Dissertations / Theses on the topic 'Cyber Threat Analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 18 dissertations / theses for your research on the topic 'Cyber Threat Analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Chah, Niel. "North Korea : cyber threat perception and metadata analysis." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/50082.
Full textMarchenko, Maksym. "Understanding and analysis of cyber threats." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/50999.
Full textJavaid, Ahmad Yazdan. "Cyber Security Threat Analysis and Attack Simulation for Unmanned Aerial Vehicle Network." University of Toledo / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1438816219.
Full textMorgan, Deanne. "Assessing Terrorist Cyber Threats: Engineering a Functional Construct." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc799463/.
Full textMunir, Rashid. "A Quantitative Security Assessment of Modern Cyber Attacks. A Framework for Quantifying Enterprise Security Risk Level Through System's Vulnerability Analysis by Detecting Known and Unknown Threats." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/14251.
Full textGripenstedt, Daniel, and Joakim Öberg. "A security analysis in a life science environment : a case study." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-299357.
Full textDuisembiyeva, Akzharkyn. "Automated security analysis of a SCADA system." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-286336.
Full textErendor, Mehmet Emin. "An analysis of threat perceptions : combating cyber terrorism : the policies of NATO and Turkey, evaluated using game theory in the context of international law." Thesis, University of Southampton, 2017. https://eprints.soton.ac.uk/404985/.
Full textEvensjö, Lina. "Probability analysis and financial model development of MITRE ATT&CK Enterprise Matrix's attack steps and mitigations." Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289636.
Full textMészáros, Jan. "Rámec pro řízení bezpečnostních rizik on-line služeb." Doctoral thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-203732.
Full textSun, Tithnara Nicolas. "Modélisation et analyse formelle de modèles système pour les menaces persistantes avancées." Electronic Thesis or Diss., Brest, École nationale supérieure de techniques avancées Bretagne, 2022. http://www.theses.fr/2022ENTA0004.
Full textQuaglia, Flavia <1991>. "Information and Communication Technology (ICT)and cyber threats: the main fields of analysis." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/7945.
Full textLi, Weifeng, and Weifeng Li. "Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625640.
Full textBača, Jonatán. "Informační a kybernetické hrozby v roce 2019." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417712.
Full textRukavina, Ivan. "Cyber-physics intrinsic modelling for smart systems." Thesis, Compiègne, 2021. http://bibliotheque.utc.fr/EXPLOITATION/doc/IFD/2021COMP2581.
Full textLin, Chih-Hung, and 林志鴻. "Efficient Hypervisor-based Cyber Threat Monitoring and Analysis." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/gdd7as.
Full textGhafir, Ibrahim, M. Hammoudeh, V. Prenosil, et al. "Detection of advanced persistent threat using machine-learning correlation analysis." 2018. http://hdl.handle.net/10454/17614.
Full textHsien-DeHuang and 黃獻德. "Deep learning based anomaly analysis in cyber threats." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/m2awfx.
Full text