• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 6
  • 1
  • Tagged with
  • 17
  • 17
  • 9
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Creating a robust form of steganography /

Buchanan, Joshua Michael. January 2004 (has links)
Thesis (M.S.)--Wake Forest University. Dept. of Computer Science, 2004. / Includes bibliographical references (leaves 99-100).
2

Detecting hidden computer processes by deliberate resource exhaustion

Jones, James H. January 2008 (has links)
Thesis (Ph.D.)--George Mason University, 2008. / Vita: p. 259. Thesis director: Kathryn B. Laskey. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computational Sciences and Informatics. Title from PDF t.p. (viewed Mar. 17, 2009). Includes bibliographical references (p. 255-258). Also issued in print.
3

Personal data protection maturity model for the micro financial sector in Peru

Garcia, Arturo, Calle, Luis, Raymundo, Carlos, Dominguez, Francisco, Moguerza, Javier M. 27 June 2018 (has links)
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado. / The micro financial sector is a strategic element in the economy of developing countries since it facilitates the integration and development of all social classes and let the economic growth. In this point is the growth of data is high every day in sector like the micro financial, resulting from transactions and operations carried out with these companies on a daily basis. Appropriate management of the personal data privacy policies is therefore necessary because, otherwise, it will comply with personal data protection laws and regulations and let take quality information for decision-making and process improvement. The present study proposes a personal data protection maturity model based on international standards of privacy and information security, which also reveals personal data protection capabilities in organizations. Finally, the study proposes a diagnostic and tracing assessment tool that was carried out for five companies in the micro financial sector and the obtained results were analyzed to validate the model and to help in success of data protection initiatives. / Revisión por pares
4

Secure distributed single sign-on with two-factor authentication /

Brasee, Kaleb. January 2007 (has links)
Thesis (M.S.)--University of Toledo, 2007. / Typescript. "Submitted as partial fulfillments of the requirements for the Master of Engineering with a concentration in Computer Science." "A thesis entitled"--at head of title. Bibliography: leaves 69-72.
5

Anonymous T-out-of-N threshold signature schemes

Maneva-Jakimoska, Karolina. Burmester, Mike. January 2006 (has links)
Thesis (M.S.)--Florida State University, 2006. / Advisor: Mike Burmester, Florida State University,College of Arts amd Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 19, 2006). Document formatted into pages; contains viii, 40 pages. Includes bibliographical references.
6

A simulation of a microcomputer-based intrusion detection system

Bartholomew, John Warren January 2011 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
7

A novel unified algorithm and hardware architecture for integrated modular division and multiplication in GF(p) and GF(2[superscript]n) suitable for public-key cryptography /

Tawalbeh, Lo'ai. January 1900 (has links)
Thesis (Ph. D.)--Oregon State University, 2005. / Printout. Includes bibliographical references (leaves 57-61). Also available on the World Wide Web.
8

Návrh bezpečné infrastruktury pro cloudové řešení. / Safe cloud infrastructure design

Hanzlová, Marie January 2013 (has links)
This diploma thesis is focused on the security of cloud computing. Theoretical part of this thesis identifies options which generally lead to higher safety and availability of applications, regardless of the solution. A package of cloud services (called Productivity Suite) was defined, based on the customers' requirements, which is built on Microsoft platform and combined of the following products: Microsoft Exchange, Microsoft SharePoint, Microsoft Lync and is intended to be used by end customers. Specification of the service package, identified opportunities for strengthening the level of security and requirements of potential customers are the primary inputs for designing safe cloud infrastructure, which is the main contribution of this thesis. First step of designing infrastructure is to choose the service provider of data center, who will operate the solution. A decision must be made to select leased solution or owned components. The result of this part is a calculation, which contains all HW components (servers, firewalls, switches, tape library backups, disk arrays) and SW components considering the licensing policy, SSL certificate, domain, backup solution and other operating costs. The solution is limited by financial resources. The priority is safety, security and quality of services.
9

Identifikace počítače pomocí vzorů v síťovém provozu / Computer Identification Based on Its Network Behaviour

Myška, Michal January 2014 (has links)
This diploma thesis deals with computer identification using network behavioral patterns. Security functions providing privacy are described together with user privacy threats. Then, several approaches to the computer identification based on network behaviour are described. The proposed tool is based on data mining method Multinomial Naive Bayes. Then, the implementation of proposed tool is described and the experiments recognizing success in the identification are performed.
10

Managing food security through food waste and loss: Small data to big data

Irani, Zahir, Sharif, Amir M., Lee, Habin, Aktas, E., Topaloğlu, Z., van't Wout, T. 03 November 2017 (has links)
Yes / This paper provides a management perspective of organisational factors that contributes to the reduction of food waste through the application of design science principles to explore causal relationships between food distribution (organisational) and consumption (societal) factors. Qualitative data were collected with an organisational perspective from commercial food consumers along with large-scale food importers, distributors, and retailers. Cause-effect models are built and “what-if” simulations are conducted through the development and application of a Fuzzy Cognitive Map (FCM) approaches to elucidate dynamic interrelationships. The simulation models developed provide a practical insight into existing and emergent food losses scenarios, suggesting the need for big data sets to allow for generalizable findings to be extrapolated from a more detailed quantitative exercise. This research offers itself as evidence to support policy makers in the development of policies that facilitate interventions to reduce food losses. It also contributes to the literature through sustaining, impacting and potentially improving levels of food security, underpinned by empirically constructed policy models that identify potential behavioural changes. It is the extension of these simulation models set against a backdrop of a proposed big data framework for food security, where this study sets avenues for future research for others to design and construct big data research in food supply chains. This research has therefore sought to provide policymakers with a means to evaluate new and existing policies, whilst also offering a practical basis through which food chains can be made more resilient through the consideration of management practices and policy decisions.

Page generated in 0.0786 seconds