• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 32
  • 4
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 63
  • 38
  • 25
  • 22
  • 14
  • 9
  • 9
  • 9
  • 9
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

From sticks and stones to zeros and ones the development of computer network operations as an element of warfare : a study of the Palestinian-Israeli cyberconflict and what the United States can learn from the "Interfada"

Wrona, Jacqueline-Marie Wilson. 09 1900 (has links)
The Palestinian-Israeli Cyberconflict erupted in 2000, when Israeli hackers crippled the prime website of Hezbollah by mobilizing pro-Israeli supporters to "bomb" the site with automated floods of electronic mail. In retaliation, Hezbollah rallied pro-Arab supporters for a counter-attack, which soon downed the main Israeli government website and the Israeli Foreign Ministry site. Attacks involving website defacements, denial-of-service, viruses, and Trojan horses occurred by both parties for a span of months, effectively shutting down websites, disrupting Internet service and e-commerce. A study and analysis of the utilization and effects of Computer Network Operations (CNO) between pro-Israeli and pro-Palestinian actors during the al-Aqsa Intifada may highlight current trends in warfare, support the notion that information may level the battlefield, and provide the United States with the means to better protect itself against such attacks in the future. This thesis seeks to collect, classify, analyze, define, and resolve IO/IW; the utilization and effects of CNO during the Al-Aqsa Intifada, and how such analysis can be applied to United States national security.
12

Identifying Supervisory Control and Data Acquisition (SCADA) systems on a network via remote reconnaissance

Wiberg, Kenneth C. 09 1900 (has links)
Presidential Decision Directive (PDD) 63 calls for improving the security of Supervisory Control and Data Acquisition (SCADA) and other control systems which operate the critical infrastructure of the United States. In the past, these industrial computer systems relied on security through obscurity. Recent economic and technical shifts within the controls industry have increased their vulnerability to cyber attack. Concurrently, their value as a target has been recognized by terrorist organizations and competing nation states. Network reconnaissance is a basic tool that allows computer security managers to understand their complex systems. However, existing reconnaissance tools incorporate little or no understanding of control systems. This thesis provides a conceptual analysis for the creation of a SCADA network exploration/reconnaissance tool. Several reconnaissance techniques were researched and reviewed in a laboratory environment to determine their utility for SCADA system discovery. Additionally, an application framework using common non-SCADA security tools was created to provide a proof of concept. Development of a viable tool for identifying SCADA systems remotely will help improve critical infrastructure security by improving situational awareness for network managers.
13

Evaluation of a multi-agent system for simulation and analysis of distributed denial-of-service attacks /

Saw, Tee Huu. January 2003 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2003. / Thesis advisor(s): James B. Michael, Mikhail Auguston. Includes bibliographical references (p. 52-54). Also available online.
14

Cyber terrorism and its affects on the population of the United States of America

Holleman, Matthew S. January 1900 (has links)
Thesis (M.A. in Liberal Art) -- Siena Heights University, 2009. / Title from electronic submission form. Includes bibliographical references (p.27-29) and abstract.
15

Distributed deployment of therminators in the network /

Cheng, Kah Wai. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Dec. 2004. / Thesis Advisor(s): John C. McEachen. Includes bibliographical references (p. 87-88). Also available online.
16

RIOT : a responsive system for mitigating computer network epidemics and attacks /

Balthrop, Justin Lewis. January 2005 (has links) (PDF)
Thesis (M.S.)--University of New Mexico, 2005. / "July, 2005." Includes bibliographical references (leaves 69-74). Also available online.
17

Network and data security

Dalwadi, Chintan. January 2006 (has links) (PDF)
Thesis (M.S.)--University of Alabama at Birmingham, 2006. / Description based on contents viewed Jan. 29, 2007; title from title screen. Includes bibliographical references (p. 94-96).
18

Computer network operations methodology

Vega, Juan Carlos 03 1900 (has links)
Approved for public release; distribution is unlimited / All nations face increasing tension between exploiting Computer Network Operations (CNO) in the military sphere and protecting the global information grid. The United States is moving apace to develop doctrines and capabilities that will allow them to exploit cyberspace for military advantage. Within the broad rubric of Information Operations, there is increasing effort devoted to integrating CNO into routine military planning. At the same time, these nations are becoming increasingly concerned at the dependency of their militaries, governments, economies and societies on the networked information systems that are emerging as the central nervous systems of post-industrial society. The armed forces desire to exploit and use CNO to their advantage is the central argument for this developed concept. This new weapons platform, or CNO, can be clearly identified so that the leaders will have an understanding of terms, limitations and capabilities of cyber operations. A methodology incorporating doctrine can be created to identify the Rules of Engagement (ROE) as well as the CNO components. The CNO area of operations and area of interest reach far beyond the typical battle space. The battle space has evolved and has penetrated every element of military operations that utilize computers and networks. / Captain (Promotable), United States Army
19

Information warfare, cyber-terrorism and community values

Moore, Joe Wesley January 2002 (has links)
No description available.
20

Confronting cyberterrorism with cyber deception /

Tan, Kheng Lee Gregory. January 2003 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2003. / Thesis advisor(s): Neil C. Rowe, Dorothy E. Denning. Includes bibliographical references (p. 63-70). Also available online.

Page generated in 0.0501 seconds