• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 249
  • 34
  • 11
  • 10
  • 7
  • 6
  • 4
  • 2
  • 2
  • 1
  • Tagged with
  • 443
  • 165
  • 148
  • 148
  • 125
  • 89
  • 72
  • 67
  • 64
  • 59
  • 56
  • 55
  • 52
  • 51
  • 51
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

Novel Alert Visualization: The Development of a Visual Analytics Prototype for Mitigation of Malicious Insider Cyber Threats

Clarke, Karla A. 01 January 2018 (has links)
Cyber insider threat is one of the most difficult risks to mitigate in organizations. However, innovative validated visualizations for cyber analysts to better decipher and react to detected anomalies has not been reported in literature or in industry. Attacks caused by malicious insiders can cause millions of dollars in losses to an organization. Though there have been advances in Intrusion Detection Systems (IDSs) over the last three decades, traditional IDSs do not specialize in anomaly identification caused by insiders. There is also a profuse amount of data being presented to cyber analysts when deciphering big data and reacting to data breach incidents using complex information systems. Information visualization is pertinent to the identification and mitigation of malicious cyber insider threats. The main goal of this study was to develop and validate, using Subject Matter Experts (SME), an executive insider threat dashboard visualization prototype. Using the developed prototype, an experimental study was conducted, which aimed to assess the perceived effectiveness in enhancing the analysts’ interface when complex data correlations are presented to mitigate malicious insiders cyber threats. Dashboard-based visualization techniques could be used to give full visibility of network progress and problems in real-time, especially within complex and stressful environments. For instance, in an Emergency Room (ER), there are four main vital signs used for urgent patient triage. Cybersecurity vital signs can give cyber analysts clear focal points during high severity issues. Pilots must expeditiously reference the Heads Up Display (HUD), which presents only key indicators to make critical decisions during unwarranted deviations or an immediate threat. Current dashboard-based visualization techniques have yet to be fully validated within the field of cybersecurity. This study developed a visualization prototype based on SME input utilizing the Delphi method. SMEs validated the perceived effectiveness of several different types of the developed visualization dashboard. Quantitative analysis of SME’s perceived effectiveness via self-reported value and satisfaction data as well as qualitative analysis of feedback provided during the experiments using the prototype developed were performed. This study identified critical cyber visualization variables and identified visualization techniques. The identifications were then used to develop QUICK.v™ a prototype to be used when mitigating potentially malicious cyber insider threats. The perceived effectiveness of QUICK.v™ was then validated. Insights from this study can aid organizations in enhancing cybersecurity dashboard visualizations by depicting only critical cybersecurity vital signs.
182

Perceptions of Female Cybersecurity Professionals Toward Factors that Encourage Females to the Cybersecurity Field

Lingelbach, Kembley Kay 01 January 2018 (has links)
Despite multiple national, educational, and industry initiatives, women continue to be underrepresented in the cybersecurity field. Only 11% of cybersecurity professionals, globally, are female. This contributes to the growing overall shortage of workers in the field. This research addressed the significant underrepresentation of females in the cybersecurity workforce. There are many practitioner and industry studies that suggest self-efficacy, discrimination and organizational culture play important roles in the low rate of women in the cybersecurity field. A limited number of scholarly studies identify causal factors; however, there is not a general consensus or framework to explain the problem thoroughly. Moreover, there exists a significant gap in theoretical framework utilizing qualitative methods to demystify the complex factors of engaging females to pursue the cybersecurity field. This study utilized a grounded theory approach to interview twelve female cybersecurity professionals to discover their perceptions of the cybersecurity field. The participants revealed strategies that could encourage females to pursue the cybersecurity field. Data analysis included a data coding process and a constant comparative method of interview transcripts. This study identified four factors of engagement and one unexpected co-factor that are perceived to have an impact on decisions to pursue the cybersecurity field. The four factors identified were awareness, support, intrinsic and extrinsic values. The interesting find of the cybersecurity mindset profile factor that is perceived to enhance the success of career trajectory warrants additional research to discover the impacts on decision to pursue the cybersecurity field. This findings of this research gives women a voice in recommending strategies to encourage other females to pursue the cybersecurity field. The findings also aid in demystifying the complexity of the factors by organizing and categorizing them in a logical sense in order to present a theoretical model to encourage females into the field of cybersecurity. Moreover, this study provides holistic insight to academicians and practitioners in developing future cybersecurity professionals. Additionally, it adds to the body of knowledge by answering the call for that additional qualitative approaches in methodology by bringing data richness and to generate new theoretical frameworks in cybersecurity research.
183

Překonání patové situace: Vyhlídky na spolupráci mezi Ruskem a USA v oblasti kybrnetické bezpečnosti / Beyond the Impasse: Prospects for Joint Cooperation between Russia and the US in Cybersecurity

Myftari, Kledian January 2021 (has links)
Russia and the US have both articulated their willingness to develop a regime for counter cyberterrorism. Yet, to date, they have been unsuccessful in following through with this goal. Their failure to form such a regime can best be explained through the lens of social constructivism, and most specifically, through the concept of strategic culture, given that such an approach allows for the examination of ideological, historical, and cultural issues that have shaped the strategy choices of both countries. Russia and the US have successfully formed regimes with other countries in which issues of counter cyberterrorism come to play. Russia has entered into agreements with BRICS and with the Shanghai Cooperation Organization. The US has involved itself in cybersecurity regimes both with its NATO allies and with its Latin American and Caribbean allies. Russia and the US have furthermore entered into a number of agreements with each other, including the Anti-Ballistic Missile Treaty, the Intermediate- Range Nuclear Forces Treaty, and New-START. A strategic culture perspective, which focuses primarily on historical factors, such as a history of invasion or lack thereof, and the relations of both countries with their respective neighbors, reveals how the discourse of human rights and the freedoms of...
184

Unsupervised Interpretable Feature Extraction for Binary Executables using LIBCAISE

Greer, Jeremiah 21 October 2019 (has links)
No description available.
185

The Community Defense Approach: A Human Approach to Cybersecurity for Industrial and Manufacturing Systems

Stewart, Alexander 21 October 2019 (has links)
No description available.
186

A Systematic Review of Blockchain Technology: Privacy Concerns, Security Challenges, and Solutions

Bheemanathini, Sai Nikhil 21 October 2019 (has links)
No description available.
187

Designing a Security Education Curriculum Using Gamification Principles

Selinger, David Emanuel 25 November 2019 (has links)
No description available.
188

Cybersecurity in the Retail Industry: Third Party Implications

Uwakweh, Ozioma I.F 02 November 2020 (has links)
No description available.
189

Hardware implementation of Reversible Logic Gates in VHDL

Gautam, Dibya 03 August 2020 (has links)
No description available.
190

An Overview of Reverse Engineering and A Security Analysis of TikTok

Sengelmann, Michael January 2020 (has links)
No description available.

Page generated in 0.0155 seconds