Spelling suggestions: "subject:"computer crimes. computer networks"" "subject:"computer crimes. coomputer networks""
1 |
Framework for botnet emulation and analysisLee, Christopher Patrick. January 2009 (has links)
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009. / Committee Chair: Copeland, John; Committee Member: Durgin, Gregory; Committee Member: Goodman, Seymour; Committee Member: Owen, Henry; Committee Member: Riley, George.
|
2 |
Development of a cyber attack simulator for network modeling and cyber security analysis /Costantini, Kevin C. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaves 155-157).
|
3 |
Process forensics the crossroads of checkpointing and intrusion detection /Foster, Mark S. January 2004 (has links)
Thesis (Ph. D.)--University of Florida, 2004. / Title from title page of source document. Document formatted into pages; contains 97 pages. Includes vita. Includes bibliographical references.
|
4 |
Using Web bugs and honeytokens to investigate the source of phishing attacksMcRae, Craig Michael, January 2008 (has links)
Thesis (M.S.)--Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
|
Page generated in 0.1128 seconds