Spelling suggestions: "subject:"computer security"" "subject:"coomputer security""
231 |
Rare category detection using hierarchical mean shift /Vatturi, Pavan Kumar. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2009. / Printout. Includes bibliographical references (leaves 45-46). Also available on the World Wide Web.
|
232 |
Towards virtual machine integrity using introspection /Lin, Sammy. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 22-23).
|
233 |
Cyberwarfare as an element of PRC national power and its implications for U. S. national security /Mazanec, Brian M., January 1900 (has links)
Thesis (M.S.)--Missouri State University, 2008. / "December 2008." Includes bibliographical references (leaves 91-97). Also available online.
|
234 |
An attack resistant approach to vulnerability scanner designShaver, David Phillip. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 2005 / Title from document title page. Document formatted into pages; contains x, 122 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 120-122).
|
235 |
An approach to vulnerability assessment for Navy Supervisory Control and Data Acquisition (SCADA) system /Hart, Dennis. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Cynthia E. Irvine, Karen Burke. Includes bibliographical references (p. 161-162). Also available online.
|
236 |
Cyberciege scenario illustrating integrity risks to a military like facility /Fielk, Klaus W. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Cynthia E. Irvine, Paul C. Clark. Includes bibliographical references (p. 97-101). Also available online.
|
237 |
Methods of detecting intrusions in security protocolsSherwood, Robert William. Burmester, Mike. January 2004 (has links)
Thesis (M. S.)--Florida State University, 2004. / Advisor: Dr. Mike Burmester, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed Jan. 18, 2005). Includes bibliographical references.
|
238 |
Long-lived authentication protocols for critical infrastructure process control systemsChakravarthy, Rasika Mudumbai. January 2009 (has links) (PDF)
Thesis (M.S. in computer science )--Washington State University, May 2009. / Title from PDF title page (viewed on March 29, 2010). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 112-115).
|
239 |
Geographic location of a computer node examining a time-to-location algorithm and multiple autonomous system networks /Sorgaard, Duane C. January 2004 (has links)
Thesis (M.S.)--Air University, Ohio, 2004. / Cover title. Includes bibliographical references (p. B1-B3). Full text document available on public STINET.
|
240 |
Battery-based intrusion detection /Jacoby, Grant A. , January 2005 (has links)
Thesis (Ph. D.)--Virginia Polytechnic Institute and State University, 2005. / Vita. Includes bibliographical references (p. 207-212) and index. Also available online.
|
Page generated in 0.0519 seconds