Spelling suggestions: "subject:"computer networks computer security."" "subject:"computer networks aomputer security.""
31 |
A trusted environment for MPI programsFlorez-Larrahondo, German, January 2002 (has links)
Thesis (M.S.)--Mississippi State University. Department of Computer Science. / Title from title screen. Includes bibliographical references.
|
32 |
Using Web bugs and honeytokens to investigate the source of phishing attacksMcRae, Craig Michael, January 2008 (has links)
Thesis (M.S.)--Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
|
33 |
On formal specification of authorization policies and their transformations : thesis /Bai, Yun. January 2000 (has links)
Thesis (Ph.D.)--University of Western Sydney, 2000. / "A thesis submitted for the degree of Doctor of Philosophy at University of Western Sydney - Nepean." "September 2000." Bibliography : leaves 141-150.
|
34 |
WSACT - a model for Web Services Access Control incorporating TrustCoetzee, Marijke. January 2006 (has links)
Thesis (D.Phil.(Computer Science))--University of Pretoria, 2006. / Includes bibliographical references.
|
35 |
Logic programming based formal representations for authorization and security protocolsWang, Shujing. January 2008 (has links)
Thesis (Ph.D.) -- University of Western Sydney, 2008. / A thesis submitted for the degree of Doctor of Philosophy to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics. Includes bibliography.
|
36 |
The development of a graduate course on identity management for the Department of Networking, Security, and Systems Administration /Mitchell, Marsha. January 2008 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2008. / Typescript. Includes bibliographical references (leaves 102-103).
|
37 |
Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks /Schmidt, Mark Bradley, January 2006 (has links)
Thesis (Ph. D.)--Mississippi State University. College of Business and Industry. / Includes bibliographical references.
|
38 |
A dynamic, perimeter based, community-centric access control systemChapman, Adam Scott. Burmester, Mike. January 2006 (has links)
Thesis (M.S.)--Florida State University, 2006. / Advisor: Mike Burmester, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 15, 2006). Document formatted into pages; contains viii, 48 pages. Includes bibliographical references.
|
39 |
Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networksSchmidt, Mark Bradley, January 2006 (has links)
Thesis (Ph.D.) -- Mississippi State University. College of Business and Industry. / Title from title screen. Includes bibliographical references. Also available in print.
|
40 |
A unified alert fusion model for intelligent analysis of sensor data in an intrusion detection environmentSiraj, Ambareen, January 2006 (has links)
Thesis (Ph.D.) -- Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
|
Page generated in 0.0777 seconds