• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 35
  • 2
  • 1
  • 1
  • Tagged with
  • 42
  • 42
  • 39
  • 6
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Prospects for cyber deterrence

Moore, Ryan J. January 2008 (has links) (PDF)
Thesis (M.S. in Information Operations)--Naval Postgraduate School, December 2008. / Thesis Advisor(s): Arquilla, John J. ; Denning, Dorothy E. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 77-83). Also available in print.
12

Service assurance in insecure networks with Byzantine adversaries

Rabinovich, Paul. January 2008 (has links)
Thesis (Ph.D.)--George Mason University, 2008. / Title from PDF t.p. (viewed July 22, 2008). Thesis director: Robert Simon. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science. Vita: p. 188. Includes bibliographical references (p. 176-187). Also available in print.
13

An attack resistant approach to vulnerability scanner design

Shaver, David Phillip. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 2005 / Title from document title page. Document formatted into pages; contains x, 122 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 120-122).
14

An approach to vulnerability assessment for Navy Supervisory Control and Data Acquisition (SCADA) system /

Hart, Dennis. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Cynthia E. Irvine, Karen Burke. Includes bibliographical references (p. 161-162). Also available online.
15

Methods of detecting intrusions in security protocols

Sherwood, Robert William. Burmester, Mike. January 2004 (has links)
Thesis (M. S.)--Florida State University, 2004. / Advisor: Dr. Mike Burmester, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed Jan. 18, 2005). Includes bibliographical references.
16

Long-lived authentication protocols for critical infrastructure process control systems

Chakravarthy, Rasika Mudumbai. January 2009 (has links) (PDF)
Thesis (M.S. in computer science )--Washington State University, May 2009. / Title from PDF title page (viewed on March 29, 2010). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 112-115).
17

Geographic location of a computer node examining a time-to-location algorithm and multiple autonomous system networks /

Sorgaard, Duane C. January 2004 (has links)
Thesis (M.S.)--Air University, Ohio, 2004. / Cover title. Includes bibliographical references (p. B1-B3). Full text document available on public STINET.
18

Evaluating the effectiveness of an intrusion prevention system-honeypot hybrid /

Tamagna-Darr, Lucas. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaf 30).
19

Firewall resistance to metaferography in network communications /

Savacool, Richard. January 2010 (has links)
Typescript. Includes bibliographical references (p. 55-60).
20

Security analysis of session initiation protocol

Dobson, Lucas E. January 2010 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010. / Thesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.

Page generated in 0.2339 seconds