Spelling suggestions: "subject:"computer networks data protection."" "subject:"computer networks mata protection.""
1 |
Mobile agent protection with data encapsulation and execution tracingSuen, Anna. Yasinsac, Alec. January 2003 (has links)
Thesis (M.S.)--Florida State University, 2003. / Advisor: Dr. Alec Yasinsac, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed Oct. 6, 2003). Includes bibliographical references.
|
2 |
A distributed scheme to detect and defend against distributed denial of service attacks /Li, Chi-Pan. January 2003 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2003. / Includes bibliographical references (leaves 102-107). Also available in electronic version. Access restricted to campus users.
|
3 |
A new model for computer network security risk analysis /Martel, Sophie, January 1900 (has links)
Thesis (M.Eng.) - Carleton University, 2002. / Includes bibliographical references (p. 167-172). Also available in electronic format on the Internet.
|
4 |
Web-based dissemination system for the Trusted Computing Exemlar [i.e. Exemplar] project /Kane, Douglas Robert. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 127-128). Also available online.
|
5 |
Secure management of networked storage services models and techniques /Singh, Aameek. January 2007 (has links)
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2008. / Liu, Ling, Committee Chair ; Aberer, Karl, Committee Member ; Ahamad, Mustaque, Committee Member ; Blough, Douglas, Committee Member ; Pu, Calton, Committee Member ; Voruganti, Kaladhar, Committee Member.
|
Page generated in 0.1599 seconds