Dissertations / Theses on the topic 'Network Threats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Network Threats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Biswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.
Full textBerthier, Robin G. "Advanced honeypot architecture for network threats quantification." College Park, Md. : University of Maryland, 2009. http://hdl.handle.net/1903/9204.
Full textStojanov, Martin. "eHealth and IT in Network Healthcare : Threats and Opportunities." Thesis, Uppsala universitet, Avdelningen för visuell information och interaktion, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-262195.
Full textDenison, Stephen. "The accessibility of insider threats on a corporate network." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1604807.
Full textLysenko, Julia Vladimirovna, and Юлія Володимирівна Лисенко. "5G-technology: social advantaged and threats." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51667.
Full textLindqvist, Anna. "Threats to smart buildings : Securing devices in a SCADA network." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176723.
Full textEkwall, Daniel. "Managing the risk for antagonistic threats against the transport network." Doctoral thesis, Göteborg : Borås : Division of Logistics and Transportation, Chalmers University of Technology ; School of Engineering, University of Borås, 2009. http://hdl.handle.net/2320/5033.
Full textAhmad, Nadeem, and M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.
Full textShen, Dakun. "Malicious Manipulation in Service-Oriented Network, Software, and Mobile Systems: Threats and Defenses." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7938.
Full textClementson, Christian. "Client-side threats and a honeyclient-based defense mechanism, Honeyscout." Thesis, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-20104.
Full textKührer, Marc [Verfasser], Thorsten [Akademischer Betreuer] Holz, and Konrad [Akademischer Betreuer] Rieck. "Large-scale analysis of network-based threats and potential countermeasures / Marc Kührer. Gutachter: Thorsten Holz ; Konrad Rieck." Bochum : Ruhr-Universität Bochum, 2016. http://d-nb.info/108124674X/34.
Full textLiuxinwei, Ma. "Wi-Fi network security : Gender differences in China." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-8691.
Full textRajamanikkam, Chidhambaranathan. "Understanding Security Threats of Emerging Computing Architectures and Mitigating Performance Bottlenecks of On-Chip Interconnects in Manycore NTC System." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7453.
Full textSiddiqui, Md Rezaul Karim, and Sayed Mohammad Atiqur Rahman. "Security analysis of the WiMAX technology in Wireless Mesh networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3039.
Full textMunir, Rashid. "A Quantitative Security Assessment of Modern Cyber Attacks. A Framework for Quantifying Enterprise Security Risk Level Through System's Vulnerability Analysis by Detecting Known and Unknown Threats." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/14251.
Full textHlavatý, Ivo. "Ochrana datové sítě s využitím NetFlow dat." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237051.
Full textBergvall, Ricardo. "Secure remote access to a work environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45124.
Full textIkhalia, Ehinome. "A malware threat avoidance model for online social network users." Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/16039.
Full textJones, Andrew. "Threats to information systems and effective countermeasures." Thesis, University of South Wales, 2004. https://pure.southwales.ac.uk/en/studentthesis/threats-to-information-systems-and-effective-countermeasures(2ffda7b3-38d8-48a3-90da-386ee85f10bf).html.
Full textKim, Dae Wook. "Data-Driven Network-Centric Threat Assessment." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814.
Full textFrauenstein, Edwin Donald. "A framework to mitigate phishing threats." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021208.
Full textMukantabana, Beatrice. "Ethernet sniffing : a big threat to network security." Virtual Press, 1994. http://liblink.bsu.edu/uhtbin/catkey/897495.
Full textHerbert, Alan. "Bolvedere: a scalable network flow threat analysis system." Thesis, Rhodes University, 2019. http://hdl.handle.net/10962/71557.
Full textPappaterra, Mauro José. "Implementing Bayesian Networks for online threat detection." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-86238.
Full textZhang, Ge. "Unwanted Traffic and Information Disclosure in VoIP Networks : Threats and Countermeasures." Doctoral thesis, Karlstads universitet, Avdelningen för datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-13408.
Full textCollins, Helen Loretta. "An Exploration of Wireless Networking and the Management of Associated Security Risk." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1843.
Full textBoraten, Travis Henry. "Hardware Security Threat and Mitigation Techniques for Network-on-Chips." Ohio University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1596031630118173.
Full textSyed, Romilla. "DYNAMICS OF IDENTITY THREATS IN ONLINE SOCIAL NETWORKS: MODELLING INDIVIDUAL AND ORGANIZATIONAL PERSPECTIVES." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3906.
Full textFranzén, Nicklas. "Network Sockets, Threading or select for multiple concurrent connections." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5501.
Full textEames, Adam McLendon. "Enabling path planning and threat avoidance with wireless sensor networks." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33277.
Full textJavaid, Ahmad Yazdan. "Cyber Security Threat Analysis and Attack Simulation for Unmanned Aerial Vehicle Network." University of Toledo / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1438816219.
Full textWatkins, Trevor U. "Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1244659206.
Full textFragkos, Grigorios. "Near real-time threat assessment using intrusion detection system's data." Thesis, University of South Wales, 2011. https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html.
Full textZeng, Kexiong. "Threat and Application of Frequency-Agile Radio Systems." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/89059.
Full textvon, Essen Rickard. "Threat Analysis of Video on Demand Services in Next Generation Networks." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-63082.
Full textSkobalj, Nedo. "Validating vehicleLang for Domain-specific Threat Modelling of In-vehicle Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-249601.
Full textBonnevier, Jani, and Sebastian Heimlén. "The Role of Firewalls in Network Security : A Prestudy for Firewall Threat Modeling." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232067.
Full textSmith, Matthew N. "Developing a reliable methodology for assessing the computer network operations threat of Iran." Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/2065.
Full textLan, Dapeng. "Experimental Study of Thread Mesh Network for Wireless Building Automation Systems." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194440.
Full textSchmidt, Mark Bradley. "Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks." Diss., Mississippi State : Mississippi State University, 2006. http://library.msstate.edu/etd/show.asp?etd=etd-04122006-130558.
Full textAlm, Anton. "Internet of Things mesh network : Using the Thread networking protocol." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.
Full textBrown, Christopher. "Developing a reliable methodology for assessing the computer network operations threat of North Korea." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sept%5FBrown.pdf.
Full textBowman, Harry Albert. "Optimizing Transportation Infrastructure Improvements For Networks Under The Threat of Natural Hazards /." The Ohio State University, 1995. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487929745332846.
Full textFleming, Todd B. "Improving the Performance of the world Wide Web over Wireless Networks." Thesis, Virginia Tech, 1996. http://hdl.handle.net/10919/33087.
Full textCannon, Jennifer Elizabeth. "Strategies for Improving Data Protection to Reduce Data Loss from Cyberattacks." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7277.
Full textNadji, Yacin Ibrahim. "Understanding DNS-based criminal infrastructure for informing takedowns." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54335.
Full textSieklik, Ivan. "Thread Smart Home Model." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316420.
Full textJackson, David S. "Rogue Signal Threat on Trust-based Cooperative Spectrum Sensing in Cognitive Radio Networks." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3925.
Full textGan, Ge. "CDP a multithreaded implementation of a network communication protocol on the Cyclops-64 multithreaded architecture /." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 58 p, 2007. http://proquest.umi.com/pqdweb?did=1253511001&sid=1&Fmt=2&clientId=8331&RQT=309&VName=PQD.
Full textEngvall, Christoffer. "Security in Wireless Sensor Networks for Open Controller." Thesis, Linköpings universitet, Databas och informationsteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-91089.
Full text