Dissertations / Theses on the topic 'Research security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Research security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Forman, Peter James. "Securing natural gas : entity-attentive security research." Thesis, Durham University, 2017. http://etheses.dur.ac.uk/12139/.
Full textBruner, William W. "National Security Implications of Inexpensive Space Access." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/brunerww.htm.
Full textMartonosi, Susan Elizabeth. "An Operations Research approach to aviation security." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33671.
Full textWenhua, Qi, Zhang Qishan, and Liu Hailong. "RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606688.
Full textDaehnick, Christian C. "Blueprints For The Future Comparing National Security Space Architectures /." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/daehnicc.htm.
Full textSeidel, Scott B. "Planning combat outposts to maximize population security." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/61195.
Full textYoung, Jason Osgood Ewen. "Novel Materials for Use in Homeland Security Research." TopSCHOLAR®, 2013. http://digitalcommons.wku.edu/theses/1241.
Full textAshenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.
Full textWai, Hor Cheong. "Research in computer forensics." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FHor.pdf.
Full textMiko, Katharina, and Elisabeth Mayr. "Trading Places: Power Distributions in participatory research projects as exemplified by security research." WU Vienna University of Economics and Business, 2015. http://epub.wu.ac.at/4727/1/MikoMayr2015.pdf.
Full textHao, Zijiang. "Research on Efficiency and Security for Emerging Distributed Applications." W&M ScholarWorks, 2019. https://scholarworks.wm.edu/etd/1563899040.
Full textMutigwe, C., and F. Aghdasi. "Research trends in RFID technology." Interim : Interdisciplinary Journal, Vol 6, Issue 1: Central University of Technology Free State Bloemfontein, 2007. http://hdl.handle.net/11462/401.
Full textZhang, Lei. "Research on security and privacy in vehicular ad hoc networks." Doctoral thesis, Universitat Rovira i Virgili, 2010. http://hdl.handle.net/10803/8488.
Full textBirkeland, S. N. "E-Banking security and organisational changes : an action research study." Thesis, University of Liverpool, 2015. http://livrepository.liverpool.ac.uk/3001088/.
Full textMartin, Brad. "U.S. EPA NATIONAL HOMELAND SECURITY RESEARCH CENTER: AN INTERNSHIP REPORT." Miami University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=miami1163622231.
Full textCalafato, Trevor. "Security knowledge and terrorism research : filling the gaps with Lombroso." Thesis, University of Sheffield, 2013. http://etheses.whiterose.ac.uk/5349/.
Full textWANG, CHIH-CHUANG, and 汪之莊. "Strengthening Our Airport Security Research." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/31330092301333313961.
Full textWang, ming-yi, and 王明懿. "Research of China security market." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/65661311763277607726.
Full textLi, De-Jia, and 李得嘉. "Research on Security Analysts’ Herding Behavior." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/22667169415974322555.
Full textDe, Ko Jian, and 柯建德. "Research for cloud computing security architecture." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/30434930514554880775.
Full textTsai, Ching-Yao, and 蔡慶耀. "A Research on Vietnam's Food Security." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/21806479424790938363.
Full textLan, Su-Yi, and 藍書翊. "Centralized management of cloud security research." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/16063451836115078798.
Full textLYU, WEI-TING, and 呂韋廷. "Cloud Network Information Protection and Security Research." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/84tx24.
Full text蔡水田. "Technology Research of Intelligent Self Security Protection." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/3facmk.
Full textChen, Jun-Hong, and 陳俊宏. "The Intellectual Core of Information Security Research." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/83696137536935423769.
Full textYANG, CHEN-MING, and 楊鎮銘. "OTT Video on Demand Web Security Research." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/9t9fya.
Full textYao, Hsueh-chu, and 姚學竹. "THE STABILITY OF DYNAMIC SECURITY RESEARCH MODEL." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/28986531576245437968.
Full textCHOU, TZU-HSIANG, and 周子翔. "Research on Security Verification of Program Coding." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/y747bf.
Full textPan, Shun-Meng, and 潘順盟. "A research on ID-based security protocols." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/7ch34k.
Full textLIN, YEH TSUNG, and 葉宗霖. "Research on WEB Security Program Development Tools." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/h7phuz.
Full text"A research in SQL injection." 2005. http://library.cuhk.edu.hk/record=b5892623.
Full textLiu, Che-Chun, and 劉哲均. "A Research on China’s Petroleum Transportation Security Strategy." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/26912565773614231333.
Full textWang, Yang-Yu, and 王揚宇. "Minimum Living Security System Research in Mainland China." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/09399759203098025567.
Full textTseng, Yu-kuo, and 曾昱國. "The Research of Network Security in IP Traceback." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/66452706975773723274.
Full textChun-Che, Wu, and 吳俊哲. "Strategic marketing research of Taiwan electronics security product." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/49860013149699878711.
Full textYI, LI TZU, and 李慈宜. "A Research on Food Security Policy in Taiwan." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/53432929982660671636.
Full textWang, Kai-Yi, and 王愷儀. "The research of XSS – Security threat of Ajax." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/45089097483989217632.
Full textLin, Chang-Ching, and 林長青. "The Research of China's Oil Diplomacy Security Complex." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/43109633045312719895.
Full textYu, Chi, and 余績. "A Research on the Taiwan National Security Association." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/67319561133961253394.
Full textWu, Ching-fang, and 吳青芳. "Third-party Payment System of Information Security Research." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/89298600875678777852.
Full textKuo, Pao-Hsiu, and 郭寶秀. "The Research to Ensure Real Estate Transaction Security." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/79402080500823139946.
Full textLu, Han-Yu, and 盧翰宇. "Security Marine Training Planning Research in Scuba Diving." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/64288998220907454233.
Full textJiang, Yu-Ling, and 蔣妤羚. "Research on Identity Security of On-Line Game." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/45121016649283880418.
Full textWang, Hsiang-Yu, and 王祥宇. "Research of data security processing in computer systems." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/07793120169359422828.
Full textHSIEH, CHIEH-HSIU, and 謝杰修. "A Research on Protection of HTML5 CORS Security." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/xfn3fe.
Full textChin-Low, Chang, and 張金樓. "Research on Legalization of Building Transaction and Security." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/v4hqnx.
Full textHuang, Wen-Hsin, and 黃文欣. "A Research on Security Mechanisms for Cloud Computing." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/b9b5jn.
Full textKUO, CHENG-CHE, and 郭政哲. "Research on Security Protection Architecture for Enterprise Intranet." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/knzu4e.
Full textLi, Yuan-Fu, and 李元輔. "A research on security analyses of cryptographic protocols." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/rcwytw.
Full textWu, Wei-Na, and 吳維娜. "A research on security analysis of communication protocols." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/rqxe76.
Full text