• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 691
  • 38
  • 37
  • 14
  • 11
  • 7
  • 6
  • 6
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 1069
  • 1069
  • 305
  • 273
  • 220
  • 216
  • 207
  • 198
  • 156
  • 115
  • 110
  • 104
  • 101
  • 94
  • 93
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

TRINETR an intrusion detection alert management and analysis system /

Yu, Jinqiao. January 1900 (has links)
Thesis (Ph. D.)--West Virginia University, 2004. / Title from document title page. Document formatted into pages; contains viii, 150 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 104-109).
62

An economic model of investment in information security /

Ye, Ruyi. January 2004 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004. / Includes bibliographical references (leaves 39-41). Also available in electronic version. Access restricted to campus users.
63

Delaying-type responses for use by software decoys /

Julian, Donald P. January 2002 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2002. / Thesis advisor(s): Neil C. Rowe, J. Bret Michael. Includes bibliographical references (p. 55-57). Also available online.
64

Concurrent auditing on computerized accounting systems /

Leung, Chung-pak. January 1998 (has links)
Thesis (M.B.A.)--University of Hong Kong, 1998. / Includes bibliographical references (leaf 47-51).
65

Static detection and identification of X86 malicious executables a multidisciplinary approach /

Wang, Zhiyu. January 2009 (has links)
Thesis (M. Sc.)--University of Alberta, 2009. / Title from PDF file main screen (viewed on Aug. 19, 2009). "A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree of Master of Science, Department of Computing Science, University of Alberta." Includes bibliographical references.
66

CPG : closed pseudonymous groups /

Abbott, Reed S., January 2008 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2008. / Includes bibliographical references (p. 43-44).
67

Intrusion detection system: ideas from the human immune system

Letaief, Hassine. January 1900 (has links)
Thesis (M.A.)--California State University Channel Islands, 2007. / Submitted in partial fulfillment of the requirements for the degree of Masters Of Science in Computer Science. Title from PDF t.p. (viewed October 22, 2009).
68

Novel techniques for implementing tamper-resistant software

Lee, Chun-to, Michael, January 2004 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2004. / Also available in print.
69

An analysis of two layers of encryption to protect network traffic

Ware, Ryan T. January 2010 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010. / Thesis Advisor(s): Dinolt, George ; Second Reader: Guild, Jennifer. "June 2010." Description based on title screen as viewed on July 15, 2010. Author(s) subject terms: encryption, computer security, network security, architecture, fault tree analysis, defense-in-depth Includes bibliographical references (p. 75-77). Also available in print.
70

Network exploration and vulnerability assessment using a combined "blackbox" and "whitebox" analysis approach

Choong, Patrick Wee Meng. January 2010 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2010. / Thesis Advisor(s): Xie, Geoffrey ; Gibson, John. "March 2010." Description based on title screen as viewed on April 28, 2010. Author(s) subject terms: Network exploration, black-box analysis, white-box analysis, vulnerability assessment. Includes bibliographical references (p. 57-58). Also available in print.

Page generated in 0.068 seconds