• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6562
  • 1927
  • 919
  • 814
  • 686
  • 373
  • 179
  • 161
  • 154
  • 105
  • 93
  • 81
  • 79
  • 77
  • 76
  • Tagged with
  • 14837
  • 2974
  • 2027
  • 1876
  • 1454
  • 1382
  • 1345
  • 1298
  • 1264
  • 1169
  • 1155
  • 1149
  • 1075
  • 1030
  • 952
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
331

Time-variant normal profiling for anomaly detection systems

Kim, Jung Yeop. January 2008 (has links)
Thesis (Ph.D.)--University of Wyoming, 2008. / Title from PDF title page (viewed on August 3, 2009). Includes bibliographical references (p. 73-84).
332

Research in computer forensics /

Wai, Hor Cheong. January 2002 (has links) (PDF)
Thesis (M.S.)--Naval Postgraduate School, 2002. / Thesis advisor(s): Daniel F. Warren, Dan C. Boger. Includes bibliographical references (p. 191). Also available online.
333

A computational model and multi-agent simulation for information assurance /

VanPutte, Michael A. January 2002 (has links) (PDF)
Thesis (Ph. D.)--Naval Postgraduate School, 2002. / Dissertation supervisor: Cynthia Irvine. Includes bibliographical references (p. 155-164). Also available online.
334

Prospects for improving the resource allocation process for National Security in Jamaica : a comparitive study /

Sewell, Andrew Fitzgerald. January 2004 (has links) (PDF)
Thesis (M.B.A.)--Naval Postgraduate School, June 2004. / Thesis advisor(s): Robert McNab, Peter Frederiksen. Includes bibliographical references (p. 107-112). Also available online.
335

A learning-based approach to false alarm reduction for signature-based intrusion detection systems /

Cheung, Chun-Hom. January 2004 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004. / Includes bibliographical references (leaves 100-106). Also available in electronic version. Access restricted to campus users.
336

An application of the Bass diffusion model to border security and illegal immigration /

Ohene-Asah, Ayeh. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 157-164).
337

The impact of population mixing rules on epidemic communication /

Lin, Meng-jang, January 1999 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 1999. / Vita. Includes bibliographical references (leaves 127-132). Available also in a digital version from Dissertation Abstracts.
338

Anti terrorism and force protection application in facilities this report is presented to the Department of Civil and Coastal Engineering graduate committee /

Lim, R. Augustus. January 2003 (has links) (PDF)
Thesis (master's)--University of Florida, 2003. / Title from title screen. Also available online.
339

The extent to which sensitive information is secured by institutions that donate computers to educational settings

Murandu, Ngoni. January 2003 (has links)
Thesis (M.A.)--West Virginia University, 2003. / Title from document title page. Document formatted into pages; contains ix, 67 p. Vita. Includes abstract. Includes bibliographical references (p. 53-57).
340

On the application of locality to network intrusion detection working-set analysis of real and synthetic network server traffic /

Lee, Robert. January 2009 (has links)
Thesis (Ph.D.)--University of Central Florida, 2009. / Adviser: Sheau-Dong Lang. Includes bibliographical references (p. 117-119).

Page generated in 0.0378 seconds