• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 682
  • 38
  • 37
  • 14
  • 11
  • 7
  • 6
  • 6
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 1060
  • 1060
  • 304
  • 269
  • 219
  • 216
  • 203
  • 195
  • 156
  • 112
  • 110
  • 104
  • 100
  • 94
  • 93
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Combating phishing through zero-knowledge authentication /

Knickerbocker, Paul, January 2008 (has links)
Thesis (M.S.)--University of Oregon, 2008. / Typescript. Includes vita and abstract. Includes bibliographical references (leaves 55-62). Also available online.
52

Immune based event-incident model for intrusion detection systems a nature inspired approach to secure computing /

Vasudevan, Swetha. January 2007 (has links)
Thesis (M.S.)--Kent State University, 2007. / Title from PDF t.p. (viewed Mar. 19, 2009). Advisor: Michael Rothstein. Keywords: intrusion detection systems, immune system, immune detectors, intrusion detection squad, multi-agent system. Includes bibliographical references (p. 62-66).
53

A Strategy for defending against Distributed Denial of Service attacks /

Whyte, David L., January 1900 (has links)
Thesis (M.C.S.)--Carleton University, 2002. / Includes bibliographical references (p. 142-151). Also available in electronic format on the Internet.
54

An application of Alloy to static analysis for secure information flow and verification of software systems

Shaffer, Alan B. January 2008 (has links) (PDF)
Dissertation (Ph.D. in Computer Science)--Naval Postgraduate School, December 2008. / Dissertation Supervisor: Auguston, Mikhail. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 87-93). Also available in print.
55

Technological enhancements for personal computers

Fuller, Marvin G. January 1992 (has links)
Thesis (M.S. in Systems Technology (Command, Control, and Communications))--Naval Postgraduate School, March 1992. / Thesis Advisor: Poock, Gary K. "March 1992." Includes bibliographical references (p. 54-55). Also available in print.
56

Developing a multi-objective decision model for maximizing IS security within an organization

May, Jeffrey Lee, January 1900 (has links)
Thesis (Ph.D.)--Virginia Commonwealth University, 2008. / Title from title-page of electronic thesis. Prepared for: Dept. of Information Systems. Bibliography: leaves 169-173.
57

Mitigating the botnet problem from victim to botmaster /

Ramsbrock, Daniel. January 2008 (has links)
Thesis (M.S.)--George Mason University, 2008. / Vita: p. 82. Thesis director: Xinyuan Wang. Submitted in partial fulfillment of the requirements for the degree of Master of Science in Information Security and Assurance. Title from PDF t.p. (viewed July 7, 2008). Includes bibliographical references (p. 78-81). Also issued in print.
58

Development of a Quality Assurance Prototype for Intrusion Detection Systems/

Yüksel, Ulaş. Tuğlular, Tuğkan January 2002 (has links) (PDF)
Thesis (Master)-- İzmir Institute of Technology, İzmir, 20024 / Includes bibliographical references (leaves. 75-79).
59

Defining a sample template for governmental procurements of cryptographic products/

Taş, Levent. Koltuksuz Ahmet Hasan January 2006 (has links) (PDF)
Thesis (Master)--İzmir Institute Of Technology, İzmir, 2006 / Keywords: Specification, crytography. Includes bibliographical references (leaves. 46-47).
60

DNS rebinding attacks

Kokkinopoulos, Georgios. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Xie, Geoffrey G. ; Gibson, John H. "September 2009." Description based on title screen as viewed on 4 November 2009. Author(s) subject terms: Network security, DNS rebinding, DNS pinning, same origin policy, anti DNS pinning, adobe security updates, DNS STIG, Windows Vista security, split DNS. Includes bibliographical references (p. 107-110). Also available in print.

Page generated in 0.0821 seconds