Dissertations / Theses on the topic 'Malicious attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Malicious attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Opie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.
Full textAbu-Bakar, Kamalrulnizam. "Protecting agents against malicious host attacks." Thesis, Aston University, 2004. http://publications.aston.ac.uk/10612/.
Full textFischer, Benjamin. "Vehicular Group Membership Resilient to Malicious Attacks." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086.
Full textCasile, Roberta <1986>. "GNSS interference management techniques against malicious attacks." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7025/1/Casile_Roberta_tesi.pdf.
Full textCasile, Roberta <1986>. "GNSS interference management techniques against malicious attacks." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7025/.
Full textSivakumaran, Arun. "Malicious user attacks in decentralised cognitive radio networks." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/79657.
Full textMahlburg, Karl. "Structure Attacks in Cryptographic Protocols." Scholarship @ Claremont, 2001. https://scholarship.claremont.edu/hmc_theses/130.
Full textNarasimhan, Mayur Harn Lein. "Protecting a mobile agent from colluded truncation attacks by malicious hosts." Diss., UMK access, 2007.
Find full textJolley, Jason. "Attribution, state responsibility, and the duty to prevent malicious cyber-attacks in international law." Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8452/.
Full textLikarish, Peter F. "Early detection of malicious web content with applied machine learning." Diss., University of Iowa, 2011. https://ir.uiowa.edu/etd/4871.
Full textSrivastava, Abhinav. "Robust and secure monitoring and attribution of malicious behaviors." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41161.
Full textKambhampaty, Krishna Kanth. "Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/29914.
Full textKhraisat, Ansam. "Intelligent zero-day intrusion detection framework for internet of things." Thesis, Federation University Australia, 2020. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/179729.
Full textAlberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Thesis, Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008/document.
Full textAlberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Electronic Thesis or Diss., Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008.
Full textLeithead, Travis S. "Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd1007.pdf.
Full textCanali, Davide. "Plusieurs axes d'analyse de sites web compromis et malicieux." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0009/document.
Full textCanali, Davide. "Plusieurs axes d'analyse de sites web compromis et malicieux." Electronic Thesis or Diss., Paris, ENST, 2014. http://www.theses.fr/2014ENST0009.
Full textAndersson, Stig. "Detecting and characterising malicious executable payloads." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/30325/1/Stig_Andersson_Thesis.pdf.
Full textAndersson, Stig. "Detecting and characterising malicious executable payloads." Queensland University of Technology, 2009. http://eprints.qut.edu.au/30325/.
Full textPrathapani, Anoosha. "Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348.
Full textYu, Yue. "Resilience Strategies for Network Challenge Detection, Identification and Remediation." Thesis, The University of Sydney, 2013. http://hdl.handle.net/2123/10277.
Full textSung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.
Full textLanger, André, and Tom Kühnert. "Security issues in Address Autoconfiguration Protocols." Universitätsbibliothek Chemnitz, 2007. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200700491.
Full textFAVALE, THOMAS. "Strengthening Privacy and Cybersecurity through Anonymization and Big Data." Doctoral thesis, Politecnico di Torino, 2023. https://hdl.handle.net/11583/2975701.
Full textKALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.
Full textChang, Chung-Cheng, and 張仲丞. "Withstanding Malicious RREQ Packets Flooding Attacks in MANET." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/06901169012462375417.
Full textChien-Hung, Chen. "Maximization of Network Survivability against Intelligent and Malicious Attacks." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-1707200615234200.
Full textTsai, Jen-Sheng, and 蔡仁勝. "Feature-Based Multipurpose Image Watermarking Resistant against Malicious Attacks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/33484253343750229545.
Full textChen, Chien-Hung, and 陳建宏. "Maximization of Network Survivability against Intelligent and Malicious Attacks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/00281366107324361645.
Full textRamasamy, Harigovind Venkatraj. "Parsimonious service replication for tolerating malicious attacks in asynchronous environments /." 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3223699.
Full textChen, Chun-Wei, and 陳俊維. "Maximization of Network Survival Time upon Intelligent and Malicious Attacks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/54993919407182351736.
Full textChen, Chun-Wei. "Maximization of Network Survival Time upon Intelligent and Malicious Attacks." 2007. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2507200700194900.
Full textLin, Cheng-Hsu, and 林承旭. "Populating Malicious Flow Entries Against SDN Operations: Attacks and Countermeasures." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/ss887w.
Full textLin, hsin-hung, and 林信宏. "A Robust Gray-level Image Watermarking Scheme Against Malicious/Unwitting Attacks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/39953727486820295707.
Full textPan, Jia-ling, and 潘佳伶. "Effective Network Planning and Defending Strategies to Minimize Attackers’ Success Probabilities under Malicious and Epidemic Attacks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/66477210972395804144.
Full textLee, Yu-Hsuan, and 李昱璇. "Droidivision : Vulnerability Analysis of Multiple Layer Collusion Attacks Using Malicious Intent Simulation." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/r5w7jw.
Full textShen, Chi-En, and 沈祈恩. "A Flexible Framework for Malicious Open XML Document Detection against APT Attacks." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/55150067458488796714.
Full textChang, Yao-Yuan, and 張耀元. "Network Defense and Recovery Strategies for Maximization of Network Survivability under Malicious Attacks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/88861509387291225501.
Full text"Hitch-hiking attacks in online social networks and their defense via malicious URL classification." 2012. http://library.cuhk.edu.hk/record=b5549120.
Full textLEE, Yi-Fan, and 李奕汎. "Defense Mechanism Against Malicious and Selective Forwarding Attacks in Large & Mobile Wireless Networks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/q2k9gk.
Full textWu, Yu-Pu, and 吳育溥. "Maximization of Network Survivability through Deception Mechanisms under Malicious Collaborative Attacks in Virtualization Environment." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/91557274591659567133.
Full textLee, Chia-Ling, and 李佳玲. "Effective resource allocation strategies to assure service continuity considering malicious attacks and natural disasters." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/53826400742396768950.
Full textKuo, Chien-Ting, and 郭建廷. "An Effective Priority Queue-based Scheme to Alleviate Malicious Packet Flows from Distributed DoS attacks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/02344370863990907472.
Full textChan, Chi-Hsiang, and 詹棨翔. "Effective Network Planning and Defending Strategies to Minimize Service Compromise Probabilities under Malicious Collaborative Attacks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/55048445757700088710.
Full textJiang, Kun-Dao, and 江坤道. "A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/27717984998726634904.
Full textJiang, Kun-Dao. "A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks." 2007. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-1907200713220500.
Full textChuang, Ho-Yang, and 莊禾暘. "A Study on Exposing Evidences of Malicious Attacks and Features of Malwares Based on Memory Forensics." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/7xq84v.
Full textSayed, Bassam. "Protection against malicious JavaScript using hybrid flow-sensitive information flow monitoring." Thesis, 2015. http://hdl.handle.net/1828/7063.
Full textChen, Quen-Ting, and 陳冠廷. "Recovery and Resource Reallocation Strategies to Maximize Network Survivability for Multi-Stage Defense Resource Allocation under Malicious Attacks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/93188278162261584891.
Full text