• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 35
  • 2
  • 1
  • 1
  • Tagged with
  • 42
  • 42
  • 39
  • 6
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Web-based dissemination system for the Trusted Computing Exemlar [i.e. Exemplar] project /

Kane, Douglas Robert. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 127-128). Also available online.
22

Evaluation of two host-based intrusion prevention systems /

Labbe, Keith G. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): Neil Rowe, J.D. Fulp. Includes bibliographical references (p. 53-54). Also available online.
23

Wi-Fi Guest Access: A Struggle For Secure Functionality In Academic Environments

Kevin E. Lanning 9 April 2007 (has links)
The rapid growth in the functionality of Wi-Fi networking in recent years has benefited academic environments. Consistent with their role as centers of innovation academic institutions have an interest in facilitating as much mobile, computer networking functionality as possible to parties of varying levels of affiliation, while also assuring confidentiality and integrity of communications. Providing secure yet functional Wi-Fi access to guests and affiliates in an academic environment presents significant challenges. Academic institutions have taken a wide variety of approaches to this problem. This study presents and analyzes data gathered from semi-structured telephone interviews with employees focused on computer networking and security in academic environments regarding their institutions’ approaches toward striking a balance between security and functionality. The results are summarized, conclusions are presented, and solutions to common problems are reviewed. Finally, remaining significant research questions are presented and explored.
24

Mobile agent based attack resistant architecture for distributed intrusion detection system

Selliah, Sentil. January 2001 (has links)
Thesis (M.S.)--West Virginia University, 2001. / Title from document title page. Document formatted into pages; contains vii, 61 p. : ill. Includes abstract. Includes bibliographical references (p. 50-52).
25

AN INDOOR GEO-FENCING BASED ACCESS CONTROL SYSTEM FOR WIRELESS NETWORKS

Rahimi, Hossein 31 July 2013 (has links)
Use of wireless network information for indoor positioning has been an area of interest since wireless networks became very popular. On the other hand, the market started to grow in variety and production volumes leading to a variety of devices with many different hardware and software combinations. In the field of indoor positioning, most of the existing technologies are dependent on additional hardware and/or infrastructure, which increases the cost and requirements for both users and providers. This thesis investigates possible methods of coupling indoor geo-fencing with access control including authentication, identification, and registration in a system. Moreover, various techniques are studied in order to improve the robustness and security of such a system. The focus of these studies is to improve the proposed system in such a way that gives it the ability to operate properly in noisy, heterogeneous, and less controlled environments where the presence of attackers is highly probable. To achieve this, a classification based geo-fencing approach using Received Signal Strength Indicator (RSSI) has been employed so that accurate geo-fencing is coupled with secure communication and computing. Experimental results show that considerable positioning accuracy has been achieved while providing high security measures for communication and transactions. Favouring diversity and generic design, the proposed implementation does not mandate users to undergo any system software modification or adding new hardware components.
26

Data processing for anomaly detection in web-based applications /

Gaarudapuram Sriraghavan, Rajagopal. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2008. / Printout. Includes bibliographical references (leaves 53-57). Also available on the World Wide Web.
27

Toward email archive intrusion detection /

Li, Yiru. January 1900 (has links)
Thesis (M.C.S.) - Carleton University, 2006. / Includes bibliographical references (p. 89-95). Also available in electronic format on the Internet.
28

GENERTIA a system for vulnerability analysis, design and redesign of immunity-based anomaly detection system /

Hou, Haiyu, Dozier, Gerry V. January 2006 (has links) (PDF)
Dissertation (Ph.D.)--Auburn University, 2006. / Abstract. Vita. Includes bibliographic references (p.149-156).
29

The performance of Group Diffie-Hellman paradigms : a software framework and analysis /

Hagzan, Kieran S. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaf 246).
30

Preventing abuse of online communities

Irani, Danesh 02 July 2012 (has links)
Online communities are growing at a phenomenal rate and with the large number of users these communities contain, attackers are drawn to exploit these users. Denial of information (DoI) attacks and information leakage attacks are two popular attacks that target users on online communities. These information based attacks are linked by their opposing views on low-quality information. On the one hand denial of information attacks which primarily use low-quality information (such as spam and phishing) are a nuisance for information consumers. On the other hand information leakage attacks, which use inadvertently leaked information, are less effective when low-quality information is used, and thus leakage of low-quality information is prefered by private information producers. In this dissertation, I introduce techniques for preventing abuse against these attacks in online communities using meta-model classification and information unification approaches, respectively. The meta-model classification approach involves classifying the ``connected payload" associated with the information and using the classification result for the determination. This approach allows for detection of DoI attacks in emerging domains where the amount of information may be constrained. My information unification approach allows for modeling and mitigating information leakage attacks. Unifying information across domains followed by a quantificiation of the information leaked, provides one of the first studies on users' susceptibality to information leakage attacks. Further, the modeling introduced allows me to quantify the reduced threat of information leakage attacks after applying information cloaking.

Page generated in 0.0763 seconds