Spelling suggestions: "subject:"computer security. computer software"" "subject:"computer security. coomputer software""
1 |
An application of Alloy to static analysis for secure information flow and verification of software systemsShaffer, Alan B. January 2008 (has links) (PDF)
Dissertation (Ph.D. in Computer Science)--Naval Postgraduate School, December 2008. / Dissertation Supervisor: Auguston, Mikhail. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 87-93). Also available in print.
|
2 |
A generic software architecture for deception-based intrusion detection and response systems /Uzuncaova, Engin. January 2003 (has links) (PDF)
Thesis (M.S. in Computer Science and M.S. in Software Engineering)--Naval Postgraduate School, March 2003. / Thesis advisor(s): James Bret Michael, Richard Riehle. Includes bibliographical references (p. 63-66). Also available online.
|
3 |
Quantitative metrics for network security evaluation /El-Hassan, Fadi. January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2007. / Includes bibliographical references (p. 112-122). Also available in electronic format on the Internet.
|
4 |
Using random projections for dimensionality reduction in identifying rogue applicationsAtkison, Travis Levestis, January 2009 (has links)
Thesis (Ph.D.)--Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
|
Page generated in 0.0694 seconds