . . 4.3.1 Physical Layer Model… …there is rapidly growing interest in exploiting physical layer approaches to achieve security… …computational security approaches, physical layer security approaches do not rely on computational… …assumption of adversaries’ computing power, and many physical layer security schemes require less… …infrastructure support than those based on computational security. Among all the physical layer… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

QIAO, Y. (2017). Attacks and Counterattacks on Physical Layer Primitives. (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1494284803751621

Chicago Manual of Style (16th Edition):

QIAO, YUE. “Attacks and Counterattacks on Physical Layer Primitives.” 2017. Doctoral Dissertation, The Ohio State University. Accessed September 25, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1494284803751621.

MLA Handbook (7th Edition):

QIAO, YUE. “Attacks and Counterattacks on Physical Layer Primitives.” 2017. Web. 25 Sep 2020.

Vancouver:

QIAO Y. Attacks and Counterattacks on Physical Layer Primitives. [Internet] [Doctoral dissertation]. The Ohio State University; 2017. [cited 2020 Sep 25]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1494284803751621.

Council of Science Editors:

QIAO Y. Attacks and Counterattacks on Physical Layer Primitives. [Doctoral Dissertation]. The Ohio State University; 2017. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1494284803751621

28. Lee, Eun Kyu. Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid.

Degree: Computer Science, 2014, UCLA

 A smart grid system constitutes a control loop, and recent research has tried to implement the loop using a cyber-physical system (CPS) model integrating physical(more)

Subjects/Keywords: Computer science; communication; cyber physical system; interoperation; security; smart grid

Physical Layer Security in Wireless Smart Grid . . . . . . . . . . . . . . . . 98 4.3.1… …Gerla, Physical Layer Security in Wireless Smart Grid, IEEE Communications Magazine, 50(8… …impact our physical activities. Thus, security and privacy issues will become more critical… …Challenge: Understanding Cyber-Physical System as an Enabling Technology. Recent IoT research has… …focused on developing a cyber-physical system (CPS) as a core enabling technology… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lee, E. K. (2014). Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid. (Thesis). UCLA. Retrieved from http://www.escholarship.org/uc/item/2bn6q1t9

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lee, Eun Kyu. “Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid.” 2014. Thesis, UCLA. Accessed September 25, 2020. http://www.escholarship.org/uc/item/2bn6q1t9.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lee, Eun Kyu. “Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid.” 2014. Web. 25 Sep 2020.

Vancouver:

Lee EK. Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid. [Internet] [Thesis]. UCLA; 2014. [cited 2020 Sep 25]. Available from: http://www.escholarship.org/uc/item/2bn6q1t9.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lee EK. Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid. [Thesis]. UCLA; 2014. Available from: http://www.escholarship.org/uc/item/2bn6q1t9

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

29. Mercurio, Anthony F. A Critical Analysis of Payload Anomaly-Based Intrusion Detection Systems.

Degree: 2010, Regis University

 Examining payload content is an important aspect of network security, particularly in today's volatile computing environment. An Intrusion Detection System (IDS) that simply analyzes packet… (more)

Subjects/Keywords: Computer Sciences; Physical Sciences and Mathematics; payload content; intrusion detection system; network security; design-science research; College for Professional Studies; MS Information Assurance; School of Computer & Information Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mercurio, A. F. (2010). A Critical Analysis of Payload Anomaly-Based Intrusion Detection Systems. (Thesis). Regis University. Retrieved from http://epublications.regis.edu/theses/363

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mercurio, Anthony F. “A Critical Analysis of Payload Anomaly-Based Intrusion Detection Systems.” 2010. Thesis, Regis University. Accessed September 25, 2020. http://epublications.regis.edu/theses/363.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mercurio, Anthony F. “A Critical Analysis of Payload Anomaly-Based Intrusion Detection Systems.” 2010. Web. 25 Sep 2020.

Vancouver:

Mercurio AF. A Critical Analysis of Payload Anomaly-Based Intrusion Detection Systems. [Internet] [Thesis]. Regis University; 2010. [cited 2020 Sep 25]. Available from: http://epublications.regis.edu/theses/363.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mercurio AF. A Critical Analysis of Payload Anomaly-Based Intrusion Detection Systems. [Thesis]. Regis University; 2010. Available from: http://epublications.regis.edu/theses/363

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

30. Akbar, Yousef M. A. H. Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters.

Degree: MS, Electrical Engineering, 2020, Virginia Tech

 The power grid is becoming more digitized and is utilizing information and communication technologies more, hence the smart grid. New systems are developed and utilized… (more)

Subjects/Keywords: Denial of Service (DoS); Advanced Metering Infrastructure (AMI); Wireless Mesh Network (WMN); Cyber-Physical System (CPS); Power Grid; Supervisory Control And Data Acquisition (SCADA); Cyber Security of Smart Meters

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Akbar, Y. M. A. H. (2020). Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/98554

Chicago Manual of Style (16th Edition):

Akbar, Yousef M A H. “Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters.” 2020. Masters Thesis, Virginia Tech. Accessed September 25, 2020. http://hdl.handle.net/10919/98554.

MLA Handbook (7th Edition):

Akbar, Yousef M A H. “Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters.” 2020. Web. 25 Sep 2020.

Vancouver:

Akbar YMAH. Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters. [Internet] [Masters thesis]. Virginia Tech; 2020. [cited 2020 Sep 25]. Available from: http://hdl.handle.net/10919/98554.

Council of Science Editors:

Akbar YMAH. Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters. [Masters Thesis]. Virginia Tech; 2020. Available from: http://hdl.handle.net/10919/98554

[1] [2]

.