Dissertations / Theses on the topic 'Attack and defence'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Attack and defence.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Kemp, Benjamin Peter. "Attack and defence in cassava bacterial blight." Thesis, University of Bath, 2002. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268932.
Full textSandin, Michael. "Pre-Emptive Self-Defence : When does an armed attack occur?" Thesis, Stockholms universitet, Juridiska institutionen, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-193754.
Full textMella, Luca. "Ict security: Testing methodology for targeted attack defence tools." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.
Full textNsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Full textMohr, Peter G., and lswan@deakin edu au. "Abscisic acid regulation of plant defence responses during pathogen attack." Deakin University. School of Biological and Chemical Sciences, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20060927.120049.
Full textGlass, Stephen Mark. "Wireless Networks: Attack and Defence Security in Emergency Communications Netwoks." Thesis, Griffith University, 2011. http://hdl.handle.net/10072/365797.
Full textArnold, Jacquelyn. "British civil defence policy in response to the threat of nuclear attack, 1972-1986." Thesis, London Metropolitan University, 2014. http://repository.londonmet.ac.uk/1287/.
Full textCatic, Elma. "A right to self-defence or an excuse to use armed force? : About the legality of using self-defence before an armed attack has occurred." Thesis, Stockholms universitet, Stockholm Center for International Law and Justice (SCILJ), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-183513.
Full textCrossley, G. J. "The civil defence debate in Britain 1957-83 : an account and critical analysis of the major issues in the debate about civil defence against nuclear attack." Thesis, University of Bradford, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.355206.
Full textIoannou, Georgios. "The Markov multi-phase transferable belief model : a data fusion theory for enhancing cyber situational awareness." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/13742.
Full textPapadopoulos, Panagiotis [Verfasser]. "Hostile Takeovers - The use of Attack and Defence Strategies : A Literature Review of possible theoretical approaches / Panagiotis Papadopoulos." München : GRIN Verlag, 2011. http://d-nb.info/1182342531/34.
Full textJawad, Dina, and Felicia Rosell. "Speak-up as a Resource Based Defence against Application Layer Distributed Denial-of-Service Attacks." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166597.
Full textNavikaitė, Renata. "Teisė į savigyną pagal tarptautinę teisę." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20060316_182254-43668.
Full textMannheimer, Elias. "Dangerous Orbits : Applying the Law of Self-defence to Hostile Acts Against Satellite Systems." Thesis, Uppsala universitet, Juridiska institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-321385.
Full textMelin, Carl Victor. "Does the threshold for an ‘armed attack’ within the meaning of Article 51 of the UN Charter leave a state unable to act vis-à-vis an opponent using hybrid warfare strategies?" Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9973.
Full textCiavatta, Emiliano. "Analisi e ricostruzione di flussi TCP con il software Caronte." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23321/.
Full textHarris, Rae. "Spectre: Attack and Defense." Scholarship @ Claremont, 2019. https://scholarship.claremont.edu/scripps_theses/1384.
Full textMoore, Tyler Weston. "Cooperative attack and defense in distributed networks." Thesis, University of Cambridge, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612283.
Full textZhang, Ning. "Attack and Defense with Hardware-Aided Security." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/72855.
Full textBellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.
Full textAsklander, Niklas, and Christian Schmidt. "ILLUSIONEN OM DET VÄPNADE ANGREPPET." Thesis, Högskolan i Halmstad, Akademin för ekonomi, teknik och naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42330.
Full textFreeman, Christopher John. "Are chemical defenses allocated within sponges to defend regions most at risk to predator attack?" Click here to access thesis, 2007. http://www.georgiasouthern.edu/etd/archive/spring2007/christopher_j_freeman/Freeman_Christopher_J_200701_MS.pdf.
Full textSohail, Imran, and Sikandar Hayat. "Cooperative Defense Against DDoS Attack using GOSSIP Protocol." Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1224.
Full textWong, Ka-Yoon. "Robust defense against small boat attacks." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/4957.
Full textAlmeida, Rui. "Probability models for defense against missile attacks." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/28466.
Full textChen, Suyuan. "Split Manufacturing: Attacks and Defenses." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1554121132885537.
Full textTownsend, James R. "Defense of Naval Task Forces from Anti-Ship Missile attack." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA363038.
Full textWang, Xun. "Widespread Internet attacks defense-oriented evolution and countermeasures /." Columbus, Ohio : Ohio State University, 2007. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1185209072.
Full textYou, Yonghua. "A defense framework for flooding-based DDoS attacks." Thesis, Kingston, Ont. : [s.n.], 2007. http://hdl.handle.net/1974/653.
Full textRafighdoust, Hamed. "The right of self-defence against cyber attacks by states and non-state actors." Doctoral thesis, Universitat Autònoma de Barcelona, 2018. http://hdl.handle.net/10803/666857.
Full textHaberlin, Richard J. "Analysis of unattended ground sensors in theater Missile Defense Attack Operations." Thesis, Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/26369.
Full textTorok, Alexandra. "Halting attack : startle displays and flash coloration as anti-predator defences." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.709452.
Full textWidel, Wojciech. "Formal modeling and quantitative analysis of security using attack- defense trees." Thesis, Rennes, INSA, 2019. http://www.theses.fr/2019ISAR0019.
Full textHancock, Alexandra Preste de Sousa. "Lisboa 2100. Projectar a frente ribeirinha em cenários de alterações climáticas. Water - the only way for a wise city." Master's thesis, Faculdade de Arquitectura de Lisboa, 2012. http://hdl.handle.net/10400.5/4718.
Full textHözel, Jana. "The Paris Attach - a case for the right to self-defence?" Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/24994.
Full textCzarlinska, Aleksandra. "Stealthy attacks and defense strategies in competing sensor networks." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2946.
Full textNanda, Sanjeeb. "GRAPH THEORETIC MODELING: CASE STUDIES IN REDUNDANT ARRAYS OF INDEPENDENT DISKS AND NETWORK DEFENSE." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3165.
Full textWang, Ping. "The next generation botnet attacks and defenses." Doctoral diss., University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4673.
Full textCulpepper, Anna M. "Effectiveness of using red-teams to identify maritime security vulnerabilities to terrorist attack." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sept%5FCulpepper.pdf.
Full textRicherioux, Nicolas. "Analysis of gene expression in barley upon aphid attack." Thesis, Södertörn University College, School of Life Sciences, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-1289.
Full textMossberg, Sofia. "Self-Defence Against Non-State Cyber Attacks : The Attribution Problem in Cyberspace." Thesis, Uppsala universitet, Juridiska institutionen, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411823.
Full textChen, Xiangqian. "Defense Against Node Compromise in Sensor Network Security." FIU Digital Commons, 2007. http://digitalcommons.fiu.edu/etd/7.
Full textHendricksen, Andrew D. "The optimal employment and defense of a deep seaweb acoustic network for submarine communications at speed and depth using a defender-attacker-defender model." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37637.
Full textChang, Kuo-Chao, and 張國昭. "Defence System of D3OS Denial of Service Attack." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/49702905801095278592.
Full textshen, Tse-Wei, and 沈澤崴. "Geographic Threat, Military Defense Capability and Defence budget-Cold War and 911 Terrorist Attack." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/aqqxfy.
Full textLepáček, Marek. "Nutná obrana v ČR, SR a v Irské republice." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-316492.
Full textImeson, Frank. "An Attack and a Defence in the Context of Hardware Security." Thesis, 2013. http://hdl.handle.net/10012/7596.
Full text蘇怡萍. "A Defence Scheme Against Identity Theft Attack Based On Multiple Social Networks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/07704035365222959267.
Full textLu, Kaimin, and 呂開明. "MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/53778078854660584970.
Full textCoelho, Rui Cardoso. "Psychopathy in attack and defence conflicts: a triarchic model approach to the neurophysiological correlates of outcome." Master's thesis, 2019. https://hdl.handle.net/10216/123914.
Full text