• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 61785
  • 6049
  • 5658
  • 3722
  • 3436
  • 2277
  • 2277
  • 2277
  • 2277
  • 2277
  • 2264
  • 1224
  • 1146
  • 643
  • 535
  • Tagged with
  • 103609
  • 45421
  • 28888
  • 20550
  • 17952
  • 12457
  • 10983
  • 10844
  • 9121
  • 8524
  • 7162
  • 6389
  • 6211
  • 6180
  • 6059
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
331

Pattern-oriented analysis and design (POAD) a methodology for software development /

Yacoub, Sherif M., January 1999 (has links)
Thesis (Ph. D.)--West Virginia University, 1999. / Title from document title page. Document formatted into pages; contains xx, 343 p. : ill. (some col.). Vita. Includes abstract. Includes bibliographical references (p. 324-337).
332

Quantitative metrics for network security evaluation /

El-Hassan, Fadi. January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2007. / Includes bibliographical references (p. 112-122). Also available in electronic format on the Internet.
333

Finding termination and time improvement in predicate abstraction with under-approximation and abstract matching /

Kudra, Dritan, January 2007 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2007. / Includes bibliographical references (p. 30-31).
334

Evaluating the effectiveness of an intrusion prevention system-honeypot hybrid /

Tamagna-Darr, Lucas. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaf 30).
335

Cyber crime and telecommunications law /

Imhof, Robert. January 2010 (has links)
Typescript. Includes bibliographical references (leaves 218-220).
336

Countering kernel malware in virtual execution environments

Xuan, Chaoting. January 2009 (has links)
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2010. / Committee Chair: Copeland A. John; Committee Member: Alessandro Orso; Committee Member: Douglas M. Blough; Committee Member: George F. Riley; Committee Member: Raheem A. Beyah. Part of the SMARTech Electronic Thesis and Dissertation Collection.
337

Security analysis of session initiation protocol

Dobson, Lucas E. January 2010 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010. / Thesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
338

Filtering engine model for VIMNet

Mahajan, Harshad S. January 2010 (has links)
Thesis (M.S.)--University of Toledo, 2010. / Typescript. "Submitted to the Graduate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Engineering." "A thesis entitled"--at head of title. Title from title page of PDF document. Bibliography: p. 77-78.
339

Automated test case generation for reactive software systems based on environment models /

Imanian, James A. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): Mikhail Auguston, James B. Michael. Includes bibliographical references (p. 55-56). Also available online.
340

Architecture-aware Taylor shift by 1 /

Ruslanov, Anatole D. Johnson, Jeremy. Krandick, Werner J. January 2006 (has links)
Thesis (Ph. D.)--Drexel University, 2006. / Includes abstract and vita. Includes bibliographical references (leaves 138-145).

Page generated in 0.0763 seconds