721 |
Ensuring a C2 level of trust and interoperability in a networked Windows NT environmentLucas, Julie A. January 1996 (has links) (PDF)
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, September 1996. / Thesis advisor(s): Gus K. Lott, Cynthia E. Irvine, Rex Buddenberg. "September 1996." Includes bibliographical references (p. 135-140). Also available online.
|
722 |
Internetworking multicast and ATM network prerequisites for distance learning /Tamer, Murat Tevfink. January 1996 (has links) (PDF)
Thesis (M.S. in Computer Science) Naval Postgraduate School, September 1996. / Thesis advisor(s): D.P. Brutzman, Michael J. Zyda. "September 1996." Includes bibliographical references: (p. 119-121). Also available online.
|
723 |
Throughput optimization for single-hop wireless networks using network coding /Tran, Tuan Tho. January 1900 (has links)
Thesis (Ph. D.)--Oregon State University, 2010. / Printout. Includes bibliographical references (leaves 150-155). Also available on the World Wide Web.
|
724 |
Countering kernel malware in virtual execution environmentsXuan, Chaoting. January 2009 (has links)
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2010. / Committee Chair: Copeland A. John; Committee Member: Alessandro Orso; Committee Member: Douglas M. Blough; Committee Member: George F. Riley; Committee Member: Raheem A. Beyah. Part of the SMARTech Electronic Thesis and Dissertation Collection.
|
725 |
Security analysis of session initiation protocolDobson, Lucas E. January 2010 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010. / Thesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
|
726 |
Yao spanners for wireless ad hoc networksEl Molla, Nawar M. January 2009 (has links)
Thesis (M.S.)--Villanova University, 2009. / Computer Science Dept. Includes bibliographical references.
|
727 |
Analysis of time-based approach for detecting anomalous network traffic /Khasgiwala, Jitesh. January 2005 (has links)
Thesis (M.S)--Ohio University, March, 2005. / Includes bibliographical references (p. 107-111)
|
728 |
Time-based approach to intrusion detection using multiple self-organizing maps /Sawant, Ankush. January 2005 (has links)
Thesis (M.S)--Ohio University, March, 2005. / Includes bibliographical references (p. 78-82)
|
729 |
Web-based dissemination system for the Trusted Computing Exemlar [i.e. Exemplar] project /Kane, Douglas Robert. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 127-128). Also available online.
|
730 |
Evaluation of two host-based intrusion prevention systems /Labbe, Keith G. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): Neil Rowe, J.D. Fulp. Includes bibliographical references (p. 53-54). Also available online.
|
Page generated in 0.0207 seconds