Spelling suggestions: "subject:"security inn networks"" "subject:"security iin networks""
11 |
Prospects for cyber deterrenceMoore, Ryan J. January 2008 (has links) (PDF)
Thesis (M.S. in Information Operations)--Naval Postgraduate School, December 2008. / Thesis Advisor(s): Arquilla, John J. ; Denning, Dorothy E. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 77-83). Also available in print.
|
12 |
Service assurance in insecure networks with Byzantine adversariesRabinovich, Paul. January 2008 (has links)
Thesis (Ph.D.)--George Mason University, 2008. / Title from PDF t.p. (viewed July 22, 2008). Thesis director: Robert Simon. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science. Vita: p. 188. Includes bibliographical references (p. 176-187). Also available in print.
|
13 |
An attack resistant approach to vulnerability scanner designShaver, David Phillip. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 2005 / Title from document title page. Document formatted into pages; contains x, 122 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 120-122).
|
14 |
An approach to vulnerability assessment for Navy Supervisory Control and Data Acquisition (SCADA) system /Hart, Dennis. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Cynthia E. Irvine, Karen Burke. Includes bibliographical references (p. 161-162). Also available online.
|
15 |
Methods of detecting intrusions in security protocolsSherwood, Robert William. Burmester, Mike. January 2004 (has links)
Thesis (M. S.)--Florida State University, 2004. / Advisor: Dr. Mike Burmester, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed Jan. 18, 2005). Includes bibliographical references.
|
16 |
Long-lived authentication protocols for critical infrastructure process control systemsChakravarthy, Rasika Mudumbai. January 2009 (has links) (PDF)
Thesis (M.S. in computer science )--Washington State University, May 2009. / Title from PDF title page (viewed on March 29, 2010). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 112-115).
|
17 |
Geographic location of a computer node examining a time-to-location algorithm and multiple autonomous system networks /Sorgaard, Duane C. January 2004 (has links)
Thesis (M.S.)--Air University, Ohio, 2004. / Cover title. Includes bibliographical references (p. B1-B3). Full text document available on public STINET.
|
18 |
Evaluating the effectiveness of an intrusion prevention system-honeypot hybrid /Tamagna-Darr, Lucas. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaf 30).
|
19 |
Firewall resistance to metaferography in network communications /Savacool, Richard. January 2010 (has links)
Typescript. Includes bibliographical references (p. 55-60).
|
20 |
Security analysis of session initiation protocolDobson, Lucas E. January 2010 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2010. / Thesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
|
Page generated in 0.0839 seconds