Dissertations / Theses on the topic 'Adaptive Network Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 30 dissertations / theses for your research on the topic 'Adaptive Network Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Harper, Scott Jeffery. "A Secure Adaptive Network Processor." Diss., Virginia Tech, 2003. http://hdl.handle.net/10919/28023.
Full textKarunanidhi, Karthikeyan. "ARROS; distributed adaptive real-time network intrusion response." Ohio : Ohio University, 2006. http://www.ohiolink.edu/etd/view.cgi?ohiou1141074467.
Full textGrover, Amit. "Application adaptive bandwidth management using real-time network monitoring." [Johnson City, Tenn. : East Tennessee State University], 2003. http://etd-submit.etsu.edu/etd/theses/available/etd-0715103-211816/unrestricted/GroverA071803f.pdf.
Full textMarjanovic, Uros. "Exploration of a method for constructing an industrial ethernet with ethernet enabled devices in an industrial environment using a Cisco adaptive security appliance /." View online, 2009. http://repository.eiu.edu/theses/docs/32211131565124.pdf.
Full textTechateerawat, Piya, and piyat33@yahoo com. "Key distribution and distributed intrusion detection system in wireless sensor network." RMIT University. Electrical and Computer Systems Engineering, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080729.162610.
Full textPfennig, Stefan, and Elke Franz. "Secure Network Coding: Dependency of Efficiency on Network Topology." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-128456.
Full textRichter, Johannes, Elke Franz, Sabrina Engelmann, Stefan Pfennig, and Eduard A. Jorswieck. "Physical Layer Security vs. Network Layer Secrecy: Who Wins on the Untrusted Two-Way Relay Channel?" Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-145086.
Full textRichter, Johannes, Elke Franz, Sabrina Engelmann, Stefan Pfennig, and Eduard A. Jorswieck. "Physical Layer Security vs. Network Layer Secrecy: Who Wins on the Untrusted Two-Way Relay Channel?" Technische Universität Dresden, 2013. https://tud.qucosa.de/id/qucosa%3A28133.
Full textRenners, Leonard [Verfasser], Gabi [Akademischer Betreuer] Dreo, Rodosek Gabi Gutachter] Dreo, and Felix [Gutachter] [Heine. "Adaptive Prioritization of Network Security Incidents / Leonard Renners ; Gutachter: Gabi Dreo Rodosek, Felix Heine ; Akademischer Betreuer: Gabi Dreo Rodosek ; Universität der Bundeswehr München, Fakultät für Informatik." Neubiberg : Universitätsbibliothek der Universität der Bundeswehr München, 2020. http://d-nb.info/1224624181/34.
Full textRenners, Leonard [Verfasser], Rodosek Gabi [Akademischer Betreuer] Dreo, Rodosek Gabi [Gutachter] Dreo, and Felix [Gutachter] Heine. "Adaptive Prioritization of Network Security Incidents / Leonard Renners ; Gutachter: Gabi Dreo Rodosek, Felix Heine ; Akademischer Betreuer: Gabi Dreo Rodosek ; Universität der Bundeswehr München, Fakultät für Informatik." Neubiberg : Universitätsbibliothek der Universität der Bundeswehr München, 2020. http://d-nb.info/1224624181/34.
Full textGorgues, Alonso Miguel. "Improving Network-on-Chip Performance in Multi-Core Systems." Doctoral thesis, Universitat Politècnica de València, 2018. http://hdl.handle.net/10251/107336.
Full textSoewito, Benfano. "Adaptive Security In Computer Networks." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1879096201&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Full textPotnuru, Srinath. "Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-294140.
Full textHager, Creighton Tsuan-Ren. "Context Aware and Adaptive Security for Wireless Networks." Diss., Virginia Tech, 2004. http://hdl.handle.net/10919/29875.
Full textRuth, Michael. "Adapting the Single-Request/Multiple-Response Message Exchange Pattern to Web Services." ScholarWorks@UNO, 2005. http://scholarworks.uno.edu/td/244.
Full textJirattigalachote, Amornrat. "Provisioning Strategies for Transparent Optical Networks Considering Transmission Quality, Security, and Energy Efficiency." Doctoral thesis, KTH, Optical Network Laboratory (ON Lab), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-94011.
Full textGeigel, Arturo. "Unsupervised Learning Trojan." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/17.
Full textGrizzard, Julian B. "Towards Self-Healing Systems: Re-establishing Trust in Compromised Systems." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-04072006-133056/.
Full textSargolzaei, Arman. "Time-Delay Switch Attack on Networked Control Systems, Effects and Countermeasures." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2175.
Full textМикитенко, Олександр Вікторович. "Моніторинг станів інформаційних ресурсів для реалізації адаптивного управління захищеністю комп’ютерних систем". Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/43792.
Full textGodquin, Tanguy. "Sécurisation adaptative des objets de l'IoT par méthodes logicielles (White box) et combinées (hardware et software)." Thesis, Normandie, 2020. http://www.theses.fr/2020NORMC222.
Full textEd-Daoui, Ilyas. "Towards systems-of-systems structural resilience assessment Resilience assessment as a foundation for systems-of-systems safety evaluation : application to an economic infrastructure An approach to systems-of-systems structural analysis through interoperability assessment : application on Moroccan Case A study of an adaptive approach for systems-of-systems integration A contribution to systems-of-systems concept standardization Unstructured peer-to-peer systems : towards swift Routing A deterministic approach for systems-of-systems resilience quantification Vers des systèmes de systèmes robustes Security enhancement architectural model for IMS based networks Towards reliable IMS-based networks." Thesis, Normandie, 2019. http://www.theses.fr/2019NORMIR07.
Full textChiang, Tzu-hsiang, and 江自翔. "The Study of Adaptive Automation Network Security." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/udnxmh.
Full textHsieh, Chou-Ting, and 謝周廷. "An Adaptive Cross-Layer Design Approach for Network Security Management." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/64191416657245367430.
Full textAdahrii, Pfokreni. "Adaptive Cruise Control and Co-Operative Adaptive Cruise Control Model Study Based on Traffic and Network Simulation." Thesis, 2017. http://ethesis.nitrkl.ac.in/8798/1/2017_MT_P_Adahri.pdf.
Full textI-Hsieh, Shih, and 施宜協. "An Application of Grey Prediction , Markov GM(1,1) and Adaptive Network-based Fuzzy Inference System on the Management of Market Neutral-Security Hedge Fund." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/86230834252525520163.
Full textHsieh, Meng-Yen, and 謝孟諺. "An Adaptive Security System in Incrementally Deployed Sensor Networks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/16977362289169391593.
Full textTseng, Ryh-Yuh, and 曾日昱. "Toward an Adaptive Security Assurance Mechanism in Mobile Ad Hoc Networks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/65327496946798478420.
Full textHeydenrych, Mark. "An adaptive multi-agent architecture for critical information infrastructure protection." Thesis, 2014. http://hdl.handle.net/10210/12370.
Full text(6564809), Elisabeth Krueger. "Dynamics of Coupled Natural-Human-Engineered Systems: An Urban Water Perspective on the Sustainable Management of Security and Resilience." Thesis, 2019.
Find full text