Spelling suggestions: "subject:"security inn networks"" "subject:"security iin networks""
1 |
A computational model and multi-agent simulation for information assurance /VanPutte, Michael A. January 2002 (has links) (PDF)
Thesis (Ph. D.)--Naval Postgraduate School, 2002. / Dissertation supervisor: Cynthia Irvine. Includes bibliographical references (p. 155-164). Also available online.
|
2 |
A learning-based approach to false alarm reduction for signature-based intrusion detection systems /Cheung, Chun-Hom. January 2004 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004. / Includes bibliographical references (leaves 100-106). Also available in electronic version. Access restricted to campus users.
|
3 |
HybrIDS embeddable hybrid intrusion detection system /Lauf, Adrian Peter. January 2007 (has links)
Thesis (M.S. in Electrical Engineering)--Vanderbilt University, Dec. 2007. / Title from title screen. Includes bibliographical references.
|
4 |
TRINETR an intrusion detection alert management and analysis system /Yu, Jinqiao. January 1900 (has links)
Thesis (Ph. D.)--West Virginia University, 2004. / Title from document title page. Document formatted into pages; contains viii, 150 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 104-109).
|
5 |
Deploying a secure Windows operating system and applicationsMiles, Russell Slater, January 2007 (has links) (PDF)
Thesis (M.Eng.)--University of Louisville, 2007. / Title and description from thesis home page (viewed May 9, 2007). Department of Computer Engineering and Computer Science. Vita. "May 2007." Includes bibliographical references (p. 20-21).
|
6 |
Using game theory to mitigate the effects of a bioterrorist attack /Layfield, Ryan Patrick, January 2008 (has links)
Thesis (Ph.D.)--University of Texas at Dallas, 2008. / Includes vita. Includes bibliographical references (leaves 114-120)
|
7 |
Evaluation of Embedded Firewall System /Rumelioglu, Sertac. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2005. / Thesis Advisor(s): Wen Su. Includes bibliographical references (p. 77-79). Also available online.
|
8 |
Parallel firewall designs for high-speed networks /Farley, Ryan Joseph. January 2005 (has links)
Thesis (M.S.)--Wake Forest University. Dept. of Computer Science, 2005. / Vita. Includes bibliographical references (leaves 66-68)
|
9 |
Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networksAtkins, William Dee, January 2007 (has links) (PDF)
Thesis (M.S.)--University of Missouri--Rolla, 2007. / Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 11, 2007) Includes bibliographical references (p. 54-55).
|
10 |
Digital receipts : a system to detect the compromise of digital certificates /Seeley, Nathaniel January 2006 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2006. / Includes bibliographical references (p. 55-57).
|
Page generated in 0.0486 seconds