Dissertations / Theses on the topic 'Classification of Cyber- Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Classification of Cyber- Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Lyn, Kevin G. "Classification of and resilience to cyber-attacks on cyber-physical systems." Thesis, Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53926.
Full textThames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Full textHurst, William. "Behavioural observation for critical infrastructure security support." Thesis, Liverpool John Moores University, 2014. http://researchonline.ljmu.ac.uk/4382/.
Full textKameníček, Lukáš. "Kybernetická bezpečnost z pohledu podnikové informatiky." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-264292.
Full textBedhammar, Jennifer, and Oliver Johansson. "Visualization of cyber security attacks." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167144.
Full textMasood, Ummi Hani Binti. "Countering cyber attacks in Malaysian law : assessing the concept of cyber attacks and the countermeasures." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/17787/.
Full textHätty, Niklas. "Representing attacks in a cyber range." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159838.
Full textLiivakant, André. "Web Warfare : NATO, Cyber-attacks and Territoriality." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-341302.
Full textDai, Pei-Ying. "Non-technical approaches to fighting cyber attacks." Thesis, University of Lincoln, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.685305.
Full textYermalovich, Pavel. "Risk estimation and prediction of cyber attacks." Doctoral thesis, Université Laval, 2021. http://hdl.handle.net/20.500.11794/67982.
Full textWhyte, David L. 1967. "Using a systems-theoretic approach to analyze cyber attacks on cyber-physical systems." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/110143.
Full textGarcia, Colleen Elizabeth. "Regulating nation-state cyber attacks in counterterrorism operations." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FGarcia.pdf.
Full textRubio, Hernan Jose Manuel. "Detection of attacks against cyber-physical industrial systems." Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015/document.
Full textHachem, Nabil. "MPLS-based mitigation technique to handle cyber attacks." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0013/document.
Full textRubio, Hernan Jose Manuel. "Detection of attacks against cyber-physical industrial systems." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015.
Full textHachem, Nabil. "MPLS-based mitigation technique to handle cyber attacks." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0013.
Full textFava, Daniel Schnetzer. "Characterization of cyber attacks through variable length Markov models /." Online version of thesis, 2007. http://hdl.handle.net/1850/4776.
Full textArgauer, Brian John. "VTAC : virtual terrain assisted impact assessment for cyber attacks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4872.
Full textMao, Xinyue. "Visualization and Natural Language Representation of Simulated Cyber Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246090.
Full textHarshe, Omkar Anand. "Preemptive Detection of Cyber Attacks on Industrial Control Systems." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/54005.
Full textLambert, Glenn M. II. "Security Analytics: Using Deep Learning to Detect Cyber Attacks." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/728.
Full textSaglam, Mehmet. "A Military Planning Methodology for Conducting Cyber Attacks on Power Grid." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/49435.
Full textAgarwal, Rahul. "Graph-Based Simulation for Cyber-Physical Attacks on Smart Buildings." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/103614.
Full textFlamholz, David B. "Baiting for defense against stealthy attacks on cyber-physical systems." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121858.
Full textYaseen, Amer Atta. "Toward self-detection of cyber-physical attacks in control systems." Thesis, Lille 1, 2019. http://www.theses.fr/2019LIL1I040/document.
Full textMyers, David. "Detecting cyber attacks on industrial control systems using process mining." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/130799/1/David_Myers_Thesis.pdf.
Full textNsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Full textCheng, Long. "Program Anomaly Detection Against Data-Oriented Attacks." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/84937.
Full textPuttaroo, Mohammad Ally Rehaz. "A behavioural study in runtime analysis environments and drive-by download attacks." Thesis, University of West London, 2017. https://repository.uwl.ac.uk/id/eprint/4751/.
Full textDo, Van Long. "Sequential detection and isolation of cyber-physical attacks on SCADA systems." Thesis, Troyes, 2015. http://www.theses.fr/2015TROY0032/document.
Full textRadziwill-Širjajev, Yaroslav. "Cyber-attacks and international law : imperfections of a stagnant legal regime." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/62716/.
Full textNicholson, Andrew. "Wide spectrum attribution : using deception for attribution intelligence in cyber attacks." Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/11418.
Full textKatsikeas, Sotirios. "vehicleLang: a probabilistic modeling and simulation language for vehicular cyber attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232182.
Full textLiu, Jessamyn. "Anomaly detection methods for detecting cyber attacks in industrial control systems." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/129055.
Full textDayanikli, Gokcen Yilmaz. "Electromagnetic Interference Attacks on Cyber-Physical Systems: Theory, Demonstration, and Defense." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/104862.
Full textMousavinejad, Seyed Eman. "Cyber-Physical Attack Detection for Networked Control Systems." Thesis, Griffith University, 2020. http://hdl.handle.net/10072/395098.
Full textAlhomoud, Adeeb M. "A self-healing framework to combat cyber attacks : analysis and development of a self-healing mitigation framework against controlled malware attacks for enterprise networks." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/7331.
Full textMossberg, Sofia. "Self-Defence Against Non-State Cyber Attacks : The Attribution Problem in Cyberspace." Thesis, Uppsala universitet, Juridiska institutionen, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411823.
Full textAiello, Brady Benjamin. "Analyzing Global Cyber Attack Correlates Through an Open Database." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1898.
Full textOseku-Afful, Thomas. "The use of Big Data Analytics to protect Critical Information Infrastructures from Cyber-attacks." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-59779.
Full textWardle, Madelyn. "Offensive Cyber Operations: An Examination of Their Revolutionary Capabilities." Wright State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=wright1620995515559657.
Full textGraziano, Timothy Michael. "Establishment of a Cyber-Physical Systems (CPS) Test Bed to Explore Traffic Collision Avoidance System (TCAS) Vulnerabilities to Cyber Attacks." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104624.
Full textHaataja, Samuli. "Cyber Attacks and International Law on the Use of Force: an Informational Approach." Thesis, Griffith University, 2017. http://hdl.handle.net/10072/365740.
Full textJohansson, Jonatan. "COUNTERMEASURES AGAINST COORDINATED CYBER-ATTACKS TOWARDS POWER GRID SYSTEMS : A systematic literature study." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17715.
Full textHolm, Linnéa. "Cyber attacks & coercion in the digital era. : A qualitative case analysis of the North Korean cyber attack on Sony Pictures." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-323583.
Full textVuković, Ognjen, and György Dán. "On the Security of Distributed Power System State Estimation under Targeted Attacks." KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-122442.
Full textRodofile, Nicholas R. "Generating attacks and labelling attack datasets for industrial control intrusion detection systems." Thesis, Queensland University of Technology, 2018. https://eprints.qut.edu.au/121760/1/Nicholas_Rodofile_Thesis.pdf.
Full textRafighdoust, Hamed. "The right of self-defence against cyber attacks by states and non-state actors." Doctoral thesis, Universitat Autònoma de Barcelona, 2018. http://hdl.handle.net/10803/666857.
Full textDuessel, Patrick [Verfasser]. "Detection of unknown cyber attacks using convolution kernels over attributed language models / Patrick Duessel." Bonn : Universitäts- und Landesbibliothek Bonn, 2018. http://d-nb.info/1162953187/34.
Full textJolley, Jason. "Attribution, state responsibility, and the duty to prevent malicious cyber-attacks in international law." Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8452/.
Full text