• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1926
  • 182
  • 176
  • 147
  • 36
  • 25
  • 25
  • 25
  • 25
  • 25
  • 24
  • 16
  • 11
  • 9
  • 7
  • Tagged with
  • 2830
  • 2830
  • 731
  • 628
  • 504
  • 494
  • 385
  • 331
  • 309
  • 297
  • 293
  • 287
  • 282
  • 275
  • 274
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Network access control disruptive technology? /

Fisher, Craig. January 2008 (has links) (PDF)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2008. / Title from PDF title page (viewed on June 10, 2008). Includes bibliographical references.
32

Application of overlay techniques to network monitoring

Zhan, Xiaoying. January 2008 (has links)
Thesis (Ph.D.) - University of Glasgow, 2008. / Ph.D. thesis submitted to the Faculty of Information and Mathematical Sciences, Department of Computing Science, University of Glasgow, 2008. Includes bibliographical references. Print version also available.
33

On the privacy of emerging distributed network applications /

Sampigethaya, Radhakrishna. January 2007 (has links)
Thesis (Ph. D.)--University of Washington, 2007. / Vita. Includes bibliographical references (p. 179-195).
34

Multicomputer routing techniques /

Fulgham, Melanie L., January 1997 (has links)
Thesis (Ph. D.)--University of Washington, 1997. / Vita. Includes bibliographical references (p. [108]-118).
35

Improving misuse detection with neural networks/

Demiray, Sadettin. Tuğlular, Tuğkan January 2005 (has links) (PDF)
Thesis (Master)--İzmir Institute of Technology, İzmir, 2005 / Keywords: Neural network, back propagation networks, multilayer perceptions, computer networks security, Intrusion detection system. Includes bibliographical references (leaves 68-69)
36

Statistical methods used for intrusion detection/

Özardıç, Onur. Püskülcü, Halis January 2006 (has links) (PDF)
Thesis (Master)--İzmir Institute of Technology, İzmir, 2006 / Keywords: Computer networks, computer networks security, intrusion detection system, statistical methods Includes bibliographical references (leaves. 58-64).
37

An assessment of vulnerabilities for ship-based control systems

Bensing, Richard G. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Burke, Karen ; Dinolt, George. "September 2009." Description based on title screen as viewed on November 04, 2009. Author(s) subject terms: Vulnerability Assessment, Supervisory Control and Data Acquisition, SCADA, Critical Infrastructure, Information Assurance, control system Includes bibliographical references (p. 161-170). Also available in print.
38

On achievable rate regions for source coding over networks

Gu, WeiHsin. Effros, Michelle. Effros, Michelle, January 1900 (has links)
Thesis (Ph. D.) -- California Institute of Technology, 2009. / Title from home page (viewed 04/12/2010). Advisor and committee chair names found in the thesis' metadata record in the digital repository. Includes bibliographical references.
39

Performance of multi-channel random access networks /

Lo, Fook-loong. January 1997 (has links)
Thesis (Ph. D.)--University of Hong Kong, 1997. / Includes bibliographical references (leaf 96-102).
40

Single I/O space for scalable cluster computing /

Ho, Sai-chuen. January 2000 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2000. / Includes bibliographical references (leaves 70-74).

Page generated in 0.0849 seconds