Dissertations / Theses on the topic 'Cyber Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cyber Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Callegari, Giacomo <1995>. "Cyber Risk Analysis and Cyber Security." Master's Degree Thesis, Università Ca' Foscari Venezia, 2020. http://hdl.handle.net/10579/18083.
Full textLOBATO, LUÍSA CRUZ. "UNRAVELING THE CYBER SECURITY MARKET: THE STRUGGLES AMONG CYBER SECURITY COMPANIES AND THE PRODUCTION OF CYBER (IN)SECURITY." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2016. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=27784@1.
Full textPetrelli, Filippo <1991>. "La cyber insurance per gestire il cyber security risk." Master's Degree Thesis, Università Ca' Foscari Venezia, 2020. http://hdl.handle.net/10579/16913.
Full textSridharan, Venkatraman. "Cyber security in power systems." Thesis, Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43692.
Full textAlmualla, Mohammed Humaid. "Collaborative cyber security situational awareness." Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/16206.
Full textKonstantinos, Konstantinidis. "Automated cyber security compliance assessment." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-200950.
Full textBedhammar, Jennifer, and Oliver Johansson. "Visualization of cyber security attacks." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167144.
Full textTar, Nicholas L. K. "When Cyber Systems Crash: Attitudes Towards Cyber Utilization And Security." NSUWorks, 2017. http://nsuworks.nova.edu/shss_dcar_etd/69.
Full textSmeets, Max. "Going cyber : the dynamics of cyber proliferation and international security." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:ab28f9fc-dd21-4b34-809e-e0d100125e84.
Full textMiller, William B. "Classifying and Cataloging Cyber-Security Incidents Within Cyber-Physical Systems." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4345.
Full textStomeo, Carlo. "Applying Machine Learning to Cyber Security." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17303/.
Full textJones, Malachi G. "Asymmetric information games and cyber security." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50284.
Full textZepf, Arthur L. IV. "Cyber-security curricula for basic users." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37750.
Full textJackson, Jennifer T. "A biodiversity approach to cyber security." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/106820/.
Full textDesmit, Zachary James. "Cyber-Physical Security for Advanced Manufacturing." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/91401.
Full textOliparambil, Shanmughan Vivek. "Lightweight Environment for Cyber Security Education." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2390.
Full textTian, Ke. "Learning-based Cyber Security Analysis and Binary Customization for Security." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/85013.
Full textLowery, Edward W. "Closing the cyber gap: integrating cross-government cyber capabilities to support the DHS cyber security mission." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/44608.
Full textTang, Han. "Security analysis of a cyber-physical system." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.umr.edu/thesis/pdf/Tang_09007dcc803cfb5c.pdf.
Full textTestart, Pacheco Cecilia Andrea. "Understanding the institutional landscape of cyber security." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/104820.
Full textLiao, Weixian. "SECURITY AND PRIVACY OF CYBER-PHYSICAL SYSTEMS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=case1525718335240014.
Full textPatterson, Joanna. "Cyber-Security Policy Decisions in Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4551.
Full textCook, Kimberly Diane. "Effective Cyber Security Strategies for Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3871.
Full textDi, Fresco Giovanni <1991>. "Cyber-Security: an international and comparative perspective." Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14704.
Full textGriffiths, Jordan Luke. "Cyber security as an emerging challenge to South African national security." Diss., University of Pretoria, 2017. http://hdl.handle.net/2263/62639.
Full textCostantini, Kevin C. "Development of a cyber attack simulator for network modeling and cyber security analysis /." Online version of thesis, 2007. http://hdl.handle.net/1850/5440.
Full textMoore, Ryan J. "Prospects for cyber deterrence." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FMoore.pdf.
Full textSalim, Hamid M. "Cyber safety : a systems thinking and systems theory approach to managing cyber security risks." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90804.
Full textSjöstedt, Matildha. "Monitoring of Cyber Security Exercise Environments in Cyber Ranges : with an implementation for CRATE." Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177647.
Full textFalangi, Francesca. "La Cyber Security e il caso dell'azienda Beta." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018.
Find full textSommestad, Teodor. "A framework and theory for cyber security assessments." Doctoral thesis, KTH, Industriella informations- och styrsystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103690.
Full textVuković, Ognjen. "Cyber-security in Smart Grid Communication and Control." Doctoral thesis, KTH, Kommunikationsnät, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-152223.
Full textEllithorpe, James O. "The Role and Impact of Cyber Security Mentoring." Thesis, Walden University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10126660.
Full textAl, Zaidi Mazin M. "Cyber security behavioural intentions for trade secret protection." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/108526/.
Full textMasonganye, James. "Analysis of cyber security in smart grid systems." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/66218.
Full textGiannini, Martina. "Improving Cyber-Security of Power System State Estimators." Thesis, KTH, Reglerteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142843.
Full textCameron, Calum Duncan. "Self-organising smart grid architectures for cyber-security." Thesis, University of Newcastle upon Tyne, 2017. http://hdl.handle.net/10443/3799.
Full textSheen, Frank Jordan. "An Extensible Technology Framework for Cyber Security Education." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/4375.
Full textDahlman, Elsa, and Karin Lagrelius. "A Game of Drones : Cyber Security in UAVs." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259295.
Full textBarosy, Wileen. "Successful Operational Cyber Security Strategies for Small Businesses." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6969.
Full textColella, Antonio. "Cyber security and ubiquity: an human-centric approach." Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2688.
Full textRassega, Valter. "Cyber security risk management nei servizi pubblici strategici." Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2571.
Full textUuganbayar, Ganbayar. "Relation between cyber insurance and security investments/controls." Doctoral thesis, Università degli studi di Trento, 2021. http://hdl.handle.net/11572/301551.
Full textUuganbayar, Ganbayar. "Relation between cyber insurance and security investments/controls." Doctoral thesis, Università degli studi di Trento, 2021. http://hdl.handle.net/11572/301551.
Full textHerpig, Sven [Verfasser]. "Anti-War and the Cyber Triangle : Strategic Implications of Cyber Operations and Cyber Security for the State / Sven Herpig." Berlin : epubli GmbH, 2016. http://d-nb.info/1081304472/34.
Full textLyn, Kevin G. "Classification of and resilience to cyber-attacks on cyber-physical systems." Thesis, Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53926.
Full textMezzour, Ghita. "Assessing the Global Cyber and Biological Threat." Research Showcase @ CMU, 2015. http://repository.cmu.edu/dissertations/535.
Full textHumphrey, Mike. "Identifying the critical success factors to improve information security incident reporting." Thesis, Cranfield University, 2017. http://dspace.lib.cranfield.ac.uk/handle/1826/12739.
Full textAkella, Ravi Chandra. "Information flow properties for cyber-physical systems." Diss., Rolla, Mo. : Missouri University of Science and Technology, 2009. http://scholarsmine.mst.edu/thesis/pdf/Akella_09007dcc806406a3.pdf.
Full textHasan, Md Mahmud. "Optimal Cyber Security Placement Schemes for Smart City Infrastructures." Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/36199.
Full text