Dissertations / Theses on the topic 'Cyber defensive'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 44 dissertations / theses for your research on the topic 'Cyber defensive.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.
Full textWong, Tiong Pern. "Active cyber defense: enhancing national cyber defense." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10713.
Full textStensboel, Karl Birger. "Norwegian cyber defense." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/39016.
Full textCloud, Donald W. "Integrated cyber defenses towards cyber defense doctrine." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FCloud.pdf.
Full textOdhner, Caroline. "Cyber Deterrence Based Upon Conventional Premises : A Discourse Analysis of the US Cyber Deterrence Policy." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10143.
Full textSushereba, Christen Elizabeth Lopez. "Comparison of Cyber Network Defense Visual Displays." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright15272019221867.
Full textMedvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45225.
Full textZhang, Ruide. "Hardware-Aided Privacy Protection and Cyber Defense for IoT." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98791.
Full textAzab, Mohamed Mahmoud Mahmoud. "Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19273.
Full textNsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Full textFlamholz, David B. "Baiting for defense against stealthy attacks on cyber-physical systems." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121858.
Full textDayanikli, Gokcen Yilmaz. "Electromagnetic Interference Attacks on Cyber-Physical Systems: Theory, Demonstration, and Defense." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/104862.
Full textKazinec, Darius. "Issues of cyber warfare in international law." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110705_132153-12860.
Full textSmith, Willarvis. "A Comprehensive Cybersecurity Defense Framework for Large Organizations." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1083.
Full textRubin, Willa. "Waging Wars in Cyberspace: How International Law On Aggression And Self-Defense Falls Short Of Addressing Cyber Warfare.Could Iran Legally Retaliate For The Stuxnet Attack?" Oberlin College Honors Theses / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=oberlin1462921585.
Full textПрокопець, Я. Ю., Михайло Олександрович Думчиков, Михаил Александрович Думчиков та Mykhailo Oleksandrovych Dumchykov. "Реалізація кібербезпеки та шляхи її вдосконалення в Україні". Thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/78670.
Full textLipke, Alexa. "U.S. and NATO Cyber Defense| Bridging the Resource Gap with a Centralized Market Structure." Thesis, The George Washington University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10189713.
Full textEldosouky, Mahmoud Salama Abdelrahman A. "Security of Critical Cyber-Physical Systems: Fundamentals and Optimization." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90281.
Full textBranlat, Matthieu. "Challenges to Adversarial Interplay Under High Uncertainty: Staged-World Study of a Cyber Security Event." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316462733.
Full textPombo, Rodrigo. "Política europeia de segurança no ciberespaço." Master's thesis, Academia da Força Aérea, 2019. http://hdl.handle.net/10400.26/39771.
Full textStewart, Alexander. "The Community Defense Approach: A Human Approach to Cybersecurity for Industrial and Manufacturing Systems." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1562059795078067.
Full textЯровенко, Ганна Миколаївна, Анна Николаевна Яровенко, Hanna Mykolaivna Yarovenko та І. Д. Нечепоренко. "Сучасні технології кіберзахисту щодо виявлення шахрайств, що здійснюються персоналом банку". Thesis, Сумський державний університет, 2019. https://essuir.sumdu.edu.ua/handle/123456789/77725.
Full textKullander, Nathalia. "En analys kring det civila försvaret på lokal nivå. : En jämförande studie mellan Värmland och Örebros resurser och samarbetsförmågor." Thesis, Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-85130.
Full textKanerva, Anton, and Fredrik Helgesson. "On the Use of Model-Agnostic Interpretation Methods as Defense Against Adversarial Input Attacks on Tabular Data." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20085.
Full textPetras, Christopher M. "The convergence of U.S. military and commercial space activities : self-defense and cyber-attack, "peaceful use" and the space station, and the need for legal reform." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33058.
Full textRobin, Jean-Nicolas. "La matière pénale à l'épreuve du numérique." Thesis, Rennes 1, 2017. http://www.theses.fr/2017REN1G035/document.
Full textКалетнік, В. В. "Сучасний стан адміністративно-правового забезпечення інформаційної безпеки в Україні: теоретико-правовий аналіз". Thesis, Національний авіаційний університет, 2021. https://er.nau.edu.ua/handle/NAU/53718.
Full textTsai, Chung-Weng, and 蔡仲威. "Increasing information security skills by using cyber offensive and defensive competitions." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/07725885062425976779.
Full text"A Hacker-Centric Perspective to Empower Cyber Defense." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.57382.
Full textHasan, Mahmudul. "Cybersecurity Planning Insight: CSCD (Cyber Security and Cyber Defense) Control: Framework For Strategic Direction and Governance." Master's thesis, 2021. http://hdl.handle.net/10362/126392.
Full text柯柏宇. "A Study of Virtual-Machine-Based Cyber Defense Exercises." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/7gghfu.
Full textRullo, Antonino, Andrea Pugliese, Domenico Saccà, and Sergio Greco. "Cyber defense of enterprise information systems: advanced isues and techniques." Thesis, 2014. http://hdl.handle.net/10955/1242.
Full text(10907916), Kelly Anne Cole. "Investigating Cyber Performance: An Individual Differences Study." Thesis, 2021.
Find full textWU, KUAN-SHENG, and 吳冠陞. "Implementation of cyber attack and defense strategy in software defined network." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/m44bqg.
Full textCivins, Braden Eph. "In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by." Thesis, 2011. http://hdl.handle.net/2152/ETD-UT-2011-08-4199.
Full textChing-HuangLin and 林敬皇. "Framework Design for Cyber Attack and Defense Exercises with Empirical Cloud Data." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/58312539008444263933.
Full textLopes, Carvalho Viana André. "NATO and Offensive Cybersecurity: A Strategic Analysis." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-387165.
Full textTzy-ShiahWang and 王子夏. "Cyber-Attack Detection and Defense Based on Spectral Analysis and Community Structure Recognition." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/whhzsj.
Full textMolina, Valdiviezo Lorena Paulina, Felice Crupi, and Angelo Furfaro. "Simulation models for the evaluation of detection and defense protocols against cyber attacks." Thesis, 2016. http://hdl.handle.net/10955/1361.
Full text(8072417), Braiden M. Frantz. "CISTAR Cybersecurity Scorecard." Thesis, 2019.
Find full textCHENG, YI-WEN, and 程詒文. "The Normative Framework of the State’s Right of Self-Defense as a Response to Cyber Attack." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/836597.
Full textHsu, Chin-Ping, and 許錦萍. "The Ideal and Reality of Cross-region Joint Defense Cyber Security Policy – A Case Study of A and B-level Government Agencies." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/pb32mv.
Full textYang, Shih-Feng, and 楊世豐. "Research on Application of Cyber Security in Taiwan''s Defense Industry- CSC v6 of SANS Organization as the Inspection Standard." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/455bq4.
Full text"The What, When, and How of Strategic Movement in Adversarial Settings: A Syncretic View of AI and Security." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.62910.
Full text