Dissertationen zum Thema „Security threats“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Security threats" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Der volle Inhalt der QuelleMahmood, Faisal. "SIP Security Threats and Countermeasures." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18126.
Der volle Inhalt der QuelleSafdar, Naveed. "Internal security threats to Pakistan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FSafdar.pdf.
Der volle Inhalt der QuelleXu, Zhang. "Understanding Security Threats in Cloud." W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477067957.
Der volle Inhalt der QuelleCramer, Jane Kellett 1964. "National security panics : overestimating threats to national security." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8312.
Der volle Inhalt der QuelleWullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.
Der volle Inhalt der QuelleByman, G. (Gabriel). "Connected devices:security threats vs. implemented security." Bachelor's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201704111464.
Der volle Inhalt der QuelleBiswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.
Der volle Inhalt der QuelleZakharov, I. "Threats to information security of the enterprise." Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/7954.
Der volle Inhalt der QuelleGong, Xuwei. "Security Threats and Countermeasures for Connected Vehicles." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.
Der volle Inhalt der QuelleFrauenstein, Edwin Donald. "A framework to mitigate phishing threats." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021208.
Der volle Inhalt der QuelleLambe, Erik. "Information Security Culture and Threat Perception : Comprehension and awareness of latent threats in organisational settings concerned with information security." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352263.
Der volle Inhalt der QuelleBailey, Daniel A. "Communicating homeland security threats government and public efforts." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5040.
Der volle Inhalt der QuelleSuvor, John. "Diversity Visa Lottery: Threats to U.S. National Security." ScholarWorks, 2015. http://scholarworks.waldenu.edu/dissertations/1302.
Der volle Inhalt der QuelleTesfay, Kibrom Gebregziabher. "Threats to and alternatives for financing Social Security." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FTesfay.pdf.
Der volle Inhalt der QuelleVecchiato, Sara <1990>. "The Malian crisis: security threats from the Sahel." Master's Degree Thesis, Università Ca' Foscari Venezia, 2014. http://hdl.handle.net/10579/4676.
Der volle Inhalt der QuelleInci, Mehmet Sinan. "Micro-architectural Threats to Modern Computing Systems." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-dissertations/528.
Der volle Inhalt der QuelleMalec, Mieczyslaw. "Security perception : within and beyond the traditional approach /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMalec.pdf.
Der volle Inhalt der QuelleReichling, Peter, P. G. Pererva, and T. V. Romanchik. "Determination of the essence of the economic security of the country." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/39581.
Der volle Inhalt der QuelleMoore, Alan G. "Southwest Hispanic community - the absence of homeland security threats." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27874.
Der volle Inhalt der QuelleElder, James R. "Interactive visualisation for the discovery of cyber security threats." Thesis, University of Surrey, 2017. http://epubs.surrey.ac.uk/842460/.
Der volle Inhalt der QuelleGao, Xing. "Investigating Emerging Security Threats in Clouds and Data Centers." W&M ScholarWorks, 2018. https://scholarworks.wm.edu/etd/1550153840.
Der volle Inhalt der QuelleWebb, Kenneth G. "Managing asymmetric threats to national security - terrorist information operations." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/284.
Der volle Inhalt der QuelleMabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.
Der volle Inhalt der QuelleAshby, Paul. "NAFTA-land security : the Mérida Initiative, transnational threats, and U.S. security projection in Mexico." Thesis, University of Kent, 2015. https://kar.kent.ac.uk/48367/.
Der volle Inhalt der QuelleCatrantzos, Nicholas. "No dark corners defending against insider threats to critical infrastructure /." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FCatrantzos.pdf.
Der volle Inhalt der QuelleKlykova, Ekaterina. "Security in International Relations: International cooperation to prevent non-states threats." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-197216.
Der volle Inhalt der QuelleMusayev, Namig. "Analysis of Security Threats for Offshore Oil&Gas Installations." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Den vollen Inhalt der Quelle findenJaziri, Stenberg Jasmin. "Realism and new threats : an analysis of Israel's security policy." Thesis, Linnéuniversitetet, Institutionen för samhällsvetenskaper, SV, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-21341.
Der volle Inhalt der QuelleWalton, James Calder. "British intelligence and threats to national security, c.1941-1951." Thesis, University of Cambridge, 2007. https://www.repository.cam.ac.uk/handle/1810/226671.
Der volle Inhalt der QuelleStieper, Erica Marie. "The Discursive Construction of National Security Threats from 2001-2018." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/83827.
Der volle Inhalt der QuelleHeppelmann, Andrew R. "The implication of emerging security threats on civil-military relations /." (Requires Adobe Acrobat Reader), 2001. http://stinet.dtic.mil/str/tr4%5Ffields.html.
Der volle Inhalt der QuelleQuesinberry, Malora. "An Analysis of Faculty and Staff's Identification of Malware Threats." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etd/3088.
Der volle Inhalt der QuelleJones, Andrew. "Threats to information systems and effective countermeasures." Thesis, University of South Wales, 2004. https://pure.southwales.ac.uk/en/studentthesis/threats-to-information-systems-and-effective-countermeasures(2ffda7b3-38d8-48a3-90da-386ee85f10bf).html.
Der volle Inhalt der QuelleSchmidlin, Marco. "Swiss Armed Forces XXI - the answer to current or future threats." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FSchmidlin.pdf.
Der volle Inhalt der QuelleSaltstone, Scot. "The legal dimensions of combatting threats to the security of Canada." Thesis, University of Ottawa (Canada), 1989. http://hdl.handle.net/10393/5778.
Der volle Inhalt der QuelleVerhun, A. M., Julia Bondarchuk, and A. S. Linichenko. "Influence of risks, dangers and threats on the enterprise financial security." Thesis, ЦФЕНД, 2018. https://er.knutd.edu.ua/handle/123456789/10530.
Der volle Inhalt der QuelleLarrimore, Nancy Page. "Risk Management Strategies to Prevent and Mitigate Emerging Operational Security Threats." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4866.
Der volle Inhalt der QuelleDuan, Ren. "Machine Learning in Defensive IT Security: Early Detection of Novel Threats." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-266122.
Der volle Inhalt der QuelleSquarcina, Marco <1984>. "Analysis and prevention of security threats in web and cryptographic applications." Doctoral thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/12918.
Der volle Inhalt der QuelleSpolaor, Riccardo. "Security and Privacy Threats on Mobile Devices through Side-Channels Analysis." Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3426796.
Der volle Inhalt der QuelleArenas, Miguel Tames. "Social Engineering and Internal Threats in Organizations." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6075.
Der volle Inhalt der QuelleElmrabit, Nebrase. "A multiple-perspective approach for insider-threat risk prediction in cyber-security." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/36243.
Der volle Inhalt der QuelleClementson, Christian. "Client-side threats and a honeyclient-based defense mechanism, Honeyscout." Thesis, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-20104.
Der volle Inhalt der QuelleFediushyn, O. I., O. O. Yatsiuk, and H. O. Rusanov. "Virtual environment for training auditors with information security." Thesis, ВА ЗС АР; НТУ "ХПІ"; НАУ, ДП "ПДПРОНДІАВІАПРОМ"; УмЖ, 2021. https://openarchive.nure.ua/handle/document/15754.
Der volle Inhalt der QuelleAhmad, Nadeem, and M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.
Der volle Inhalt der QuelleLombardo, Gary. "Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats." Thesis, Capella University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10751570.
Der volle Inhalt der QuelleEzeokafor, Edwin. "The securitization processes and West African security : regime-led neo-patrimonial threats?" Thesis, University of Dundee, 2015. https://discovery.dundee.ac.uk/en/studentTheses/9738c1a6-03b1-4b1c-84bb-ec3e2b2c54d9.
Der volle Inhalt der QuelleAdams, Tamara Kaye. "Potential threats to Spanish security implications for the United States and NATO /." Thesis, Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA242517.
Der volle Inhalt der QuelleOkoye, Stella Ifeyinwa. "Strategies to Minimize the Effects of Information Security Threats on Business Performance." Thesis, Walden University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10606454.
Der volle Inhalt der Quelle