Dissertations / Theses on the topic 'Communicative attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Communicative attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Corzine, Larry M. "Communication breakdown DHS operations during a cyber attack." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/4987.
Full textBas, Ali Karaca Volkan. "A simulation on organizational communication patterns during a terrorist attack." Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483636.
Full textKaraca, Volkan. "A simulation on organizational communication patterns during a terrorist attack." Thesis, Monterey, California. Naval Postgraduate School, 2008. http://hdl.handle.net/10945/4106.
Full textShahriar, Chowdhury M. R. "Resilient Waveform Design for OFDM-MIMO Communication Systems." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/56973.
Full textToure, Almamy. "Collection, analysis and harnessing of communication flows for cyber-attack detection." Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.
Full textGroeling, Tim. "When politicians attack : the causes, contours, and consequences of partisan political communication /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC IP addresses, 2001. http://wwwlib.umi.com/cr/ucsd/fullcit?p3027048.
Full textLambert, Maria T. "Attack of the Mommy Mafia| Examining The Honest Company's Use of Coombs' SCCT Strategies." Thesis, University of Louisiana at Lafayette, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1593182.
Full textBedhammar, Jennifer, and Oliver Johansson. "Visualization of cyber security attacks." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167144.
Full textFranz, Elke, Stefan Pfennig, and André Fischer. "Communication Overhead of Network Coding Schemes Secure against Pollution Attacks." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-89807.
Full textAtiiq, Syafiq Al. "Adaptive Counteraction Against Denial of Service Attack." Thesis, KTH, Nätverk och systemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-219382.
Full textFischer, Benjamin. "Vehicular Group Membership Resilient to Malicious Attacks." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086.
Full textAlbarino, Laurie Ann. "Nonprofit Leader External Communication Strategies to Attract New Donors." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7853.
Full textAlnifie, Ghada Matooq. "A multi-channel defense against communication denial-of-service attacks in wireless networks." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3347.
Full textOpie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.
Full textRen, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.
Full textMatte, Célestin. "Wi-Fi tracking : Fingerprinting attacks and counter-measures." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSEI114/document.
Full textWu, Jingqi. "Cooperative Jamming in Wireless Networks - Turning Attacks into Privacy Protection." ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/885.
Full textSargolzaei, Arman. "Time-Delay Switch Attack on Networked Control Systems, Effects and Countermeasures." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2175.
Full textMaouche, Mohamed. "Protection against re-identification attacks in location privacy." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI089.
Full textVuković, Ognjen, György Dán, and Gunnar Karlsson. "Traffic Analysis Attacks in Anonymity Networks : Relationship Anonymity-Overhead Trade-off." KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-122444.
Full textBittl, Sebastian. "Efficient Secure Communication in VANETs under the Presence of new Requirements Emerging from Advanced Attacks." Doctoral thesis, Humboldt-Universität zu Berlin, 2017. http://dx.doi.org/10.18452/18419.
Full textHoblos, Jalaa. "Selfish Node Misbehaving Statistical Detection with Active MAC Layer NAV Attack in Wireless Networks}." [Kent, Ohio] : Kent State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=kent1164119272.
Full textOnwubiko, Cyril. "A security framework for detecting enterprise-wide attacks in computer networks." Thesis, Kingston University, 2008. http://eprints.kingston.ac.uk/20301/.
Full textRathinakumar, Saravana Manickam. "Research on efficiency and privacy issues in wireless communication." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31294.
Full textBengtsson, Filip, and Matteo Madrusan. "Near Field Communication Security concerns & applicable security in Android." Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-20996.
Full textHulstrom-Garces, Erika. "Crisis public relations : how law enforcement agencies responded to the sniper attacks of 2002." Scholarly Commons, 2003. https://scholarlycommons.pacific.edu/uop_etds/584.
Full textSundberg, Sarah. "Data Link Layer Security for Spacecraft Communication Implementation on FPGA." Thesis, Linköpings universitet, Informationskodning, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-168808.
Full textAlserhani, Faeiz. "A framework for correlation and aggregation of security alerts in communication networks : a reasoning correlation and aggregation approach to detect multi-stage attack scenarios using elementary alerts generated by Network Intrusion Detection Systems (NIDS) for a global security perspective." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5430.
Full textBjörklund, Filip, and Niklas Landin. "Board and Chip Diversity in Deep Learning Side-Channel Attacks : On ATtiny85 Implementations Featuring Encryption and Communication." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-300766.
Full textMendoza, Patricia A. "An enhanced method for the existing bluetooth pairing protocol to avoid impersonation attacks." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textWahlgren, Alex, and Joakim Thorn. "Detecting ADS-B spoofing attacks : using collected and simulated data." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-179040.
Full textde, Waern Henrik. "Computer Network Attack som olovligt våld : en fråga om association, effekt, aktör och mål." Thesis, Swedish National Defence College, Swedish National Defence College, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-22.
Full textHe, Xiaobing [Verfasser], Hermann de [Akademischer Betreuer] Meer, and Stefan [Akademischer Betreuer] Rass. "Threat Assessment for Multistage Cyber Attacks in Smart Grid Communication Networks / Xiaobing He ; Hermann de Meer, Stefan Rass." Passau : Universität Passau, 2017. http://d-nb.info/114461144X/34.
Full textVæver, Kronborg Katja. "The Stockholm Terror Attack 2017 : How Domestic and International Online News Media Framed the Act and Empowered Involved Actors." Thesis, Högskolan för lärande och kommunikation, Högskolan i Jönköping, HLK, Medie- och kommunikationsvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40859.
Full textHaq, Izaz ul. "Information and Communication Technologies, Globalization and Terrorism : An empirical analysis of terrorist attacks around the world from 1991-2006." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-11878.
Full textKero, Chanelle. "A Literature Review of Connected and Automated Vehicles : Attack Vectors Due to Level of Automation." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80322.
Full textZhu, Hua. "A Critical-Dramatistic Study of Rhetoric: Analyzing Ideological Representations of China in the Reporting of the Kunming Attack." Miami University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=miami1430085109.
Full textHulstrom-Garces, Erika. "Crisis public relations : how law enforcement agencies responded to the sniper attacks of 2002 : a thesis." Scholarly Commons, 2001. https://scholarlycommons.pacific.edu/uop_etds/584.
Full textStepura, I. S., and M. A. Sablina. "The Experience of Using Social Networks to Attract Students to Scientific Research." Thesis, Sumy State University, 2016. http://essuir.sumdu.edu.ua/handle/123456789/47043.
Full textThornberg, Jack. "Distant Suffering : A multimodal analysis of the politics of pity in news agencies’ mediation of the chemical weapons attack on Khan Sheikhoun." Thesis, Försvarshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-7014.
Full textStagkopoulou, Alexandra. "Simulative Evaluation of Security Monitoring Systems based on SDN." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193710.
Full textPark, DongGook. "Cryptographic protocols for third generation mobile communication systems." Thesis, Queensland University of Technology, 2001.
Find full textGharbi, Imen. "Tatouage pour le renforcement de la qualité audio des systèmes de communication bas débit." Phd thesis, Université René Descartes - Paris V, 2013. http://tel.archives-ouvertes.fr/tel-00817318.
Full textTanase, Karlsson Sandra. "Intern kommunikation under krissituation : en kvalitativ studie av Polismyndighetens interna kommunikation under och efter terrorattentatet i december 2010." Thesis, Södertörns högskola, Institutionen för kommunikation, medier och it, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-9339.
Full textBittl, Sebastian [Verfasser], Björn [Gutachter] Scheuermann, Frank [Gutachter] Kargl, and Falko [Gutachter] Dressler. "Efficient Secure Communication in VANETs under the Presence of new Requirements Emerging from Advanced Attacks / Sebastian Bittl ; Gutachter: Björn Scheuermann, Frank Kargl, Falko Dressler." Berlin : Humboldt-Universität zu Berlin, 2017. http://d-nb.info/1189330423/34.
Full textMekhitarian, Araxi, and Amir Rabiee. "A simulation study of an application layer DDoS detection mechanism." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191145.
Full textGharbi, Imen. "Tatouage pour le renforcement de la qualité audio des systèmes de communication bas débit." Electronic Thesis or Diss., Paris 5, 2013. http://www.theses.fr/2013PA05S004.
Full textHatfield, Katherine L. "A culture of terror rises out of the dust : a rhetorical analysis of iconic imagery in the aftermath of 9/11 /." View abstract, 2006. http://wwwlib.umi.com/dissertations/fullcit/3203332.
Full textLewis, Michael J. "Representations and Discourse of Torture in Post 9/11 Television: An Ideological Critique of 24 and Battlestar Galactica." Bowling Green State University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1205864439.
Full textAmoordon, Andy. "Méthodes de détection d'attaques cybernétiques par une surveillance multicouches de communication." Electronic Thesis or Diss., Université de Lille (2022-....), 2022. http://www.theses.fr/2022ULILN042.
Full text