• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 691
  • 38
  • 37
  • 14
  • 11
  • 7
  • 6
  • 6
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 1069
  • 1069
  • 305
  • 273
  • 220
  • 216
  • 207
  • 198
  • 156
  • 115
  • 110
  • 104
  • 101
  • 94
  • 93
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networks

Atkins, William Dee, January 2007 (has links) (PDF)
Thesis (M.S.)--University of Missouri--Rolla, 2007. / Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 11, 2007) Includes bibliographical references (p. 54-55).
12

Quantitative risk assessment model for software security in the design phase of software development

Mkpong-Ruffin, Idongesit Okon. Umphress, David A. Hamilton, John A. January 2009 (has links)
Dissertation (Ph.D.)--Auburn University, 2009. / Abstract. Includes bibliographic references (p.78-83).
13

A framework for automated management of exploit testing environments

Flansburg, Kevin 27 May 2016 (has links)
To demonstrate working exploits or vulnerabilities, people often share their findings as a form of proof-of-concept (PoC) prototype. Such practices are particularly useful to learn about real vulnerabilities and state-of-the-art exploitation techniques. Unfortunately, the shared PoC exploits are seldom reproducible; in part because they are often not thoroughly tested, but largely because authors lack a formal way to specify the tested environment or its dependencies. Although exploit writers attempt to overcome such problems by describing their dependencies or testing environments using comments, this informal way of sharing PoC exploits makes it hard for exploit authors to achieve the original goal of demonstration. More seriously, these non- or hard-to-reproduce PoC exploits have limited potential to be utilized for other useful research purposes such as penetration testing, or in benchmark suites to evaluate defense mechanisms. In this paper, we present XShop, a framework and infrastructure to describe environments and dependencies for exploits in a formal way, and to automatically resolve these constraints and construct an isolated environment for development, testing, and to share with the community. We show how XShop's flexible design enables new possibilities for utilizing these reproducible exploits in five practical use cases: as a security benchmark suite, in pen-testing, for large scale vulnerability analysis, as a shared development environment, and for regression testing. We design and implement such applications by extending the XShop framework and demonstrate its effectiveness with twelve real exploits against well-known bugs that include GHOST, Shellshock, and Heartbleed. We believe that the proposed practice not only brings immediate incentives to exploit authors but also has the potential to be grown as a community-wide knowledge base.
14

Security in association rule mining

Wong, Wai-kit, 王偉傑 January 2007 (has links)
published_or_final_version / abstract / Computer Science / Master / Master of Philosophy
15

Novel techniques for implementing tamper-resistant software

Lee, Chun-to, Michael, 李俊圖 January 2004 (has links)
published_or_final_version / Computer Science and Information Systems / Master / Master of Philosophy
16

Microcomputer based security system

Kebaisy, M. M. January 1986 (has links)
No description available.
17

Fast algorithms for implementation of public-key cryptosystems : VLSI simulation of modified algorithm to increase the speed of public-key cryptosystem (RSA) implementation

Al-Tuwaijry, Fahd A. A. January 1992 (has links)
No description available.
18

SPACE : SPatial Access Control for collaborative virtual Environments

Bullock, Adrian January 1999 (has links)
No description available.
19

A Linux framework for firewall testing

Prabhakar, Durga. 10 April 2008 (has links)
No description available.
20

PBit : a pattern based testing framework for Linux iptables

Du, Yong. 10 April 2008 (has links)
Firewall testing is important because fifewall faults can lead to security failures. Firewall testing is hard because firewall rules havdp&a+eters, producing a huge number of possible parameter combinations. This thesis presents a firewall testing methodology based on test templates, which are parameterized test cases. A firewall testing framework for iptables, the Linux firewall subsystem, has been implemented. Twelve test templates have been created for testing iptables parameters and extensions. A GUI tool is also provided to integrate these test templates with various test generation strategies. The most important of these strategies, painvise generation, has been investigated in detail. Based on the investigation, we developed an improved painvise generation algorithm.

Page generated in 0.0646 seconds