Spelling suggestions: "subject:"computer security."" "subject:"coomputer security.""
41 |
Active electromagnetic attacks on secure hardwareMarkettos, Athanasios Theodore January 2011 (has links)
No description available.
|
42 |
An In-memory Database for Prototyping Anomaly Detection Algorithms at Gigabit SpeedsFriesen, Travis 11 September 2013 (has links)
The growing speeds of computer networks are pushing the ability of anomaly detection algorithms and related systems to their limit. This thesis discusses the design of the Object Database, ODB, an analysis framework for evaluating anomaly detection algorithms in real time at gigabit or better speeds. To accomplish this, the document also discusses the construction a new dataset with known anomalies for verification purposes. Lastly, demonstrating the efficacy of the system required the implementation of an existing algorithm on the evaluation system and the demonstration that while the system is suitable for the evaluation of anomaly detection algorithms, this particular anomaly detection algorithm was deemed not appropriate for use at the packet-data level.
|
43 |
An In-memory Database for Prototyping Anomaly Detection Algorithms at Gigabit SpeedsFriesen, Travis 11 September 2013 (has links)
The growing speeds of computer networks are pushing the ability of anomaly detection algorithms and related systems to their limit. This thesis discusses the design of the Object Database, ODB, an analysis framework for evaluating anomaly detection algorithms in real time at gigabit or better speeds. To accomplish this, the document also discusses the construction a new dataset with known anomalies for verification purposes. Lastly, demonstrating the efficacy of the system required the implementation of an existing algorithm on the evaluation system and the demonstration that while the system is suitable for the evaluation of anomaly detection algorithms, this particular anomaly detection algorithm was deemed not appropriate for use at the packet-data level.
|
44 |
A software implementation of an Internet Security Access Control Scheme (ISACS) through TCP/IP protocolsErtaul, Levent January 1994 (has links)
No description available.
|
45 |
Modular exponential accelerator chip for RSA cryptography /Ramschie, Victor William Unknown Date (has links)
Thesis (MEng (Electro Sys))--University of South Australia, 1999
|
46 |
HybrIDS embeddable hybrid intrusion detection system /Lauf, Adrian Peter. January 2007 (has links)
Thesis (M.S. in Electrical Engineering)--Vanderbilt University, Dec. 2007. / Title from title screen. Includes bibliographical references.
|
47 |
Perturbation based privacy preserving data mining techniques for real-world data /Liu, Li. January 2008 (has links)
Thesis (Ph. D.)--University of Texas at Dallas, 2008. / Includes vita. Includes bibliographical references (leaves 90-95)
|
48 |
Security in association rule miningWong, Wai-kit, January 2007 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2008. / Also available in print.
|
49 |
Towards measurable and tunable security /Lundin, Reine, January 2007 (has links)
Licentiatavhandling Karlstad : Karlstads universitet, 2007.
|
50 |
Information flow properties for cyber-physical systemsAkella, Ravi Chandra, January 2009 (has links) (PDF)
Thesis (M.S.)--Missouri University of Science and Technology, 2009. / Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 15, 2009) Includes bibliographical references (p. 34-36).
|
Page generated in 0.0717 seconds