Spelling suggestions: "subject:"computer security"" "subject:"coomputer security""
61 |
TRINETR an intrusion detection alert management and analysis system /Yu, Jinqiao. January 1900 (has links)
Thesis (Ph. D.)--West Virginia University, 2004. / Title from document title page. Document formatted into pages; contains viii, 150 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 104-109).
|
62 |
An economic model of investment in information security /Ye, Ruyi. January 2004 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004. / Includes bibliographical references (leaves 39-41). Also available in electronic version. Access restricted to campus users.
|
63 |
Delaying-type responses for use by software decoys /Julian, Donald P. January 2002 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2002. / Thesis advisor(s): Neil C. Rowe, J. Bret Michael. Includes bibliographical references (p. 55-57). Also available online.
|
64 |
Concurrent auditing on computerized accounting systems /Leung, Chung-pak. January 1998 (has links)
Thesis (M.B.A.)--University of Hong Kong, 1998. / Includes bibliographical references (leaf 47-51).
|
65 |
Static detection and identification of X86 malicious executables a multidisciplinary approach /Wang, Zhiyu. January 2009 (has links)
Thesis (M. Sc.)--University of Alberta, 2009. / Title from PDF file main screen (viewed on Aug. 19, 2009). "A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree of Master of Science, Department of Computing Science, University of Alberta." Includes bibliographical references.
|
66 |
CPG : closed pseudonymous groups /Abbott, Reed S., January 2008 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2008. / Includes bibliographical references (p. 43-44).
|
67 |
Intrusion detection system: ideas from the human immune systemLetaief, Hassine. January 1900 (has links)
Thesis (M.A.)--California State University Channel Islands, 2007. / Submitted in partial fulfillment of the requirements for the degree of Masters Of Science in Computer Science. Title from PDF t.p. (viewed October 22, 2009).
|
68 |
Novel techniques for implementing tamper-resistant softwareLee, Chun-to, Michael, January 2004 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2004. / Also available in print.
|
69 |
An analysis of two layers of encryption to protect network trafficWare, Ryan T. January 2010 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010. / Thesis Advisor(s): Dinolt, George ; Second Reader: Guild, Jennifer. "June 2010." Description based on title screen as viewed on July 15, 2010. Author(s) subject terms: encryption, computer security, network security, architecture, fault tree analysis, defense-in-depth Includes bibliographical references (p. 75-77). Also available in print.
|
70 |
Network exploration and vulnerability assessment using a combined "blackbox" and "whitebox" analysis approachChoong, Patrick Wee Meng. January 2010 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2010. / Thesis Advisor(s): Xie, Geoffrey ; Gibson, John. "March 2010." Description based on title screen as viewed on April 28, 2010. Author(s) subject terms: Network exploration, black-box analysis, white-box analysis, vulnerability assessment. Includes bibliographical references (p. 57-58). Also available in print.
|
Page generated in 0.0826 seconds