Spelling suggestions: "subject:"computer networks"" "subject:"coomputer networks""
201 |
Passive fingerprinting of computer network reconnaissance toolsBeecroft, Alexander J. January 2009 (has links) (PDF)
Thesis (M.S. in Information Warfare Systems Engineering)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Michael, James B. "September 2009." Description based on title screen as viewed on November 04, 2009. Author(s) subject terms: Cyberspace defense, network defense, passive fingerprinting, computer network reconnaissance, network scanning, port scanning Includes bibliographical references (p. 67-69). Also available in print.
|
202 |
DNS rebinding attacksKokkinopoulos, Georgios. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Xie, Geoffrey G. ; Gibson, John H. "September 2009." Description based on title screen as viewed on 4 November 2009. Author(s) subject terms: Network security, DNS rebinding, DNS pinning, same origin policy, anti DNS pinning, adobe security updates, DNS STIG, Windows Vista security, split DNS. Includes bibliographical references (p. 107-110). Also available in print.
|
203 |
Semi-analytical and numerical studies on the dynamics of scale-free complex networkChan, Ho-yin, January 2010 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2010. / Includes bibliographical references (leaves 53-55). Also available in print.
|
204 |
An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises /Sherman, Michael A. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004. / Thesis Advisor(s): Cynthia E. Irvine, J.D. Fulp. Includes bibliographical references (p. 155-159). Also available online.
|
205 |
Cooperative resource discovery and sharing in group communicationsLee, Jangwon, January 2003 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2003. / Vita. Includes bibliographical references. Available also from UMI Company.
|
206 |
Network-layer selective security /Deccio, Casey T., January 2004 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2004. / Includes bibliographical references (p. 51-54).
|
207 |
Flow-based dynamic routing in uncertain network environmentsSu, Xun. January 2002 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2002. / Vita. Includes bibliographical references. Available also from UMI Company.
|
208 |
Developing a reliable methodology for assessing the computer network operations threat of North Korea /Brown, Christopher. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Dorothy Denning. Includes bibliographical references (p. 67-76). Also available online.
|
209 |
Implementation of a policy-based intrusion detection system--Generic Intrusion Detection Model (GIDEM version 1.1)Gandre, Amit Prafullachandra. January 2001 (has links)
Thesis (M.S.)--University of Florida, 2001. / Title from title page of source document. Document formatted into pages; contains vi, 66 p.; also contains graphics. Includes vita. Includes bibliographical references.
|
210 |
Congestion toll pricing models and methods for variable demand networksYildirim, Mehmet Bayram. January 2001 (has links)
Thesis (Ph. D.)--University of Florida, 2001. / Title from title page of source document. Document formatted into pages; contains xi, 154 p.; also contains graphics. Includes vita. Includes bibliographical references.
|
Page generated in 0.0479 seconds