• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6540
  • 1926
  • 919
  • 814
  • 686
  • 370
  • 179
  • 161
  • 154
  • 105
  • 93
  • 81
  • 79
  • 76
  • 76
  • Tagged with
  • 14795
  • 2965
  • 2025
  • 1871
  • 1447
  • 1375
  • 1343
  • 1298
  • 1258
  • 1163
  • 1152
  • 1145
  • 1073
  • 1030
  • 947
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
611

Re-pledge of investment property : developments under revised article 9 of the Uniform Commercial Code and in the European Union

Palsson, Ulrika January 2002 (has links)
Note: title page missing
612

Expert system based security assessment and enhancement

Stathis, Vassilios January 1991 (has links)
No description available.
613

Trends in beverage consumption among U.S. food secure and food insecure adults: NHANES 2001-2010

Yao, Ruoxue January 2013 (has links)
No description available.
614

Abusing Android TV Box for Fun and Profit

Marck, Austin J. January 2017 (has links)
No description available.
615

The Soviet Union and the failure of collective security (1934-1938) : a study in shared responsibility /

Hochman, JiÅ™Ã. January 1982 (has links)
No description available.
616

Factors in the development of social security : a comparative study of national systems /

Larson, David Leroy January 1969 (has links)
No description available.
617

Toward a definition of job uncertainty and an attempt at its measurement /

Breaugh, James Alfred January 1977 (has links)
No description available.
618

Security Breach Disclosure

Lee, Yao-Tien 11 1900 (has links)
Security breach disclosure is the public disclosure of information regarding a data security incident. It allows organizations to communicate salient information to the affected parties and stakeholders regarding the nature and impact of the breach, and remediating solutions undertaken regarding the breach. Recent cases of large-scale security breaches have revealed that security breach disclosure remains a challenging subject for policymakers, practitioners, and researchers. There is a lack of understanding and consensus on what breaches need to be disclosed and little evidence on how actual practices are employed. Using an adapted grounded theory methodology that combines computerized textual extraction and ground theory coding techniques, this study explores relevant issues through four research questions with distinct objectives that would enhance understanding of the issues in public breach disclosure. First, recent regulations from the US, EU, and Canada are reviewed to identify the core elements in breach disclosure. Second, this study develops methods to extract information content from disclosures. Third, matrices and measuring instruments are developed to evaluate the quality, and last, a framework is proposed to map out the paths and directions for future research. These advancements lay the crucial groundwork in the field of security breach disclosure and will contribute greatly towards future policies, practice, and research. The expected societal significance of this research is profound. The research is relevant to practitioners, regulators, and the information security community as it provides valuable insight on current challenges and future directions. The ultimate goal is to strengthen our understanding of security breach disclosure and enhance the accumulation and transfer of knowledge obtained through security breach disclosure; thereby providing organizations, regulators, and the information security community with the information necessary to develop policies, tools, and controls for identifying, managing, and reducing the risks of future security incidents. The proposed core elements, methods of extracting relevant information content, quality evaluation matrices, and framework mark a significant advancement towards this vision. / Thesis / Doctor of Philosophy (PhD) / Recent cases of security breach at Equifax, Yahoo, and Uber have raised attention from the public and regulators on the issues of public disclosure of security incidents. However, the lack of understanding and research in security breach disclosures has hampered our ability in defining what needs to be disclosed, understanding what are actually disclosed, and determining how well the incidents are disclosed. These issues are urgent and important thus warrant considerable efforts to carefully examine the current landscape of policy and practice, and to provide methods to evaluate disclosures so that meaningful advancements in research and improvements in practice can be made. This study recommends a set of core elements in disclosure, develops methods to extract information from disclosure, establishes ways to evaluate quality, and proposes a framework that maps out future research. These are important advancements in the study of security breach disclosure and will contribute greatly towards future policies, practice, and research.
619

CLOSUREX: Transforming Source Code for Correct Persistent Fuzzing

Ranjan, Rishi 29 May 2024 (has links)
Fuzzing is a popular technique which has been adopted for automated vulnerability research for software hardening. Research reveals that increasing fuzzing throughput directly increases bug discovery rate. Given fuzzing revolves around executing a large number of test cases, test case execution rate is the dominant component of overall fuzzing throughput. To increase test case execution rate, researchers provide techniques that reduce the amount of time spent performing work that is independent of specific test case data. The highest performance approach is persistent fuzzing, which reuses a single process for all test cases by looping back to the start instead of exiting. This eliminates all process initialization and tear-down costs. Unfortunately, persistent fuzzing leads to semantically inconsistent program states because process state changes from one test case remains for subsequent test cases. This semantic inconsistency results in both missed crashes and false crashes, undermining fuzzing effectiveness. I observe that existing fuzzing execution mechanisms exist on a continuum, based on the amount of state that gets discarded and restored between test cases. I present a fuzzing execution mechanism that sits at a new spot on this state restoration continuum, where only test-case-execution-specific state is reset. This fine-grain state restoration provides near-persistent performance with the correctness of heavyweight state restoration. I construct CLOSUREX as a set of LLVM compiler passes that integrate with AFL++. Our evaluation on ten popular open-source fuzzing targets show that CLOSUREX maintains semantic correctness all while increasing test case execution rate by over 3.5x, on average, compared to AFL++. CLOSUREX also finds bugs more consistently and 1.9x faster than AFL++, with CLOSUREX discovering 15 0-day bugs (4 CVEs). / Master of Science / Fuzzing is a technique of automated vulnerability research which tries to find bugs in programs by generating randomised inputs and feeding it to the program under test. It then monitors the program execution to identify any crashing inputs which can be later triaged by a human in order to concretely identify any bugs, as well as perform root-cause analysis. In this work, I introduce a new program state restoration technique to achieve correctness in persistent mode, the fastest execution mechanism in fuzzing.
620

Two Essays on Convertible Debt

Bremser, Albert W. 25 March 1997 (has links)
This dissertation examines two different topics related to the issuance of a convertible debt security. The first essay addresses the question of how managers set the equity value in a convertible debt issue. A convertible debt security has value derived from an equity component and a debt component. As a result, managers must decide how much of the convertible debt's value will be derived from equity at issuance. I examine three hypotheses in addressing this question. Empirical evidence is provided supporting the assertion that managers issue more equity-like debt when the firm will have lower future operating performance and a greater potential for underinvestment. Empirical support is not found for managers take into consideration asset substitution concerns when setting the equity value in a convertible debt issue. The second essay examines why are abnormal returns negative for the equity during the convertible debt's issuance period. This has been documented by Dann and Mikkelson (1984), Mikkelson and Partch (1986, 1988), and also by this dissertation. I furnish evidence that is consistent with a bid-ask spread bias not causing the negative equity abnormal returns during the issuance period of a convertible debt security. Tests are also performed that provide results that are consistent with the issue period returns being partially due to a resolution of uncertainty. / Ph. D.

Page generated in 0.3214 seconds