Dissertations / Theses on the topic 'Login'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Login.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Louw, Lloyd A. B. "Automated face detection and recognition for a login system." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/438.
Full textBurch, Zachary Campbell. "Credential Theft Powered Unauthorized Login Detection through Spatial Augmentation." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/85583.
Full textMaster of Science
For a computer network, a common mode of access is a login; the entering of a valid username and password for authentication. Attackers use a variety of methods to steal user login credentials and several of these approaches are unnoticeable by network defenders. Providing further complications, a higher educational campus network, such as Virginia Tech, inherently has less information about the state of the network, since students and teachers bring their privately owned devices. To prevent this attack method, we determine the class, authorized or unauthorized, of login events using data that can be consistently provided by a campus network. After classification, alerts are generated for security analysts, helping to further defend the network. Spatial augmentation is a process we introduce to allow login classification with machine learning algorithms. For every login event at the campus, a history of user locations and source event locations can be provided, using data collected from the campus network infrastructure. Location data provides stronger classification of login events, since studies show attackers inherently have a physical distance between the normal user of an account when performing an unauthorized login. For evaluation, we build a system to augment and classify login events, while limiting the number of false alerts to a useable level.
Almaula, Varun Kartik. "Protecting the login session from camera based shoulder surfing attacks." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2008. http://wwwlib.umi.com/cr/ucsd/fullcit?p1453664.
Full textTitle from first page of PDF file (viewed July 28, 2008). Available via ProQuest Digital Dissertations. Includes bibliographical references (p. 73-77).
Brown, Bryan T. "Ecology of riparian breeding birds along the Colorado River in Grand Canyon, Arizona." Diss., The University of Arizona, 1987. http://ezproxy.library.arizona.edu/login?url=.
Full textWilkosz, Mary Elizabeth. "River and wetland conservation and preservation issues in Arizona : a study of agenda building." Thesis, The University of Arizona, 1989. http://ezproxy.library.arizona.edu/login?url=.
Full textRisley, John. "Predicting runoff and salinity intrusion using stochastic precipitation inputs." Diss., The University of Arizona, 1989. http://ezproxy.library.arizona.edu/login?url=.
Full textGottfried, Gerald J. "Effects of patch clearcutting on water yield improvement and on timber production in an Arizona mixed conifer watershed." Diss., The University of Arizona, 1989. http://ezproxy.library.arizona.edu/login?url=.
Full textMinor, Charlotta Thorne. "Predicting outdoor water conservation potential for single family residences in the High School Wash Watershed, Tucson, Arizona." Thesis, The University of Arizona, 1990. http://ezproxy.library.arizona.edu/login?url=.
Full textWarren, Daniel Cram. "Transpiration and conductance responses of salt-desert vegetaion in the Owens Valley of California in relation to climate and soil moisture." Diss., The University of Arizona, 1991. http://ezproxy.library.arizona.edu/login?url=.
Full textDidan, Kamel. "Prototype geographic information system for agricultural water quality management." Diss., The University of Arizona, 1999. http://ezproxy.library.arizona.edu/login?url=.
Full textQuinn, Melanie Lane. "Autoethnography : my journey from educator to educator-activist /." Connect to dissertation online, 2008. http://watzekpx.lclark.edu/login?url=.
Full textHerbig, Christopher Fred. "Use of OpenSSH support for remote login to a multilevel secure system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FHerbig.pdf.
Full textThesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 201-202). Also available online.
Hedmark, Alice. "Undersökning av webbsidors säkerhet vid användning avFacebook Login : Vidareutveckling och analys av OAuthGuard." Thesis, Mittuniversitetet, Institutionen för data- och systemvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36859.
Full textSingle Sign-On (SSO) is an authentication process that allows a developer to delegate the authentication responsibility to a dedicated service. OAuth 2.0 is an authorization framework that often serves as a base for authentication layers to be built upon that in turn allows for SSO. An identity provider is the service that is responsible for handling user credentials and the authentication, two common identity providers are Google and Facebook that implement SSO with the authentication layers OpenID Connect respectively Facebooks own authentication layer. It has been shown that many clients using OAuth 2.0 as base for SSO make faulty implementations leading to security issues, a number of studies has proposed solutions to these issues but faulty implementations are continually being made. To create various tools to promote security in these contexts is a method where OAuthGuard has been developed with the vision to also directly protect the common website user directly from the browser. OAuthGuard has been used in an earlier study to analyze the security of clients using Google SSO and discovered that 50% of the analyzed clients had flaws, no comparable study has been done for clients using Facebook SSO, which is the second largest third party log in variant. This study made a comparable investigation for Facebook SSO clients with a further developed version of OAuthGuard and found that these clients suffer from flaws with a similar trend as the previous study with Google-SSO clients, although fewer Facebook-SSO clients suffer from these flaws. When further developing OAuthGuard a dumber of difficulties was discovered and the future of these kind of tools needs to be investigated. Further analysis needs to be done to assess if Facebook-SSO should be recommended over Google-SSO from a security perspective and also further exploration of new methods to promote security needs to be done.
Warren, Amy M. "An investigation of mandatory retirement : a qualitative and quantitative examination /." Halifax, N.S. : Saint Mary's University, 2009. http://library.smu.ca:2048/login?url=.
Full textMcLaren, Patricia Genose Kelloway E. Kevin. "The manager is not the boss : an investigation into managing professionals from both within and without the profession /." Halifax, N.S. : Saint Mary's University, 2009. http://library.smu.ca:2048/login?url=.
Full textDurepos, Gabrielle A. T. Mills Albert J. "ANTi-History : toward an historiographical approach to (re)assembling knowledge of the past /." Halifax, N.S. : Saint Mary's University, 2009. http://library.smu.ca:2048/login?url=.
Full textMacMillan, Scott. "Towards an existential approach to the meaning of work /." Halifax, N.S. : Saint Mary's University, 2009. http://library.smu.ca:2048/login?url=.
Full textCannon, Michael. "The importance of apologizing for organizational transgressions : lessons from the 2008 Maple Leaf meat recall /." Halifax, N.S. : Saint Mary's University, 2009. http://library.smu.ca:2048/login?url=.
Full textCarleton, Erica Leigh. "Happiness at work : using positive psychology interventions to increase worker well-being /." Halifax, N.S. : Saint Mary's University, 2009. http://library.smu.ca:2048/login?url=.
Full textRunning head: Interventions to increase worker happiness. Includes abstract and appendices. Supervisor: Kevin Kelloway. Includes bibliographical references (leaves 46-55).
Knight, Edith C. "A multi-foci integration of justice, commitment, and positive affective well-being /." Halifax, N.S. : Saint Mary's University, 2009. http://library.smu.ca:2048/login?url=.
Full textFernández, Duque David. "Results in dynamic topological logic /." May be available electronically:, 2008. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textBaud, Jean-Marc. "Esthétiques et posture du collectif Inculte (2004-2015) : faire groupe après le siècle des avant-gardes." Thesis, Lyon, 2020. http://acces.bibliotheque-diderot.fr/login/theses/2020LYSEN044.
Full textOften described as a moment of decline of literary groups, contemporaryliterature is actually a testimony of the swing away from the avant-garde model to acollective form. In order to understand this movement, this thesis will focus on themain mode of expression in contemporary literature: the Inculte collective. Thelatter - comprising a dozen writers, translators, editors and philosophers - first cametogether in 2004, around the literary journal Inculte, before becoming a collectiveand leading to the founding of a publishing house. The journal’s twenty issues, aswell as the collective publications that followed on from it (Devenirs du roman, EnProcès, Une chic fille...) helped to promote the notoriety of it’s authors – soo nbaptised « the Inculte Generation » - after the consecration of some of them (M. de Kerangal, M. Énard...). Our research on this collective centers around the conceptof the collective posture. It constitues a first attempt at conceptualisation and experimentation, in line with the work of Jérôme Meizoz. A literary group is themeeting point par excellence for behavior and talks, habits, sociabilities and texts.It lends itself particularly well to a postural analysis since it involves rhetorical andaction-oriented dimensions. This thesis aims at studying the Inculte’s collectiveposition, its various places of construction (journal, collective works, press articles,social networks, festival or library events...), its legacy and its break with the tradition of literary groups as well as its convergence with and divergence from the authors' individual positions
La, Motte-Messemé François Le Poulchre de Lourde Brigitte. "Le Passe-temps." Paris : Classiques Garnier Numérique : Champion Electronique, 2009. http://www.classiques-garnier.com/numerique-bases/index.php?module=Login&action=Login&sid=2b9676436f42782c2fd24a02ca76e517.
Full textISBN de l'édition imprimée : 978-2-7453-1491-8. Texte en moyen français, commentaires en français. Titre provenant de la page de titre. Bibliogr. Notes bibliogr. Glossaire. Index.
Bruni, Leonardo Bernard-Pradelle Laurence. "Histoire, éloquence et poésie à Florence au début du Quattrocento." Paris : Classiques Garnier Numérique : Champion Electronique, 2009. http://www.classiques-garnier.com/numerique-bases/index.php?module=Login&action=Login&sid=2b9676436f42782c2fd24a02ca76e517.
Full textISBN de l'édition imprimée : 978-2-7453-1485-7. Édition du texte latin ou italien et traduction française en regard. Titre provenant de la page de titre. Bibliogr. Notes bibliogr. Index.
Girard, Patrick. "Modal logic for belief and preference change /." May be available electronically:, 2008. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textPethe, Abhijit. "Ge-based transistors for high-performance logic applications /." May be available electronically:, 2007. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textChanda, Manjeera. "A low-cost system for acquiring login/logout data for on-ground racks of in-flight entertainment systems." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10141519.
Full textComputer users logging in and out of their systems run the risk of access malfunctions and security threats. The motivation for the current project is the need to obtain and store login/logout information for on-ground racks of In-flight Entertainment (IFE) Systems in a secure and effective way.
The current project presents the development of a low-cost system with a dedicated function, which authenticates a user for login privileges, acquires, and stores login/logout information separately from the user's main computer such as a desktop, laptop or the IFE system racks. The proposed system is implemented on a simple Raspberry Pi platform, working as an embedded system. The system automatically identifies login or logout time, user name, and status for a particular account and, at the same time, it sends a notification to the main server and stores that information for future reference. The effectiveness of the developed system is demonstrated experimentally.
Narayana, Chaithanya Kumar. "Awareness and trust of web users on information sharing in social logins." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-99038.
Full textOrnelas, Gilbert. "Set-valued extensions of fuzzy logic classification theorems /." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2007. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textFors, Mikael. "Elementary Discrete Sets in Martin-Löf Type Theory." Thesis, Uppsala universitet, Algebra och geometri, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-175717.
Full textWiklund, Tilo. "Locally cartesian closed categories, coalgebras, and containers." Thesis, Uppsala universitet, Algebra och geometri, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-197556.
Full textGrunewald, Dietmar. "Account-Bereitstellung per Selbstbedienung." Universitätsbibliothek Chemnitz, 2002. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200200571.
Full textMahmoud, Abdallah Abdel-Rahman Hassan. "Identification of human gait using genetic algorithms tuned fuzzy logic." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textWoo, Raymond. "Band-to-band tunneling transistor scaling and design for low-power logic applications /." May be available electronically:, 2009. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textMedapalli, Kameswara Rao. "Design, analysis and optimization of CSMA/CA based wireless networks /." May be available electronically:, 2006. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textClark, Brian C. "Adaptations in human neuromuscular function following prolonged unweighting Neurological and skeletal muscle properties and countermeasure efficacy /." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full textHanson, Craig A. "Addiction Rationality and responsibility /." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full textClark, Judith F. "A Deleuzian feminism Philosophy, theology and ethics /." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full textGunduz, Gurhan. "A framework for network monitoring and performance based routing in distributed middleware systems." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full textAhmad, Sadaf. "Al-Huda the story of "Islamic" revivalism amongst urban Pakistani women /." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full textNing, Wei. "A new approach to test for interactions in two-way ANOVA models." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full textChen, Shang-chih. "Between negotiation and confrontation understanding China's Taiwan policy redirections in the 1990s /." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full textBaca, Damian. "Border insurrections How IndoHispano rhetorics revise dominant narratives of assimilation /." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full textBreitbach, Carrie. "Changing landscapes of social reproduction in South Dakota restructuring the cattle beef industry /." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full textButts, Jonathan J. "Community and social justice in New Deal-era urban literature." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full textVeeder, Stacy B. "Confidentiality expectations and willingness to disclose personal information to a health-care provider." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full textGogus, Nihat Gokhan. "Continuity of plurisubharmonic envelopes." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full textMurphy, William B. "Direct election of United States senators and the transformation of American politics." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full textCheng, Qi. "Distributed fault detection for dynamic systems." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full textMcGee, Christopher J. "DNA helix imperfections Structure and flexibility /." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.
Full text