Dissertations / Theses on the topic 'Malicious traffic'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 16 dissertations / theses for your research on the topic 'Malicious traffic.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Jin, Zhihua. "Visualization of Network Traffic to Detect Malicious Network Activity." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8951.
Full textNichols, Tony. "MalWebID_Autodetection and Identification of Malicious Web Hosts Through Live Traffic Analysis." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32875.
Full textSandford, Peter. "Inferring malicious network events in commercial ISP networks using traffic summarisation." Thesis, Loughborough University, 2012. https://dspace.lboro.ac.uk/2134/9580.
Full textKälkäinen, J. (Juha). "Collection and analysis of malicious SSH traffic in Oulu University network." Bachelor's thesis, University of Oulu, 2018. http://urn.fi/URN:NBN:fi:oulu-201812053224.
Full textWulff, Tobias. "Evaluation of and Mitigation against Malicious Traffic in SIP-based VoIP Applications in a Broadband Internet Environment." Thesis, University of Canterbury. Computer Science and Software Engineering, 2010. http://hdl.handle.net/10092/5120.
Full textТокмань, І. О. "Інформаційна інтелектуальна технологія детектування шкідливого трафіку в мережах інтернету речей". Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72290.
Full textFAVALE, THOMAS. "Strengthening Privacy and Cybersecurity through Anonymization and Big Data." Doctoral thesis, Politecnico di Torino, 2023. https://hdl.handle.net/11583/2975701.
Full textAlberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Thesis, Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008/document.
Full textAlberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Electronic Thesis or Diss., Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008.
Full textLakhdari, Nour-Eddine. "FINGERPRINTING MALICIOUS IP TRAFFIC." Thesis, 2014. http://spectrum.library.concordia.ca/978357/1/Lakhdari_MASc_S2014.pdf.
Full textWu, Tsung-Ju, and 吳宗儒. "Detecting Hiding Malicious Website Using Network Traffic Mining Approach." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/76040403229994551567.
Full textChi-JuiPan and 潘祈睿. "Simplifying Malicious Traffic Classification based on Hybrid Feature Selection." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/7d4gfe.
Full textDing-KaiTseng and 曾鼎凱. "A NetFlow Based Malicious Traffic Detection Research using XGBoost." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/n46zxx.
Full textLiu, Chun-rui, and 劉醇瑞. "A Study of Containment Malicious Traffic Flows with Behavioral Probing Method." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/40797238403351250470.
Full textHUANG, CHIEN-WEI, and 黃建維. "Detecting IoT Malicious Traffic using Unsupervised Autoencoder with Convolutional Neural Network." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/y55bw6.
Full textMfusi, Boikhutso Florencia. "The policing of road rage incidents in the Gauteng Province." Diss., 2015. http://hdl.handle.net/10500/20281.
Full text