• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 1
  • Tagged with
  • 31
  • 31
  • 31
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Mobile agent based attack resistant architecture for distributed intrusion detection system

Selliah, Sentil. January 2001 (has links)
Thesis (M.S.)--West Virginia University, 2001. / Title from document title page. Document formatted into pages; contains vii, 61 p. : ill. Includes abstract. Includes bibliographical references (p. 50-52).
22

Data processing for anomaly detection in web-based applications /

Gaarudapuram Sriraghavan, Rajagopal. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2008. / Printout. Includes bibliographical references (leaves 53-57). Also available on the World Wide Web.
23

Toward email archive intrusion detection /

Li, Yiru. January 1900 (has links)
Thesis (M.C.S.) - Carleton University, 2006. / Includes bibliographical references (p. 89-95). Also available in electronic format on the Internet.
24

GENERTIA a system for vulnerability analysis, design and redesign of immunity-based anomaly detection system /

Hou, Haiyu, Dozier, Gerry V. January 2006 (has links) (PDF)
Dissertation (Ph.D.)--Auburn University, 2006. / Abstract. Vita. Includes bibliographic references (p.149-156).
25

The performance of Group Diffie-Hellman paradigms : a software framework and analysis /

Hagzan, Kieran S. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaf 246).
26

Semi-supervised learning of bitmask pairs for an anomaly-based intrusion detection system

Ardolino, Kyle R. January 2008 (has links)
Thesis (M.S.)--State University of New York at Binghamton, Thomas J. Watson School of Engineering and Applied Science, Department of Electrical Engineering, 2008. / Includes bibliographical references.
27

Applications of GUI usage analysis

Imsand, Eric Shaun. Hamilton, John A., January 2008 (has links) (PDF)
Thesis (Ph. D.)--Auburn University, 2008. / Abstract. Includes bibliographical references (p. 119-122).
28

Querying databases privately a new approach to private information retrieval /

Asonov, Dmitri. January 1900 (has links)
Thesis (doctoral)--Humboldt Universität, Berlin, 2003. / Description based on print version record. Includes bibliographical references (p. [107]-113) and index. Also issued online.
29

Improving routing security using a decentralized public key distribution algorithm /

Goold, Jeremy C., January 2005 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2005. / Includes bibliographical references (p. 59-62).
30

Towards self-healing systems re-establishing trust in compromised systems /

Grizzard, Julian B. January 2006 (has links)
Thesis (Ph. D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2006. / Schwan, Karsten, Committee Member ; Schimmel, David, Committee Member ; Copeland, John, Committee Member ; Owen, Henry, Committee Chair ; Wills, Linda, Committee Member.

Page generated in 0.2381 seconds