Dissertations / Theses on the topic 'Cyber Algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 27 dissertations / theses for your research on the topic 'Cyber Algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Full textChatterjee, Aakriti. "Development of an RSA Algorithm using Reduced RISC V instruction Set." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1617104502129937.
Full textRoychowdhury, Sayak. "Data-Driven Policies for Manufacturing Systems and Cyber Vulnerability Maintenance." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1493905616531091.
Full textGuymon, Daniel Wade. "Cyber-physical Algorithms for Enhancing Collaboration." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/31919.
Full textGujrati, Sumeet. "Models and algorithms for cyber-physical systems." Diss., Kansas State University, 2013. http://hdl.handle.net/2097/16922.
Full textFurrer, Frank J., and Georg Püschel. "From Algorithmic Computing to Autonomic Computing." Technische Universität Dresden, 2018. https://tud.qucosa.de/id/qucosa%3A30773.
Full textKem, Oudom. "Modélisation et exploitation des connaissances de l’environnement : une approche multi-agents pour la recherche d’itinéraires multi-objectifs dans des environnements ubiquitaires." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEM023.
Full textStaub, Nicolas. "Models, algorithms and architectures for cooperative manipulation with aerial and ground robots." Thesis, Toulouse 3, 2018. http://www.theses.fr/2018TOU30169/document.
Full textMarkwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.
Full textRukavina, Ivan. "Cyber-physics intrinsic modelling for smart systems." Thesis, Compiègne, 2021. http://bibliotheque.utc.fr/EXPLOITATION/doc/IFD/2021COMP2581.
Full textParizad, Ali. "False Data and Threat Detection Methods for Power Systems Under Cyber Attacks Based On Big Data and Deep Learning Algorithms." OpenSIUC, 2021. https://opensiuc.lib.siu.edu/dissertations/1941.
Full textHaj, kacem Mohamed Amine. "Contribution au développement d'une méthodologie de diagnostic des systèmes Cyber-Physique." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT119.
Full textAl, Khatib Mohammad. "Analyse de stabilité, ordonnancement, et synthèse des systèmes cyber-physiques." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM041/document.
Full textWei, Longfei. "Game-Theoretic and Machine-Learning Techniques for Cyber-Physical Security and Resilience in Smart Grid." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3850.
Full textPetersen, Rebecca. "Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28002.
Full textGracy, Sebin. "Input and State Observability of Linear Network Systems with Application to Security of Cyber Physical Systems." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT075/document.
Full textUjjwal, Kumar. "Cyber haggler web based bargaining using genetic algorithm /." 2007. http://purl.galileo.usg.edu/uga%5Fetd/ujjwal%5Fkumar%5F200705%5Fms.
Full textYang, Shun-Chieh, and 楊順傑. "A Discrete Cyber Swarm Algorithm with Intensification and Diversification Strategies." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/27775423616829818686.
Full textCHAO, CHING-HUI, and 趙景暉. "Cyber Swarm Algorithm Based Multiple Prediction Methods for Taiwan Electricity Demand." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/80321751010797910367.
Full text(8782601), Puwadol Dusadeerungsikul. "Operations Analytics and Optimization for Unstructured Systems: Cyber Collaborative Algorithms and Protocols for Agricultural Systems." Thesis, 2020.
Find full textZheng, Renda, and 鄭仁達. "A study for the implementation of discrete cyber swarm algorithms." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/44755480295420644635.
Full text"From Algorithmic Computing to Autonomic Computing." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2018. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-232820.
Full textBigazzi, Luca. "Development of navigation techniques and algorithms for small uavs (unmanned aerial vehicle) able to follow trajectories with centimeter precision." Doctoral thesis, 2021. http://hdl.handle.net/2158/1247581.
Full textSaradha, R. "Malware Analysis using Profile Hidden Markov Models and Intrusion Detection in a Stream Learning Setting." Thesis, 2014. http://etd.iisc.ac.in/handle/2005/3129.
Full textSaradha, R. "Malware Analysis using Profile Hidden Markov Models and Intrusion Detection in a Stream Learning Setting." Thesis, 2014. http://hdl.handle.net/2005/3129.
Full textKumar, Pawan. "Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems." Thesis, 2012. https://etd.iisc.ac.in/handle/2005/2321.
Full textKumar, Pawan. "Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems." Thesis, 2012. http://etd.iisc.ernet.in/handle/2005/2321.
Full text