Dissertations / Theses on the topic 'Computer crimes Computer crimes Computer networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Computer crimes Computer crimes Computer networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Costantini, Kevin C. "Development of a cyber attack simulator for network modeling and cyber security analysis /." Online version of thesis, 2007. http://hdl.handle.net/1850/5440.
Full textSanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.
Full textArgauer, Brian John. "VTAC : virtual terrain assisted impact assessment for cyber attacks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4872.
Full textVan, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.
Full textSeeley, Nathaniel. "Digital receipts : a system to detect the compromise of digital certificates /." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1590.pdf.
Full textFava, Daniel Schnetzer. "Characterization of cyber attacks through variable length Markov models /." Online version of thesis, 2007. http://hdl.handle.net/1850/4776.
Full textFoster, Mark S. "Process forensics the crossroads of checkpointing and intrusion detection /." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0008063.
Full textLee, Christopher Patrick. "Framework for botnet emulation and analysis." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28191.
Full textJudd, Aaron C. "Improved Network Security and Disguising TCP/IP Fingerprint Through Dynamic Stack Modification /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FJudd.pdf.
Full textKortjan, Noloxolo. "A cyber security awareness and education framework for South Africa." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1014829.
Full textKwan, Yuk-kwan, and 關煜群. "The research of using Bayesian inferential network in digital forensicanalysis." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B45898066.
Full textMcConky, Katie Theresa. "Design and analysis of information fusion, dynamic sensor management rules for cyber security systems using simulation /." Online version of thesis, 2007. http://hdl.handle.net/1850/4895.
Full textIbekwe, Chibuko Raphael. "The legal aspects of cybercrime in Nigeria : an analysis with the UK provisions." Thesis, University of Stirling, 2015. http://hdl.handle.net/1893/22786.
Full textTsudama, Brett. "A novel distributed denial-of-service detection algorithm." DigitalCommons@CalPoly, 2004. https://digitalcommons.calpoly.edu/theses/1650.
Full textJiang, Lin, and 蒋琳. "New cryptographic schemes with application in network security and computer forensics." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B44753226.
Full textGottschalk, Jason Howard. "Towards an evaluation and protection strategy for critical infrastructure." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018793.
Full textHashim, Noor Hayati. "An architecture for the forensic analysis of Windows system generated artefacts." Thesis, University of South Wales, 2011. https://pure.southwales.ac.uk/en/studentthesis/forensic-analysis-of-windows-system-generated-artefacts(be571569-2afe-4d52-8c99-9dbc8388b1db).html.
Full textGu, Guofei. "Correlation-based Botnet Detection in Enterprise Networks." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24634.
Full textRansbotham, III Samuel B. "Acquisition and diffusion of technology innovation." Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.
Full textMcRae, Craig Michael. "Using Web bugs and honeytokens to investigate the source of phishing attacks." Master's thesis, Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-04012008-220800.
Full textFairbanks, Kevin D. "Forensic framework for honeypot analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33977.
Full textMelo, Sandro Pereira de. "Taxonomia de técnicas furtivas e antiforenses utilizadas em ataques cibernéticos." Pontifícia Universidade Católica de São Paulo, 2018. https://tede2.pucsp.br/handle/handle/21181.
Full textRansbotham, Samuel B. III. "Acquisition and diffusion of technology innovation." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.
Full textAlharbi, Hani Sayyaf. "Novel analytical modelling-based simulation of worm propagation in unstructured peer-to-peer networks." Thesis, University of Stirling, 2017. http://hdl.handle.net/1893/25389.
Full textEgan, Shaun Peter. "A framework for high speed lexical classification of malicious URLs." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011933.
Full textErdonmez, Erhan. "Investigation of Computer Crimes." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3185/.
Full textSteh, Stephen. "Unauthorized access crimes /." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
Full text孫陸陽. "暗網絡犯罪的刑法問題研究 =Research on criminal law of dark network crime". Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950654.
Full textSamsuddin, Samsuddin Wira Bin Tu Manghui. "Digital forensics curriculum for undergraduate and master graduate students." [Cedar City, Utah] : Southern Utah University, 2009. http://unicorn.li.suu.edu/ScholarArchive/ForensicScience/SamsuddinWira.pdf.
Full textImhof, Robert. "Cyber crime and telecommunications law /." Online version of thesis, 2010. http://hdl.handle.net/1850/12268.
Full textSteh, Stephen R. "Unauthorized Access Crimes." Youngstown State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
Full textWai, Hor Cheong. "Research in computer forensics." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FHor.pdf.
Full textHendry, Gilbert R. "Applicability of clustering to cyber intrusion detection /." Online version of thesis, 2007. http://hdl.handle.net/1850/4777.
Full textBassi, Steven D. "An automated acquisition system for media exploitation." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483619.
Full textStimson, Jared M. "Forensic analysis of Window's® virtual memory incorporating the system's page-file." Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FStimson.pdf.
Full textMaliehe, Mamotumi. "Cybercrime Legislation in Lesotho." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/4662.
Full textYoung, Lap-ping John. "Using cultural perspective to study teenage computer crime." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B31979415.
Full textLaw, Yuet-wing, and 羅越榮. "Investigation models for emerging computer forensic challenges." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46971324.
Full textCassidy, Regis H. Friend. "Automating case reports for the analysis of digital evidence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FCassidy.pdf.
Full textHunter, Harry A. "Computer crime and identity theft." [Denver, Colo.] : Regis University, 2010. http://adr.coalliance.org/codr/fez/view/codr:144.
Full textSonnekus, Michael Hendrik. "A comparison of open source and proprietary digital forensic software." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017939.
Full textProffitt, Tim Gene. "The Effects of Computer Crimes on the Management of Disaster Recovery." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5252.
Full textNeophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.
Full textIbarra, Olivares Rebeca. "Social mechanisms of tax behaviour." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:2893069a-a2bf-46ff-a769-e9ec4ec58b48.
Full textZomba, Lincoln Benn. "Computer related crimes: a comparative analysis of Tanzanian and South African frameworks." Thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/13039.
Full textGunestas, Murat. "An evidence management model for web services behavior." Fairfax, VA : George Mason University, 2009. http://hdl.handle.net/1920/5631.
Full textFei, Bennie Kar Leung. "Data visualisation in digital forensics." Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-03072007-153241.
Full textUrrea, Jorge Mario. "An analysis of Linux RAM forensics." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FUrrea.pdf.
Full textCosta, Fernando José da. "Locus delicti nos crimes informáticos." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/2/2136/tde-24042012-112445/.
Full textHewling, Moniphia Orlease. "Digital forensics : an integrated approach for the investigation of cyber/computer related crimes." Thesis, University of Bedfordshire, 2013. http://hdl.handle.net/10547/326231.
Full text