• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 41
  • 1
  • Tagged with
  • 42
  • 42
  • 42
  • 7
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

A case-based framework for meta intrusion detection

Long, Jidong. Schwartz, Daniel Guy. January 2006 (has links)
Thesis (Ph. D.)--Florida State University, 2006. / Advisor: Daniel G. Schwartz, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed Sept. 18, 2006). Document formatted into pages; contains xii, 114 pages. Includes bibliographical references.
12

A taxonomy-based approach to intrusion detection system

Sohal, Amandeep Kaur. January 2007 (has links)
Thesis (M.S.)--University of Nevada, Reno, 2007. / "August, 2007." Includes bibliographical references (leaves 61-64). Online version available on the World Wide Web.
13

Three essays on managing information systems security : patch management, learning dynamics, and security software market /

Zhang, Guo Ying, January 2007 (has links)
Thesis (Ph. D.)--University of Washington, 2007. / Vita. Includes bibliographical references (leaves 91-98).
14

Battery-based intrusion detection /

Jacoby, Grant A. , January 2005 (has links)
Thesis (Ph. D.)--Virginia Polytechnic Institute and State University, 2005. / Vita. Includes bibliographical references (p. 207-212) and index. Also available online.
15

Advances in decentralized and stateful access control

Serban, Constantin, January 2008 (has links)
Thesis (Ph. D.)--Rutgers University, 2008. / "Graduate Program in Computer Science." Includes bibliographical references (p. 111-115).
16

General deterrence theory assessing information systems security effectiveness in large versus small businesses /

Schuessler, Joseph H. Windsor, John C., January 2009 (has links)
Thesis (Ph. D.)--University of North Texas, May, 2009. / Title from title page display. Includes bibliographical references.
17

Quantitative metrics for network security evaluation /

El-Hassan, Fadi. January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2007. / Includes bibliographical references (p. 112-122). Also available in electronic format on the Internet.
18

Ensuring a C2 level of trust and interoperability in a networked Windows NT environment

Lucas, Julie A. January 1996 (has links) (PDF)
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, September 1996. / Thesis advisor(s): Gus K. Lott, Cynthia E. Irvine, Rex Buddenberg. "September 1996." Includes bibliographical references (p. 135-140). Also available online.
19

Establishing Regis network security policy

Ortwein, Michael T. January 2005 (has links) (PDF)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2005. / Title from PDF title page (viewed on Dec. 28, 2005). Includes bibliographical references.
20

Anomaly-based botnet detection for 10 Gb/s networks /

Donaldson, Jonathon W. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (p. 67-69).

Page generated in 0.124 seconds