1 |
Development of a cyber attack simulator for network modeling and cyber security analysis /Costantini, Kevin C. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaves 155-157).
|
2 |
Digital forensics curriculum for undergraduate and master graduate studentsSamsuddin, Samsuddin Wira Bin. Tu, Manghui. January 2009 (has links) (PDF)
Thesis (M.S.)--Southern Utah University, 2009. / Title from PDF title page. "Thesis presented to the faculty of the Graduate School of Southern Utah University in partial fulfillment of the requirements for the degree of Master of Science in Forensic Science, Computer Forensics Emphasis." Manghui Tu, Advisor. Includes bibliographical references (p. 83-88).
|
3 |
Framework for botnet emulation and analysisLee, Christopher Patrick. January 2009 (has links)
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009. / Committee Chair: Copeland, John; Committee Member: Durgin, Gregory; Committee Member: Goodman, Seymour; Committee Member: Owen, Henry; Committee Member: Riley, George.
|
4 |
Applicability of clustering to cyber intrusion detection /Hendry, Gilbert R. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaves 63-68).
|
5 |
Cyber terrorism and its affects on the population of the United States of AmericaHolleman, Matthew S. January 1900 (has links)
Thesis (M.A. in Liberal Art) -- Siena Heights University, 2009. / Title from electronic submission form. Includes bibliographical references (p.27-29) and abstract.
|
6 |
Is it possible to regulate the Internet globally? a comparative case study of the cybercrime framework in Canada and Romania /Manolescu, Dan S. January 2009 (has links)
Thesis (M.A.) -- University of Alberta, 2009. / "A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree of Master of Arts in Humanities Computing, University of Alberta." Title from pdf file main screen (viewed on October 8, 2009). Includes bibliographical references.
|
7 |
Cyber crime and telecommunications law /Imhof, Robert. January 2010 (has links)
Typescript. Includes bibliographical references (leaves 218-220).
|
8 |
Process forensics the crossroads of checkpointing and intrusion detection /Foster, Mark S. January 2004 (has links)
Thesis (Ph. D.)--University of Florida, 2004. / Title from title page of source document. Document formatted into pages; contains 97 pages. Includes vita. Includes bibliographical references.
|
9 |
Gefahrenabwehr und Internet : Befugnisse der Polizei im Lichte eines Rechts auf informationelle Selbstbestimmung /Perrey, Elke, January 1900 (has links)
Thesis (doctoral)--Universität Passau, 2002. / Includes bibliographical references (p. [235]-268).
|
10 |
Using cultural perspective to study teenage computer crimeYoung, Lap-ping, John. January 2002 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 2002. / Includes bibliographical references. Also available in print.
|
Page generated in 0.0931 seconds