• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19
  • 1
  • 1
  • 1
  • Tagged with
  • 45
  • 45
  • 36
  • 20
  • 15
  • 14
  • 13
  • 10
  • 9
  • 9
  • 8
  • 7
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Intrusion detection system: ideas from the human immune system

Letaief, Hassine. January 1900 (has links)
Thesis (M.A.)--California State University Channel Islands, 2007. / Submitted in partial fulfillment of the requirements for the degree of Masters Of Science in Computer Science. Title from PDF t.p. (viewed October 22, 2009).
2

A framework for supporting anonymity in text-based online conversations /

Lee, Andrew Wei Tien. January 2001 (has links)
Thesis (MSc(CompSc) -- Bond University, 2001. / "A thesis submitted to Bond University in fulfillment of the requirements for the degree of Masters of Science in Computer Science"-- t.p. Bibliography: leaves 124-125. Also available via the World Wide Web.
3

An event-trace language for software decoys /

Fragkos, Georgios. January 2002 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2002. / Thesis advisor(s): James Bret Michael, Mikhail Auguston. Includes bibliographical references (p. 35). Also available online.
4

A secure e-course copyright protection infrastructure

Yau, Cho-ki, Joe. January 2006 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2006. / Title proper from title frame. Also available in printed format.
5

Automated detection and containment of stealth attacks on the operating system kernel

Baliga, Arati. January 2009 (has links)
Thesis (Ph. D.)--Rutgers University, 2009. / "Graduate Program in Computer Science." Includes bibliographical references (p. 99-103).
6

Three essays on managing information systems security : patch management, learning dynamics, and security software market /

Zhang, Guo Ying, January 2007 (has links)
Thesis (Ph. D.)--University of Washington, 2007. / Vita. Includes bibliographical references (leaves 91-98).
7

A socio-technical perspective on information security knowledge and attitudes /

Long, Cheri Lanette, January 1999 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 1999. / Vita. Includes bibliographical references (leaves 210-223). Available also in a digital version from Dissertation Abstracts.
8

Preserving privacy with user-controlled sharing of verified information

Bauer, David Allen. January 2009 (has links)
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2010. / Committee Chair: Blough, Douglas; Committee Member: Ahamad, Mustaque; Committee Member: Liu, Ling; Committee Member: Riley, George; Committee Member: Yalamanchili, Sudha. Part of the SMARTech Electronic Thesis and Dissertation Collection.
9

Advanced methods for detection of malicious software

Volynkin, Alexander S. January 2007 (has links)
Thesis (Ph. D.)--State University of New York at Binghamton, Electrical and Computer Engineering Department, Watson School, 2007. / Includes bibliographical references.
10

Robust digital watermarking of multimedia objects

Gupta, Gaurav. January 2008 (has links)
Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Department of Computing, 2008. / Bibliography: p. 144-153.

Page generated in 0.115 seconds