Spelling suggestions: "subject:"computer security. data protection."" "subject:"computer security. mata protection.""
1 |
Intrusion detection system: ideas from the human immune systemLetaief, Hassine. January 1900 (has links)
Thesis (M.A.)--California State University Channel Islands, 2007. / Submitted in partial fulfillment of the requirements for the degree of Masters Of Science in Computer Science. Title from PDF t.p. (viewed October 22, 2009).
|
2 |
A framework for supporting anonymity in text-based online conversations /Lee, Andrew Wei Tien. January 2001 (has links)
Thesis (MSc(CompSc) -- Bond University, 2001. / "A thesis submitted to Bond University in fulfillment of the requirements for the degree of Masters of Science in Computer Science"-- t.p. Bibliography: leaves 124-125. Also available via the World Wide Web.
|
3 |
A secure e-course copyright protection infrastructureYau, Cho-ki, Joe. January 2006 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2006. / Title proper from title frame. Also available in printed format.
|
4 |
Automated detection and containment of stealth attacks on the operating system kernelBaliga, Arati. January 2009 (has links)
Thesis (Ph. D.)--Rutgers University, 2009. / "Graduate Program in Computer Science." Includes bibliographical references (p. 99-103).
|
5 |
A socio-technical perspective on information security knowledge and attitudes /Long, Cheri Lanette, January 1999 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 1999. / Vita. Includes bibliographical references (leaves 210-223). Available also in a digital version from Dissertation Abstracts.
|
6 |
Preserving privacy with user-controlled sharing of verified informationBauer, David Allen. January 2009 (has links)
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2010. / Committee Chair: Blough, Douglas; Committee Member: Ahamad, Mustaque; Committee Member: Liu, Ling; Committee Member: Riley, George; Committee Member: Yalamanchili, Sudha. Part of the SMARTech Electronic Thesis and Dissertation Collection.
|
7 |
Advanced methods for detection of malicious softwareVolynkin, Alexander S. January 2007 (has links)
Thesis (Ph. D.)--State University of New York at Binghamton, Electrical and Computer Engineering Department, Watson School, 2007. / Includes bibliographical references.
|
8 |
Robust digital watermarking of multimedia objectsGupta, Gaurav. January 2008 (has links)
Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Department of Computing, 2008. / Bibliography: p. 144-153.
|
9 |
Secure distribution of open source information /Rogers, Jason Lee. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2004. / Thesis advisor(s): George Dinolt. Includes bibliographical references (p. 57-59). Also available online.
|
10 |
Flexible authorizations in workflow management systemsLui, W. C. January 2002 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2003. / Includes bibliographical references (leaves 162-168) Also available in print.
|
Page generated in 0.1346 seconds