Spelling suggestions: "subject:"computer networks computer networks"" "subject:"computer networks coomputer networks""
11 |
An analysis of the secure routing protocol for mobile ad hoc network route discovery using intuitive reasoning and formal verification to identify flaws /Marshall, John D., Yasinsac, Alec. January 2003 (has links)
Thesis (M.S.)--Florida State University, 2003. / Advisor: Dr. Alec Yasinsac, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed Oct. 3, 2003). Includes bibliographical references.
|
12 |
Using TCP models to understand bandwidth assurance in a DiffServ network /Baines, Mandeep Singh, January 1900 (has links)
Thesis (M. App. Sc.)--Carleton University, 2002. / Includes bibliographical references (p. 51-52). Also available in electronic format on the Internet.
|
13 |
Implementing a global anti-dos service based on random overlay networkShen, Wen-Chuan. January 2004 (has links)
Thesis (M.S.)--University of Florida, 2004. / Title from title page of source document. Document formatted into pages; contains 84 pages. Includes vita. Includes bibliographical references.
|
14 |
Automated system for load-balancing EBGP peersWallace, Brian T. January 2004 (has links)
Thesis (M.E.)--University of Florida, 2004. / Title from title page of source document. Document formatted into pages; contains 60 pages. Includes vita. Includes bibliographical references.
|
15 |
Between local and global : scale and boundary in the emerging network society /Uncapher, Neil Willard, January 2000 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2000. / Vita. Includes bibliographical references (leaves 349-382). Available also in a digital version from Dissertation Abstracts.
|
16 |
Prospects for cyber deterrenceMoore, Ryan J. January 2008 (has links) (PDF)
Thesis (M.S. in Information Operations)--Naval Postgraduate School, December 2008. / Thesis Advisor(s): Arquilla, John J. ; Denning, Dorothy E. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 77-83). Also available in print.
|
17 |
Intrusion detection in mobile adhoc networks /Kumar, Kavitha. January 2009 (has links)
Thesis (M.S.)--University of Toledo, 2009. / Typescript. "Submitted to the Graduate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Engineering." "A thesis entitled"--at head of title. Bibliography: leaves 80-84.
|
18 |
Direct online/offline digital signatures schemesYu, Ping. Tate, Stephen R., January 2008 (has links)
Thesis (Ph. D.)--University of North Texas, Dec., 2008. / Title from title page display. Includes bibliographical references.
|
19 |
Evaluating the effectiveness of an intrusion prevention system-honeypot hybrid /Tamagna-Darr, Lucas. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaf 30).
|
20 |
Real-time fusion and projection of network intrusion activity /Byers, Stephen Reed. January 2008 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2008. / Typescript. Includes bibliographical references (leaves 65-68).
|
Page generated in 0.0873 seconds