• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 682
  • 38
  • 37
  • 14
  • 11
  • 7
  • 6
  • 6
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 1060
  • 1060
  • 304
  • 269
  • 219
  • 216
  • 203
  • 195
  • 156
  • 112
  • 110
  • 104
  • 100
  • 94
  • 93
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Active electromagnetic attacks on secure hardware

Markettos, Athanasios Theodore January 2011 (has links)
No description available.
42

An In-memory Database for Prototyping Anomaly Detection Algorithms at Gigabit Speeds

Friesen, Travis 11 September 2013 (has links)
The growing speeds of computer networks are pushing the ability of anomaly detection algorithms and related systems to their limit. This thesis discusses the design of the Object Database, ODB, an analysis framework for evaluating anomaly detection algorithms in real time at gigabit or better speeds. To accomplish this, the document also discusses the construction a new dataset with known anomalies for verification purposes. Lastly, demonstrating the efficacy of the system required the implementation of an existing algorithm on the evaluation system and the demonstration that while the system is suitable for the evaluation of anomaly detection algorithms, this particular anomaly detection algorithm was deemed not appropriate for use at the packet-data level.
43

An In-memory Database for Prototyping Anomaly Detection Algorithms at Gigabit Speeds

Friesen, Travis 11 September 2013 (has links)
The growing speeds of computer networks are pushing the ability of anomaly detection algorithms and related systems to their limit. This thesis discusses the design of the Object Database, ODB, an analysis framework for evaluating anomaly detection algorithms in real time at gigabit or better speeds. To accomplish this, the document also discusses the construction a new dataset with known anomalies for verification purposes. Lastly, demonstrating the efficacy of the system required the implementation of an existing algorithm on the evaluation system and the demonstration that while the system is suitable for the evaluation of anomaly detection algorithms, this particular anomaly detection algorithm was deemed not appropriate for use at the packet-data level.
44

A software implementation of an Internet Security Access Control Scheme (ISACS) through TCP/IP protocols

Ertaul, Levent January 1994 (has links)
No description available.
45

Modular exponential accelerator chip for RSA cryptography /

Ramschie, Victor William Unknown Date (has links)
Thesis (MEng (Electro Sys))--University of South Australia, 1999
46

HybrIDS embeddable hybrid intrusion detection system /

Lauf, Adrian Peter. January 2007 (has links)
Thesis (M.S. in Electrical Engineering)--Vanderbilt University, Dec. 2007. / Title from title screen. Includes bibliographical references.
47

Perturbation based privacy preserving data mining techniques for real-world data /

Liu, Li. January 2008 (has links)
Thesis (Ph. D.)--University of Texas at Dallas, 2008. / Includes vita. Includes bibliographical references (leaves 90-95)
48

Security in association rule mining

Wong, Wai-kit, January 2007 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2008. / Also available in print.
49

Towards measurable and tunable security /

Lundin, Reine, January 2007 (has links)
Licentiatavhandling Karlstad : Karlstads universitet, 2007.
50

Information flow properties for cyber-physical systems

Akella, Ravi Chandra, January 2009 (has links) (PDF)
Thesis (M.S.)--Missouri University of Science and Technology, 2009. / Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 15, 2009) Includes bibliographical references (p. 34-36).

Page generated in 0.0898 seconds