• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 1
  • Tagged with
  • 31
  • 31
  • 31
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

An attack resistant approach to vulnerability scanner design

Shaver, David Phillip. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 2005 / Title from document title page. Document formatted into pages; contains x, 122 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 120-122).
12

An approach to vulnerability assessment for Navy Supervisory Control and Data Acquisition (SCADA) system /

Hart, Dennis. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Cynthia E. Irvine, Karen Burke. Includes bibliographical references (p. 161-162). Also available online.
13

Long-lived authentication protocols for critical infrastructure process control systems

Chakravarthy, Rasika Mudumbai. January 2009 (has links) (PDF)
Thesis (M.S. in computer science )--Washington State University, May 2009. / Title from PDF title page (viewed on March 29, 2010). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 112-115).
14

Geographic location of a computer node examining a time-to-location algorithm and multiple autonomous system networks /

Sorgaard, Duane C. January 2004 (has links)
Thesis (M.S.)--Air University, Ohio, 2004. / Cover title. Includes bibliographical references (p. B1-B3). Full text document available on public STINET.
15

Evaluating the effectiveness of an intrusion prevention system-honeypot hybrid /

Tamagna-Darr, Lucas. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaf 30).
16

Firewall resistance to metaferography in network communications /

Savacool, Richard. January 2010 (has links)
Typescript. Includes bibliographical references (p. 55-60).
17

Security analysis of session initiation protocol

Dobson, Lucas E. January 2010 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010. / Thesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
18

Web-based dissemination system for the Trusted Computing Exemlar [i.e. Exemplar] project /

Kane, Douglas Robert. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 127-128). Also available online.
19

Evaluation of two host-based intrusion prevention systems /

Labbe, Keith G. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): Neil Rowe, J.D. Fulp. Includes bibliographical references (p. 53-54). Also available online.
20

Wi-Fi Guest Access: A Struggle For Secure Functionality In Academic Environments

Kevin E. Lanning 9 April 2007 (has links)
The rapid growth in the functionality of Wi-Fi networking in recent years has benefited academic environments. Consistent with their role as centers of innovation academic institutions have an interest in facilitating as much mobile, computer networking functionality as possible to parties of varying levels of affiliation, while also assuring confidentiality and integrity of communications. Providing secure yet functional Wi-Fi access to guests and affiliates in an academic environment presents significant challenges. Academic institutions have taken a wide variety of approaches to this problem. This study presents and analyzes data gathered from semi-structured telephone interviews with employees focused on computer networking and security in academic environments regarding their institutions’ approaches toward striking a balance between security and functionality. The results are summarized, conclusions are presented, and solutions to common problems are reviewed. Finally, remaining significant research questions are presented and explored.

Page generated in 0.0855 seconds