Spelling suggestions: "subject:"eomputer security"" "subject:"aomputer security""
121 |
An anonymity scheme for file retrieval systemsTang, Wai-hung, January 2008 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2008. / Includes bibliographical references (leaf 64-72) Also available in print.
|
122 |
Secure group communication in ad hoc networks /Ding, Yuying, January 1900 (has links)
Thesis (M.Sc.) - Carleton University, 2002. / Includes bibliographical references (p. 94-98). Also available in electronic format on the Internet.
|
123 |
Anomaly detection from aviation safety reports /Raghuraman, Suraj, January 2008 (has links)
Thesis (M.S.)--University of Texas at Dallas, 2008. / Includes vita. Includes bibliographical references (leaves 39-40)
|
124 |
Secure data aggregation in wireless sensor networksRoy, Sankardas, January 2008 (has links)
Thesis (Ph.D.)--George Mason University, 2008. / Vita: p. 124. Thesis directors: Sushil Jajodia, Sanjeev Setia Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed Jan. 11, 2009). Includes bibliographical references (p. 120-123). Also issued in print.
|
125 |
Using game theory to mitigate the effects of a bioterrorist attack /Layfield, Ryan Patrick, January 2008 (has links)
Thesis (Ph.D.)--University of Texas at Dallas, 2008. / Includes vita. Includes bibliographical references (leaves 114-120)
|
126 |
Scalable role & organization based access control and its administrationZhang, Zhixiong. January 2008 (has links)
Thesis (Ph.D.)--George Mason University, 2008. / Vita: p. 121. Thesis directors: Ravi S. Sandhu, Daniel Menascé. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed July 7, 2008). Includes bibliographical references (p. 113-120). Also issued in print.
|
127 |
Firewall monitoring using intrusion detection systems/Asarcıklı, Şükran. Tuğlular, Tuğkan. January 2005 (has links) (PDF)
Thesis (Master)--İzmir Institute of Technology, İzmir, 2005 / Keywords: Intrusion detection system, firewall. Includes bibliographical references (leaves 79-81)
|
128 |
Covert timing channel analysis in MLS real-time systems /Son, Joon. January 1900 (has links)
Thesis (Ph. D., Computer Science)--University of Idaho, May 2008. / Major professor: Jim Alves-Foss. Includes bibliographical references (leaves 107-115). Also available online (PDF file) by subscription or by purchasing the individual file.
|
129 |
The authorization calculusHumenn, Polar. January 2008 (has links)
Thesis (Ph.D.)--Syracuse University, 2008. / "Publication number: AAT 3323062."
|
130 |
Information system security self-efficacy and security effectiveness in Florida libraries /Phelps, Daniel C. Gathegi, John Ng'ang'a. January 2005 (has links)
Thesis (Ph. D.)--Florida State University, 2005. / Advisor: Dr. John N. Gathegi, Florida State University, College of Information. Title and description from dissertation home page (viewed June 13, 2005). Document formatted into pages; contains ix, 103 pages. Includes bibliographical references.
|
Page generated in 0.0659 seconds