Spelling suggestions: "subject:"computer networks computer security."" "subject:"computer networks coomputer security.""
11 |
A case-based framework for meta intrusion detectionLong, Jidong. Schwartz, Daniel Guy. January 2006 (has links)
Thesis (Ph. D.)--Florida State University, 2006. / Advisor: Daniel G. Schwartz, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed Sept. 18, 2006). Document formatted into pages; contains xii, 114 pages. Includes bibliographical references.
|
12 |
A taxonomy-based approach to intrusion detection systemSohal, Amandeep Kaur. January 2007 (has links)
Thesis (M.S.)--University of Nevada, Reno, 2007. / "August, 2007." Includes bibliographical references (leaves 61-64). Online version available on the World Wide Web.
|
13 |
Three essays on managing information systems security : patch management, learning dynamics, and security software market /Zhang, Guo Ying, January 2007 (has links)
Thesis (Ph. D.)--University of Washington, 2007. / Vita. Includes bibliographical references (leaves 91-98).
|
14 |
Battery-based intrusion detection /Jacoby, Grant A. , January 2005 (has links)
Thesis (Ph. D.)--Virginia Polytechnic Institute and State University, 2005. / Vita. Includes bibliographical references (p. 207-212) and index. Also available online.
|
15 |
Advances in decentralized and stateful access controlSerban, Constantin, January 2008 (has links)
Thesis (Ph. D.)--Rutgers University, 2008. / "Graduate Program in Computer Science." Includes bibliographical references (p. 111-115).
|
16 |
General deterrence theory assessing information systems security effectiveness in large versus small businesses /Schuessler, Joseph H. Windsor, John C., January 2009 (has links)
Thesis (Ph. D.)--University of North Texas, May, 2009. / Title from title page display. Includes bibliographical references.
|
17 |
Quantitative metrics for network security evaluation /El-Hassan, Fadi. January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2007. / Includes bibliographical references (p. 112-122). Also available in electronic format on the Internet.
|
18 |
Ensuring a C2 level of trust and interoperability in a networked Windows NT environmentLucas, Julie A. January 1996 (has links) (PDF)
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, September 1996. / Thesis advisor(s): Gus K. Lott, Cynthia E. Irvine, Rex Buddenberg. "September 1996." Includes bibliographical references (p. 135-140). Also available online.
|
19 |
Establishing Regis network security policyOrtwein, Michael T. January 2005 (has links) (PDF)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2005. / Title from PDF title page (viewed on Dec. 28, 2005). Includes bibliographical references.
|
20 |
Anomaly-based botnet detection for 10 Gb/s networks /Donaldson, Jonathon W. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (p. 67-69).
|
Page generated in 0.124 seconds