Spelling suggestions: "subject:"computer networks computer security."" "subject:"computer networks coomputer security.""
1 |
On the application of locality to network intrusion detection working-set analysis of real and synthetic network server traffic /Lee, Robert. January 2009 (has links)
Thesis (Ph.D.)--University of Central Florida, 2009. / Adviser: Sheau-Dong Lang. Includes bibliographical references (p. 117-119).
|
2 |
Information flow properties for cyber-physical systemsAkella, Ravi Chandra, January 2009 (has links) (PDF)
Thesis (M.S.)--Missouri University of Science and Technology, 2009. / Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 15, 2009) Includes bibliographical references (p. 34-36).
|
3 |
A Strategy for defending against Distributed Denial of Service attacks /Whyte, David L., January 1900 (has links)
Thesis (M.C.S.)--Carleton University, 2002. / Includes bibliographical references (p. 142-151). Also available in electronic format on the Internet.
|
4 |
Mitigating the botnet problem from victim to botmaster /Ramsbrock, Daniel. January 2008 (has links)
Thesis (M.S.)--George Mason University, 2008. / Vita: p. 82. Thesis director: Xinyuan Wang. Submitted in partial fulfillment of the requirements for the degree of Master of Science in Information Security and Assurance. Title from PDF t.p. (viewed July 7, 2008). Includes bibliographical references (p. 78-81). Also issued in print.
|
5 |
Development of a Quality Assurance Prototype for Intrusion Detection Systems/Yüksel, Ulaş. Tuğlular, Tuğkan January 2002 (has links) (PDF)
Thesis (Master)-- İzmir Institute of Technology, İzmir, 20024 / Includes bibliographical references (leaves. 75-79).
|
6 |
DNS rebinding attacksKokkinopoulos, Georgios. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Xie, Geoffrey G. ; Gibson, John H. "September 2009." Description based on title screen as viewed on 4 November 2009. Author(s) subject terms: Network security, DNS rebinding, DNS pinning, same origin policy, anti DNS pinning, adobe security updates, DNS STIG, Windows Vista security, split DNS. Includes bibliographical references (p. 107-110). Also available in print.
|
7 |
Network exploration and vulnerability assessment using a combined "blackbox" and "whitebox" analysis approachChoong, Patrick Wee Meng. January 2010 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2010. / Thesis Advisor(s): Xie, Geoffrey ; Gibson, John. "March 2010." Description based on title screen as viewed on April 28, 2010. Author(s) subject terms: Network exploration, black-box analysis, white-box analysis, vulnerability assessment. Includes bibliographical references (p. 57-58). Also available in print.
|
8 |
An anonymity scheme for file retrieval systemsTang, Wai-hung, January 2008 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2008. / Includes bibliographical references (leaf 64-72) Also available in print.
|
9 |
Distributed deployment of therminators in the network /Cheng, Kah Wai. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Dec. 2004. / Thesis Advisor(s): John C. McEachen. Includes bibliographical references (p. 87-88). Also available online.
|
10 |
RIOT : a responsive system for mitigating computer network epidemics and attacks /Balthrop, Justin Lewis. January 2005 (has links) (PDF)
Thesis (M.S.)--University of New Mexico, 2005. / "July, 2005." Includes bibliographical references (leaves 69-74). Also available online.
|
Page generated in 0.1245 seconds