• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 433
  • 94
  • 81
  • 59
  • 37
  • 36
  • 12
  • 8
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 972
  • 242
  • 179
  • 132
  • 110
  • 107
  • 102
  • 91
  • 87
  • 85
  • 78
  • 76
  • 76
  • 71
  • 69
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Case study of the development of the Apache attack helicopter (AH-64) /

Ference, Edward W. January 2002 (has links) (PDF)
Thesis (M.S. in Program Management)--Naval Postgraduate School, December 2002. / Thesis advisor(s): Michael W. Boudreau, Richard G. Rhoades. Includes bibliographical references (p. 63-65). Also available online.
2

The electrophilic halogenation, prevost oxidation and peroxydisulphate oxidation of alkenes

Dobson, P. January 1986 (has links)
No description available.
3

An investigation into the role of psychological factors during recovery from myocardial infarction

Fielding, Richard January 1982 (has links)
No description available.
4

Resistance of some pea varieties to Callosobruchus maculatus F

Kannan, H. O. January 1984 (has links)
No description available.
5

Dispersion of repolarisation and refractoriness induced by amiodarone, d-sotalol, myocardial ischaemia and hypertrophy

Sneddon, Kenneth Paxton January 1999 (has links)
No description available.
6

The Model of Evasion Attack Detection using Finite State Machine

Su, Wen-De 09 August 2003 (has links)
With the electronic commerce is going popular, many enterprise turn their business to the internet. The electronic commerce brings many problems on security and the key point is the data of the enterprise and the privacy of the customer. Firewall is not enough and the IDS is needed to provide the acceptable security. With the network monitoring and intrusion detection techniques, we can detect the attacks, alarm the administrators, and write to log files. The log files can be analyzed to provide the prevention to the same types of attacks and protect the security of the system. Recently, some attacks are proposed which can avoid the familiar IDS such as SNORT. The attack will bring a serious damage to the system. We analyze one of these attacks and try to propose a model which can detect it. We believe that the model is useful in the research of the IDS.
7

Aerodynamic control of slender bodies from low to high angles of attack through flow manipulation /

Lopera, Javier. January 2007 (has links)
Dissertation (M.S.)--University of Toledo, 2007 / Typescript. "Submitted as partial fulfillment of the requirements for the Doctor of Philosophy in Engineering." Bibliography: leaves 223-237.
8

Optimization models for allocation of air strike assets with persistence /

Castro, Davi Rogério da Silva. January 2002 (has links) (PDF)
Thesis (M.S. in Operations Research)--Naval Postgraduate School, December 2002. / Thesis advisor(s): Richard E. Rosenthal, R. Kevin Wood. Includes bibliographical references (p. 53-56). Also available online.
9

A discrete event simulation-based approach for managing cyber vulnerabilities in a full-service deep waterway port

Mimesh, Hebah Mohammed 13 December 2019 (has links)
Deepwater sea ports are considered to be gateways for global trade and susceptible to a diverse range of risks, including natural disasters such as hurricane, storm, drought, as well as a course of events ranging from human error to malicious cyber-attack. To deal with cyber vulnerabilities, this study examines how cyber-attack to a given technology (e.g., Programmable Logic Controllers (PLC), Radio Frequency Identification Tags (RFID), Navigation Technologies, and others) impacts the overall port operations. We use Port of Pascagoula as testbed to visualize and validate the modeling results utilizing FlexSim software. Several sets of experiments are conducted to provide important managerial insights for decision makers. Results indicate that cyber-attack on technologies used by the port may significantly impact the port operations. In overall, cyber-attack has meaningful impacts on ports systems that may result in significant economic and operational loss as well as long-term security and sustainability for overall ports performances.
10

Validating digital forensic evidence

Shanmugam, Karthikeyan January 2011 (has links)
This dissertation focuses on the forensic validation of computer evidence. It is a burgeoning field, by necessity, and there have been significant advances in the detection and gathering of evidence related to electronic crimes. What makes the computer forensics field similar to other forensic fields is that considerable emphasis is placed on the validity of the digital evidence. It is not just the methods used to collect the evidence that is a concern. What is also a problem is that perpetrators of digital crimes may be engaged in what is called anti-forensics. Digital forensic evidence techniques are deliberately thwarted and corrupted by those under investigation. In traditional forensics the link between evidence and perpetrator's actions is often straightforward: a fingerprint on an object indicates that someone has touched the object. Anti-forensic activity would be the equivalent of having the ability to change the nature of the fingerprint before, or during the investigation, thus making the forensic evidence collected invalid or less reliable. This thesis reviews the existing security models and digital forensics, paying particular attention to anti-forensic activity that affects the validity of data collected in the form of digital evidence. This thesis will build on the current models in this field and suggest a tentative first step model to manage and detect possibility of anti-forensic activity. The model is concerned with stopping anti-forensic activity, and thus is not a forensic model in the normal sense, it is what will be called a “meta-forensic” model. A meta-forensic approach is an approach intended to stop attempts to invalidate digital forensic evidence. This thesis proposes a formal procedure and guides forensic examiners to look at evidence in a meta-forensic way.

Page generated in 0.0209 seconds