Dissertations / Theses on the topic 'Insider attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 15 dissertations / theses for your research on the topic 'Insider attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Nsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Full textDoss, Gary. "An Approach to Effectively Identify Insider Attacks within an Organization." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/138.
Full textUsmani, Wali Ahmed. "Not able to resist the urge : social insider attacks on Facebook." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/60294.
Full textAditham, Santosh. "Mitigation of Insider Attacks for Data Security in Distributed Computing Environments." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6639.
Full textJUNG, SANG SHIN. "Attacking and Securing Beacon-Enabled 802.15.4 Networks." Digital Archive @ GSU, 2011. http://digitalarchive.gsu.edu/cs_theses/74.
Full textKambhampaty, Krishna Kanth. "Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/29914.
Full textRadhouani, Amira. "Méthodes formelles pour l'extraction d'attaques internes des Systèmes d'Information." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM025/document.
Full textKrauß, Christoph. "Handling Insider Attacks in Wireless Sensor Networks." Phd thesis, 2010. https://tuprints.ulb.tu-darmstadt.de/2158/1/Dissertation_ckrauss.pdf.
Full textChen, Chien-Hung, and 陳建宏. "Using Subliminal Channel Mechanism to Defend Against the Insider Attacks." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/52904837083392712115.
Full textKrauß, Christoph [Verfasser]. "Handling insider attacks in wireless sensor networks / vorgelegt von Christoph Krauß." 2010. http://d-nb.info/1003545335/34.
Full text"Identification of Compromised Nodes in Collaborative Intrusion Detection Systems for Large Scale Networks Due to Insider Attacks." Master's thesis, 2020. http://hdl.handle.net/2286/R.I.57365.
Full textWang, Peter Shaojui, and 王紹睿. "Design of a Privacy-Preserving Data Mining System Based on Differential Privacy Using Additive-Homomorphic Proxy Re-Encryption Protocol Against Insider Attacks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/63639699902141668295.
Full text"A Model for Calculating Damage Potential in Computer Systems." Master's thesis, 2019. http://hdl.handle.net/2286/R.I.53889.
Full text(9034049), Miguel Villarreal-Vasquez. "Anomaly Detection and Security Deep Learning Methods Under Adversarial Situation." Thesis, 2020.
Find full textWong, Angela S. L. "Multimedia transaction tracking from a mutual distrust perspective." 2007. http://hdl.handle.net/2440/49549.
Full text