Dissertations / Theses on the topic 'Security agents'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Security agents.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Abouzakhar, Nasser Salem. "Intelligent agents-based networks security." Thesis, University of Sheffield, 2005. http://etheses.whiterose.ac.uk/3575/.
Full textShibli, Awais. "Security Infrastructure and Applicationsfor Mobile Agents." Doctoral thesis, KTH, Data- och systemvetenskap, DSV, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-12764.
Full textTekbacak, Fatih Tuğlular Tuğkan. "Developing a security mechanism for software agents/." [s.l.]: [s.n.], 2006. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000526.pdf.
Full textCORDEIRO, JOANNA DE VASCONCELOS. "AGENTS OF TERROR AS AGENTS OF SECURITY: CONTESTING HISTORIES OF THE IRA." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2011. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=18315@1.
Full textFurst, Alexander J. "State Regulation of Private Police and Security Agents." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1245626912.
Full textWEN, XUE. "THREE ESSAYS ON SOCIAL SECURITY WITH MYOPIC AGENTS." Doctoral thesis, Università Cattolica del Sacro Cuore, 2012. http://hdl.handle.net/10280/1469.
Full textWEN, XUE. "THREE ESSAYS ON SOCIAL SECURITY WITH MYOPIC AGENTS." Doctoral thesis, Università Cattolica del Sacro Cuore, 2012. http://hdl.handle.net/10280/1469.
Full textXu, Ke. "Mobile agent security through multi-agent cryptographic protocols." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4473/.
Full textAl-Jaljouli, Raja Computer Science & Engineering Faculty of Engineering UNSW. "A proposed security protocol for data gathering mobile agents." Awarded by:University of New South Wales. School of Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/23999.
Full textSarracco, Fabiano. "Mobile agents security: algorithmic approaches for hostile hosts detection." Doctoral thesis, La Sapienza, 2006. http://hdl.handle.net/11573/917058.
Full textVugarda, Alessandro <1981>. "Mobile agents security: how to capture a powerful intruder." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8245.
Full textYao, Ming. "A security architecture for protecting dynamic components of mobile agents." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15913/1/Ming_Yao_Thesis.pdf.
Full textYao, Ming. "A security architecture for protecting dynamic components of mobile agents." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15913/.
Full textGunupudi, Vandana. "Performance Evaluation of Data Integrity Mechanisms for Mobile Agents." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4366/.
Full textRaghunathan, Subhashini. "A Security Model for Mobile Agents using X.509 Proxy Certificates." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3320/.
Full textAzfar, Abdullah. "Multiple Escrow Agents in VoIP." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10895.
Full textIdrissi, Hind. "Contributions to the security of mobile agent systems." Thesis, La Rochelle, 2016. http://www.theses.fr/2016LAROS022/document.
Full textShibli, Muhammad Awais. "Building Secure Systems using Mobile Agents." Thesis, KTH, Computer and Systems Sciences, DSV, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4622.
Full textLutz, Alison Eve. "Knowledge, perceptions, and behaviors of Florida Extension agents regarding community food security." [Gainesville, Fla.] : University of Florida, 2006. http://purl.fcla.edu/fcla/etd/UFE0015641.
Full textKolli, Manoj Kumar, and Srikanth Reddy Arimanda. "Performance study of security mechanism for mobile agent domain." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4700.
Full textChalamalasetty, Kalyani. "Architecture for IMS Security to Mobile:Focusing on Artificial Immune System and Mobile Agents Integration." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5795.
Full textNg, Chee Wan. "Discrete-event simulation with agents for modeling of dynamic asymmetric threats in maritime security." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FNg.pdf.
Full textHicks, Kathleen H. "Change agents : who leads and why in the execution of US national security policy." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/59793.
Full textMa, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.
Full textSelliah, Sentil. "Mobile agent based attack resistant architecture for distributed intrusion detection system." Morgantown, W. Va. : [West Virginia University Libraries], 2001. http://etd.wvu.edu/templates/showETD.cfm?recnum=2060.
Full textMonteiro, Valter. "How intrusion detection can improve software decoy applications." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FMonteiro.pdf.
Full textKaiser, Edward Leo. "Addressing Automated Adversaries of Network Applications." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/4.
Full textEl, Hariri Mohamad. "Secure Control and Operation of Energy Cyber-Physical Systems Through Intelligent Agents." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3854.
Full textGarrigues, Olivella Carles. "Contributions to mobile agent protection from malicious hosts." Doctoral thesis, Universitat Autònoma de Barcelona, 2008. http://hdl.handle.net/10803/5799.
Full textBernardes, Mauro Cesar. "Avaliação do uso de agentes móveis em segurança computacional." Universidade de São Paulo, 1999. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-04022002-103542/.
Full textGiansiracusa, Michelangelo Antonio. "A secure infrastructural strategy for safe autonomous mobile agents." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16052/1/Michaelangelo_Giansiracusa_Thesis.pdf.
Full textGiansiracusa, Michelangelo Antonio. "A Secure Infrastructural Strategy for Safe Autonomous Mobile Agents." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16052/.
Full textTang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.
Full textСтарцева, Т. М. "Судовий прецедент у механізмі захисту прав людини". Thesis, Українська академія банківської справи Національного банку України, 2006. http://essuir.sumdu.edu.ua/handle/123456789/60865.
Full textScheepers, Julien. "Logiques, formes et enjeux de l'ethnicisation des compétences professionnelles. Les cas comparés des éducateurs dans le travail social et des agents de sécurité privée : les cas comparés des éducateurs dans le travail social et des agents de sécurité privée." Thesis, Nice, 2013. http://www.theses.fr/2013NICE2025.
Full textArroyo, Antonio. "Professionnalisation et développement professionnel : cas des agents de sécurité privée de la branche surveillance humaine en France." Thesis, Normandie, 2017. http://www.theses.fr/2017NORMR088.
Full textHamburger, Heidi. "Southwest Border Patrol Agent Perceptions of Job-Related Threats and Dangers." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5874.
Full textMartínez, Villalba Anna. "Desenvolupament de metodologia analítica per a la determinació de fàrmacs antiparasitaris." Doctoral thesis, Universitat de Barcelona, 2016. http://hdl.handle.net/10803/400865.
Full textSoares, Camila Carla Dantas. "Entre muros, celas e sombras: história oral de mulheres trabalhadoras de uma instituição prisional." Universidade Federal da Paraíba, 2017. http://tede.biblioteca.ufpb.br:8080/handle/tede/9468.
Full textКалетнік, В. В. "Сучасний стан адміністративно-правового забезпечення інформаційної безпеки в Україні: теоретико-правовий аналіз". Thesis, Національний авіаційний університет, 2021. https://er.nau.edu.ua/handle/NAU/53718.
Full textHuin, Leslie. "Sécurité d'accès dans les Systèmes d'Information Coopératifs : modélisation et Implémentation à l'aide d'agents." Thesis, Lyon 3, 2012. http://www.theses.fr/2012LYO30028.
Full textChico, i. Rovira Joaquim. "Estratègies analítiques per a la determinació d’antimicrobians en aliments." Doctoral thesis, Universitat de Barcelona, 2014. http://hdl.handle.net/10803/277258.
Full textLoulou-Aloulou, Monia. "Approche formelle pour la spécification, la vérification et le déploiement des politiques de sécurité dynamiques dans les systèmes à base d’agents mobiles." Thesis, Bordeaux 1, 2010. http://www.theses.fr/2010BOR14088/document.
Full textPIRES, Higo Fellipe Silva. "ABIDS-WSN: UM FRAMEWORK DE DETECÇÃO DE INTRUSÃO EM REDES DE SENSORES SEM FIO ORIENTADO POR AGENTES INTELIGENTES." Universidade Federal do Maranhão, 2017. http://tedebc.ufma.br:8080/jspui/handle/tede/1772.
Full textBorràs, i. Aguadé Sílvia. "Seguretat alimentària en l’alimentació animal. Anàlisi d’agents antimicrobians en pinsos." Doctoral thesis, Universitat de Barcelona, 2014. http://hdl.handle.net/10803/277213.
Full textBugeja, Joseph. "Smart connected homes : concepts, risks, and challenges." Licentiate thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-7793.
Full textLima, Christiane Ferreira Lemos. "AGENTES INTELIGENTES PARA DETECÇÃO DE INTRUSOS EM REDES DE COMPUTADORES." Universidade Federal do Maranhão, 2002. http://tedebc.ufma.br:8080/jspui/handle/tede/316.
Full textTan, Victor Hock Kim. "Interaction tracing for mobile agent security." Thesis, University of Southampton, 2004. https://eprints.soton.ac.uk/259235/.
Full textVelay, Maxime. "Méthodes d’optimisation distribuée pour l’exploitation sécurisée des réseaux électriques interconnectés." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT063/document.
Full textEl, Hachem Jamal. "A Model Driven Method to Design and Analyze Secure System-of-Systems Architectures : Application to Predict Cascading Attacks in Smart Buildings." Thesis, Pau, 2017. http://www.theses.fr/2017PAUU3026/document.
Full text