• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 690
  • 38
  • 37
  • 14
  • 11
  • 7
  • 6
  • 6
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 1068
  • 1068
  • 304
  • 273
  • 219
  • 216
  • 207
  • 198
  • 156
  • 115
  • 110
  • 104
  • 100
  • 94
  • 93
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
231

Rare category detection using hierarchical mean shift /

Vatturi, Pavan Kumar. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2009. / Printout. Includes bibliographical references (leaves 45-46). Also available on the World Wide Web.
232

Towards virtual machine integrity using introspection /

Lin, Sammy. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 22-23).
233

Cyberwarfare as an element of PRC national power and its implications for U. S. national security /

Mazanec, Brian M., January 1900 (has links)
Thesis (M.S.)--Missouri State University, 2008. / "December 2008." Includes bibliographical references (leaves 91-97). Also available online.
234

An attack resistant approach to vulnerability scanner design

Shaver, David Phillip. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 2005 / Title from document title page. Document formatted into pages; contains x, 122 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 120-122).
235

An approach to vulnerability assessment for Navy Supervisory Control and Data Acquisition (SCADA) system /

Hart, Dennis. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Cynthia E. Irvine, Karen Burke. Includes bibliographical references (p. 161-162). Also available online.
236

Cyberciege scenario illustrating integrity risks to a military like facility /

Fielk, Klaus W. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Cynthia E. Irvine, Paul C. Clark. Includes bibliographical references (p. 97-101). Also available online.
237

Methods of detecting intrusions in security protocols

Sherwood, Robert William. Burmester, Mike. January 2004 (has links)
Thesis (M. S.)--Florida State University, 2004. / Advisor: Dr. Mike Burmester, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed Jan. 18, 2005). Includes bibliographical references.
238

Long-lived authentication protocols for critical infrastructure process control systems

Chakravarthy, Rasika Mudumbai. January 2009 (has links) (PDF)
Thesis (M.S. in computer science )--Washington State University, May 2009. / Title from PDF title page (viewed on March 29, 2010). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 112-115).
239

Geographic location of a computer node examining a time-to-location algorithm and multiple autonomous system networks /

Sorgaard, Duane C. January 2004 (has links)
Thesis (M.S.)--Air University, Ohio, 2004. / Cover title. Includes bibliographical references (p. B1-B3). Full text document available on public STINET.
240

Battery-based intrusion detection /

Jacoby, Grant A. , January 2005 (has links)
Thesis (Ph. D.)--Virginia Polytechnic Institute and State University, 2005. / Vita. Includes bibliographical references (p. 207-212) and index. Also available online.

Page generated in 0.1078 seconds