Dissertations / Theses on the topic 'Digital attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Digital attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Liu, Yan. "Digital Video Watermarking Robust to Geometric Attacks and Compressions." Thesis, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/20281.
Full textCerovic, Lazar. "Identifying Resilience Against Social Engineering Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280131.
Full textSu, Karen. "Digital video watermarking principles for resistance to collusion and interpolation attacks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ63030.pdf.
Full textOpie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.
Full textHolm, Linnéa. "Cyber attacks & coercion in the digital era. : A qualitative case analysis of the North Korean cyber attack on Sony Pictures." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-323583.
Full textSteiner, Hrafn. "Coercive instruments in the digital age : The cases of cyber-attacks against Estonia and Iran." Thesis, Försvarshögskolan, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-5273.
Full textHuang, Chun-Ching Andy. "Using identity-based privacy-protected access control filter FILTER (IPACF) to against denial of service attacks and protect user privacy." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/HUANG_CHUN-CHING_20.pdf.
Full textGe, Shizun. "Design of reliable and secure devices by algebraic manipulation codes." Thesis, Boston University, 2012. https://hdl.handle.net/2144/21153.
Full textMouton, Francois. "Digital forensic readiness for wireless sensor network environments." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/24955.
Full textKeskinarkaus, A. (Anja). "Digital watermarking techniques for printed images." Doctoral thesis, Oulun yliopisto, 2013. http://urn.fi/urn:isbn:9789526200583.
Full textAlatram, Ala'a A. M. "A forensic framework for detecting denial-of-service attacks in IoT networks using the MQTT protocol." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2561.
Full textWeiner, Michael [Verfasser], Georg [Akademischer Betreuer] Sigl, Bou Salvador [Gutachter] Manich, and Georg [Gutachter] Sigl. "Hardening Digital Circuits against Invasive Attacks with On-Chip Delay Measurements / Michael Weiner ; Gutachter: Salvador Manich Bou, Georg Sigl ; Betreuer: Georg Sigl." München : Universitätsbibliothek der TU München, 2020. http://d-nb.info/122431333X/34.
Full textСалієва, О. В. "Дослідження захищеності протоколу сліпого електронного цифрового підпису Чаума". Thesis, ВНТУ, 2018. http://ir.lib.vntu.edu.ua//handle/123456789/21230.
Full textCamurati, Giovanni. "Security Threats Emerging from the Interaction Between Digital Activity and Radio Transceiver." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS279.
Full textShanmugam, Karthikeyan. "Validating digital forensic evidence." Thesis, Brunel University, 2011. http://bura.brunel.ac.uk/handle/2438/7651.
Full textJeong, Taehoon. "Secure analog-to-digital conversion against power side-channel attack." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127018.
Full textGomina, Kamil. "Méthodologie et développement de solutions pour la sécurisation des circuits numériques face aux attaques en tensions." Thesis, Saint-Etienne, EMSE, 2014. http://www.theses.fr/2014EMSE0751.
Full textFlucke, Thomas J. "IDENTIFICATION OF USERS VIA SSH TIMING ATTACK." DigitalCommons@CalPoly, 2020. https://digitalcommons.calpoly.edu/theses/2208.
Full textNyeem, Hussain Md Abu. "A digital watermarking framework with application to medical image security." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/74749/1/Hussain%20Md%20Abu_Nyeem_Thesis.pdf.
Full textkalle, Sushma. "Semantic-aware Stealthy Control Logic Infection Attack." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2512.
Full textGauravaram, Praveen Srinivasa. "Cryptographic hash functions : cryptanalysis, design and applications." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16372/.
Full textGauravaram, Praveen. "Cryptographic hash functions : cryptanalysis, design and applications." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16372/1/Praveen_Gauravaram_Thesis.pdf.
Full textHatoum, Makram. "Digital watermarking for PDF documents and images : security, robustness and AI-based attack." Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCD016.
Full textBartone, Christopher A. "News Media Narrative and the Iraq War, 2001-2003: How the Classical Hollywood Narrative Style Dictates Storytelling Techniques in Mainstream Digital News Media and Challenges Traditional Ethics in Journalism." Ohio : Ohio University, 2006. http://www.ohiolink.edu/etd/view.cgi?ohiou1149531650.
Full textJosyula, Sai Prashanth. "On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10820.
Full textHassoune, Ilham. "Design and optimization of digital circuits for low power and security applications." Université catholique de Louvain, 2006. http://edoc.bib.ucl.ac.be:81/ETD-db/collection/available/BelnUcetd-06292006-113241/.
Full textYieh, Pierson. "Vehicle Pseudonym Association Attack Model." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1840.
Full textAnto, Morais Faustina J. "Implementation of Cache Attack on Real Information Centric Networking System." UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/834.
Full textHoneker, Kenneth S. "An analysis of using intelligent digital data to reduce the spare and repair parts inventory for the New Attack Submarine (NSSN)." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341330.
Full textPinto, Allan da Silva 1984. "A countermeasure method for video-based face spoofing attacks : Detecção de tentativas de ataque com vídeos digitais em sistemas de biometria de face." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275616.
Full textTrabelsi, Anis. "Robustesse aux attaques en authentification digitale par apprentissage profond." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS580.
Full textZhuk, Alesia. "Does international human rights law impose constraints on digital manipulation or other cyberwarfare ruses? Analysis of the stuxnet worm attack on iranian nuclear facilities." Tesis, Universidad de Chile, 2017. http://repositorio.uchile.cl/handle/2250/170163.
Full textInam, ul Haq Muhammad. "The major security challenges to cloud computing." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17235.
Full textBaumann, Judith Marie. "Fabricated Histories (or My American Daydreams)." VCU Scholars Compass, 2005. http://scholarscompass.vcu.edu/etd_retro/144.
Full textGinman, Johan. "En modell för utformandet av biografiska ordböcker." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20165.
Full textFalade, Joannes Chiderlos. "Identification rapide d'empreintes digitales, robuste à la dissimulation d'identité." Thesis, Normandie, 2020. http://www.theses.fr/2020NORMC231.
Full textGaber, Tarek. "Support consumers' rights in DRM : a secure and fair solution to digital license reselling over the Internet." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/support-consumers-rights-in-drm-a-secure-and-fair-solution-to-digital-license-reselling-over-the-internet(6b653587-36d3-4074-8578-5eaacdb68004).html.
Full textVibert, Benoît. "Contributions à l'évaluation de systèmes biométriques embarqués." Thesis, Normandie, 2017. http://www.theses.fr/2017NORMC208/document.
Full textRehman, Abdul. "Practical watermarking for multimedia traitor tracing." Electronic Thesis or Diss., Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2024. http://www.theses.fr/2024IMTA0450.
Full textFaria, Gerson de Souza. "Novos ataques de canal secundário a dispositivos de entrada manual de dados confidenciais." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-22032017-080657/.
Full textHitchcock, Yvonne Roslyn. "Elliptic curve cryptography for lightweight applications." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15838/1/Yvonne_Hitchcock_Thesis.pdf.
Full textHitchcock, Yvonne Roslyn. "Elliptic Curve Cryptography for Lightweight Applications." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15838/.
Full textChen, Yu-Wei, and 陳昱維. "Mesh-Based Robust Digital Watermarking Technique Against Geometric Attacks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/75261036738464883554.
Full text"On forging ElGamal signature and other attacks." 2000. http://library.cuhk.edu.hk/record=b5890386.
Full textLAI, CHUN-WEI, and 賴郡緯. "Automatic web-log filtering mechanism for digital forensics of web attacks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/87100007419308086704.
Full textshailaja, koritala, and 夏拉喬. "A Study on full Correlation of Digital Watermarks Under Different Image Attacks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/29354227888064522388.
Full textLin, Liang-Ting, and 林亮廷. "A Robust Digital Image Watermarking Method against Intentional Attacks and JPEG Compression." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/91045613490216857914.
Full textGüven, Volkan. "Patterns of malware and digital attacks : A guideline for the security enthusiast." Thesis, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16313.
Full textLi, Jingrui. "Protecting Controllers against Denial-of-Service Attacks in Software-Defined Networks." 2016. https://scholarworks.umass.edu/masters_theses_2/428.
Full textWang, Nai-Chun, and 王迺君. "On the Design of Digital Color Watermark with Capability of Resisting Noise and Filtering Attacks." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/30239724916990401996.
Full text