To see the other types of publications on this topic, follow the link: Security Components.

Dissertations / Theses on the topic 'Security Components'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security Components.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Martinez, Salvador. "Automatic reconstruction and analysis of security policies from deployed security components." Phd thesis, Ecole des Mines de Nantes, 2014. http://tel.archives-ouvertes.fr/tel-01065944.

Full text
Abstract:
Security is a critical concern for any information system. Security properties such as confidentiality, integrity and availability need to be enforced in order to make systems safe. In complex environments, where information systems are composed by a number of heterogeneous subsystems, each subsystem plays a key role in the global system security. For the specific case of access-control, access-control policies may be found in several components (databases, networksand applications) all, supposedly, working together. Nevertheless since most times these policies have been manually implemented a
APA, Harvard, Vancouver, ISO, and other styles
2

Pidhrushnyi, D. O. "Scenario analysis model of economic security components." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/40837.

Full text
Abstract:
Tendencies of recent years have shown that economic security is the most important part of the sustainable development of nations and the world in general. That is why the forefront every state puts improves their economic situation, their international resource dependencies and explores new methods of management economic situation.
APA, Harvard, Vancouver, ISO, and other styles
3

Schönefeld, Marc. "Refactoring of security antipatterns in distributed Java components." Bamberg Univ. of Bamberg Press, 2010. http://d-nb.info/1003208398/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cheung, Lai-sze, and 張麗詩. "Delegation of rights using PKI-based components." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29973053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blackwood, Matthew J. "Homeland security within state departments of agriculture : components of an effective security program." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5128.

Full text
Abstract:
CHDS State/Local<br>Approved for public release; distribution is unlimited<br>ttle understanding of the abilities and capabilities of state departments of agriculture related to homeland security initiatives. The challenge is that these programs tend to fall between agriculture and homeland security programs. This research involved interviewing representatives of 24 state departments of agriculture to identify success factors and barriers related to homeland security programs. Respondents reported multi-state agriculture groups, public-private partnerships, and organizational structure
APA, Harvard, Vancouver, ISO, and other styles
6

Poxon, David Allen Louis. "Static analysis of software components for information flow security." Thesis, Queensland University of Technology, 2021. https://eprints.qut.edu.au/226908/1/David_Poxon_Thesis.pdf.

Full text
Abstract:
For developers to predict whether their code will leak secrets typically requires analysing the whole program; for programs that are independently composed of software components by a third-party, this is a challenging prediction for the component developers to make. The outcome of this research is a set of tools that bridges that gap. This includes Security Contracts, which enable the abstract definition of software component behaviour. These abstractions can be used by developers to understand how their component will interact with other components, which enable our new analyses that can pre
APA, Harvard, Vancouver, ISO, and other styles
7

Andersson, Richard. "Evaluation of the Security of Components in Distributed Information Systems." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2091.

Full text
Abstract:
<p>This thesis suggests a security evaluation framework for distributed information systems, responsible for generating a system modelling technique and an evaluation method. The framework is flexible and divides the problem space into smaller, more accomplishable subtasks with the means to focus on specific problems, aspects or system scopes. The information system is modelled by dividing it into increasingly smaller parts, evaluate the separate parts and then build up the system “bottom up” by combining the components. Evaluated components are stored as reusable instances in a component libr
APA, Harvard, Vancouver, ISO, and other styles
8

Yao, Ming. "A security architecture for protecting dynamic components of mobile agents." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15913/1/Ming_Yao_Thesis.pdf.

Full text
Abstract:
New techniques,languages and paradigms have facilitated the creation of distributed applications in several areas. Perhaps the most promising paradigm is the one that incorporates the mobile agent concept. A mobile agent in a large scale network can be viewed as a software program that travels through a heterogeneous network, crossing various security domains and executing autonomously in its destination. Mobile agent technology extends the traditional network communication model by including mobile processes, which can autonomously migrate to new remote servers. This basic idea results in
APA, Harvard, Vancouver, ISO, and other styles
9

Yao, Ming. "A security architecture for protecting dynamic components of mobile agents." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15913/.

Full text
Abstract:
New techniques,languages and paradigms have facilitated the creation of distributed applications in several areas. Perhaps the most promising paradigm is the one that incorporates the mobile agent concept. A mobile agent in a large scale network can be viewed as a software program that travels through a heterogeneous network, crossing various security domains and executing autonomously in its destination. Mobile agent technology extends the traditional network communication model by including mobile processes, which can autonomously migrate to new remote servers. This basic idea results in
APA, Harvard, Vancouver, ISO, and other styles
10

Schönefeld, Marc [Verfasser]. "Refactoring of security antipatterns in distributed Java components / von Marc Schönefeld." Bamberg : Univ. of Bamberg Press, 2010. http://d-nb.info/1003208398/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Nimgaonkar, Satyajeet. "Secure and Energy Efficient Execution Frameworks Using Virtualization and Light-weight Cryptographic Components." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699986/.

Full text
Abstract:
Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms facilitate the construction of trustworthy secure systems; however, existing hardware security approaches require modifications to the micro-architecture of the processor and such changes are extremely time consuming and expensive to test and implement. Additionally, they incorporate cryptographic security mechanisms that are computationally intensive and account for excessive energy consumption, which significantly degrades the performance of the system. In this dissertation, I explore the dom
APA, Harvard, Vancouver, ISO, and other styles
12

Torri, Stephen A. Hamilton John A. "Generic reverse engineering architecture with compiler and compression classification components." Auburn, Ala, 2009. http://hdl.handle.net/10415/1583.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Dan, Yufang. "SECURITY AND SELF-HEALABILITY ENFORCEMENT OF DYNAMIC COMPONENTS IN A SERVICE-ORIENTED SYSTEM." Phd thesis, INSA de Lyon, 2014. http://tel.archives-ouvertes.fr/tel-00994833.

Full text
Abstract:
Les architectures dynamiques orientées services ( D-SOA) se concentrent sur les interactions client-serveur à couplage faible, où les deux peuvent apparaître et disparaître à l'exécution. Notre objectif est de concevoir des systèmes de surveillance pour ces architectures. Comme les systèmes de surveillance classiques sont statiquement injectés dans les services surveillés, ils ne peuvent pas gérer correctement le cycle de vie des services d'exécution. En outre, quand un service est remplacé par un autre service, d'autres services peuvent toujours utiliser l'ancienne référence.
APA, Harvard, Vancouver, ISO, and other styles
14

Motyka, Matt. "Risk measurement of mortgage-backed security portfolios via principal components and regression analyses." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0429103-231210.

Full text
Abstract:
Thesis (M.S.)--Worcester Polytechnic Institute.<br>Keywords: portfolio risk decomposition; principal components regression; principal components analysis; mortgage-backed securities. Includes bibliographical references (p. 88-89).
APA, Harvard, Vancouver, ISO, and other styles
15

TaheriMonfared, Aryan. "Securing the IaaS Service Model of Cloud Computing Against Compromised Components." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13439.

Full text
Abstract:
Cloud Computing is a new computing model, and its security aspects require special considerations. New characteristics of the cloud model have introduced new security challenges, and made some of the existing security techniques incompatible. Moreover, existing cloud environments are closed, operated by commercial providers, and their security mechanisms are proprietary as well as confidential. In other words, there is not much chance of observing how a real cloud environment is working, and how their providers adapt security measures to the new model.Therefore, we have chosen an open source c
APA, Harvard, Vancouver, ISO, and other styles
16

Mennie, David William. "An architecture to support dynamic composition of service components and its applicability to Internet security." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0020/MQ57732.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Mennie, David William Carleton University Dissertation Engineering Systems and Computer. "An architecture to support dynamic composition of service components and its applicability to Internet security." Ottawa, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Shridevi, Rajesh Jayashankara. "Emerging Security Threats in Modern Digital Computing Systems: A Power Management Perspective." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7483.

Full text
Abstract:
Design of computing systems — from pocket-sized smart phones to massive cloud based data-centers — have one common daunting challenge : minimizing the power consumption. In this effort, power management sector is undergoing a rapid and profound transformation to promote clean and energy proportional computing. At the hardware end of system design, there is proliferation of specialized, feature rich and complex power management hardware components. Similarly, in the software design layer complex power management suites are growing rapidly. Concurrent to this development, there has been an upsur
APA, Harvard, Vancouver, ISO, and other styles
19

Huour, Aranya. "Components of Food Insecurity on a University Campus." CSUSB ScholarWorks, 2019. https://scholarworks.lib.csusb.edu/etd/876.

Full text
Abstract:
Many college students across the nation are going hungry and struggling with food insecurity, as their access to food is becoming more challenging to attain. The purpose of this study is to explore the experiences of college students and components that lead them to becoming food insecure. Studies indicate that food insecurity is a critical issue in a college students’ life, but there is not an established approach to adequately help the students address this issue. The data will be collected through self-administered surveys and participant ratings will be reviewed for any common themes and c
APA, Harvard, Vancouver, ISO, and other styles
20

Setréus, Johan. "Identifying critical components for system reliability in power transmission systems." Doctoral thesis, KTH, Elektroteknisk teori och konstruktion, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-40389.

Full text
Abstract:
Large interruptions of power supply in the transmission system have considerable impact on modern society. The goal for the transmission system operator (TSO) is to prevent and mitigate such events with optimal decisions in design, planning, operation and maintenance. Identifying critical power components for system reliability provides one important input to this decision-making. This thesis develops quantitative component reliability importance indices applicable for identifying critical components in real transmission systems. Probabilistic models with component failure statistics are combi
APA, Harvard, Vancouver, ISO, and other styles
21

Kinkelin, Holger [Verfasser], Georg [Akademischer Betreuer] Carle, and Günter [Akademischer Betreuer] Schäfer. "Autonomous and Robust Components for Security in Network Domains / Holger Kinkelin. Gutachter: Georg Carle ; Günter Schäfer. Betreuer: Georg Carle." München : Universitätsbibliothek der TU München, 2013. http://d-nb.info/1045345679/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Kaufman, Jason R. "Digital video watermarking using singular value decomposition and two-dimensional principal component analysis." Ohio : Ohio University, 2006. http://www.ohiolink.edu/etd/view.cgi?ohiou1141855950.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Дехтяр, Надія Анатоліївна, Надежда Анатольевна Дехтярь та Nadiia Anatoliivna Dekhtiar. "Концептуальні засади забезпечення фінансової безпеки підприємства". Thesis, Українська академія банківської справи Національного банку України, 2011. http://essuir.sumdu.edu.ua/handle/123456789/62955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): Maria Rasmussen. Includes bibliographical references (p. 57-59). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
25

Ропаєва, А. Г. "Моделювання оцінювання ризиків інформаційної безпеки". Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/69480.

Full text
Abstract:
У роботі досліджено теоретико-методологічні основи оцінювання ризиків інформаційної безпеки. Проведено аналіз існуючих підходів до моделювання оцінювання ризиків інформаційної безпеки. Основною метою проведеного дослідження є побудова математичної моделі оцінювання ризиків інформаційної безпеки та її практична реалізація за допомогою пакету «Statistica».<br>The work studies theoretical and methodological basis of information security risk estimation. It gives the analysis of currently existing ways of the modeling of information security risk estimation. The main goal of this study is the crea
APA, Harvard, Vancouver, ISO, and other styles
26

Крапивний, Іван Васильович, Иван Васильевич Крапивный, Ivan Vasylovych Krapyvnyi, et al. "Tax security as a component of the financial security of a country." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43525.

Full text
Abstract:
In modern conditions of the market economy development, the deepening of integration and globalization, the importance of taxes in providing financial security is growing. Taxes and tax policy in modern conditions is one of the most important objects of market reforms. Taking into account that taxes have a significant impact on the economy, the budget system, financial support of local authorities, tax security is an important element of the system of financial security ensuring. To our mind the tax security of the country is such condition of the tax system, which is characterized by the sta
APA, Harvard, Vancouver, ISO, and other styles
27

Nasr, Allah Mounir. "Contrôle de flux d'information par utilisation conjointe d'analyse statique et dynamique accélérée matériellement." Thesis, CentraleSupélec, 2020. http://www.theses.fr/2020CSUP0007.

Full text
Abstract:
Les systèmes embarqués étant de plus en plus présents dans nos vies, il est nécessaire de protéger les données personnelles qui y sont stockées. En effet, les concepteurs d’applications peuvent involontairement introduire des vulnérabilités pouvant être exploitées par un attaquant pour compromettre la confidentialité ou l’intégrité du système. Un des moyens de s’en prémunir est l’utilisation d’outils réactifs permettant de surveiller le comportement du système lors de son fonctionnement. Dans le cadre de cette thèse, nous proposons une approche générique de détection d'anomalies combinant des
APA, Harvard, Vancouver, ISO, and other styles
28

Sohrakoff, Karen A. "Immigrant integration a missing component of Homeland Security strategy and policy /." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FSohrakoff.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2010.<br>Thesis Advisor(s): Rollins, John ; Wollman, Lauren. "March 2010." Description based on title screen as viewed on April 23, 2010. Author(s) subject terms: Immigration, Integration, Radicalization, Identity, International, U.S. Citizenship and Immigration Services (USCIS), Citizenship and Immigration Canada Includes bibliographical references (p. 79-89). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
29

Bond, Anders, and Nils Påhlsson. "A Quantitative Evaluation Framework for Component Security in Distributed Information Systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2410.

Full text
Abstract:
<p>The Heimdal Framework presented in this thesis is a step towards an unambiguous framework that reveals the objective strength and weaknesses of the security of components. It provides a way to combine different aspects affecting the security of components - such as category requirements, implemented security functionality and the environment in which it operates - in a modular way, making each module replaceable in the event that a more accurate module is developed. </p><p>The environment is assessed and quantified through a methodology presented as a part of the Heimdal Framework. The resu
APA, Harvard, Vancouver, ISO, and other styles
30

Ben, Said Najah. "Information Flow Security in Component-Based Models : From verification to Implementation." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM053/document.

Full text
Abstract:
La sécurité des systèmes d'information sont primordiales dans la vie d'aujourd'hui, en particulier avec la croissance des systèmes informatiques complexes et fortement interconnectés. Par exemple, les systèmes bancaires ont l'obligation de garantir l'intégrité et la confidentialité de leurs comptes clients. Le vote électronique, des ventes aux enchères et le commerce doit aussi assurer leurs la confidentialité et l'intégrité.Cependant, la vérification de la sécurité et sa mise en œuvre en distribuée sont des processus lourds en général, les compétences de sécurité avancées sont nécessaires pui
APA, Harvard, Vancouver, ISO, and other styles
31

Maslyuk, L. L., and V. V. Loiko. "The production component of economic security for the production of clothing." Thesis, КНУТД, 2016. https://er.knutd.edu.ua/handle/123456789/2169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Dementis, Georgios Sousa Goncalo. "A legal reasoning component of a network security command and control system." Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FDementis.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2010.<br>Thesis Advisor(s): Michael, James B. Second Reader: Wingfield, Thomas C. ; Sarkesain, John F. "March 2010." Description based on title screen as viewed on April 26, 2010. Author(s) subject terms: Cyberspace, Cyberspace Defense, Network Defense, Distributed Systems, Command and Control, Battle Management, Information Assurance, Situational Awareness. Includes bibliographical references (p. 73-77). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
33

Tran, Tam M. Allen James O. "Interoperability and security support for heterogeneous Cots/Gots/legacy component-based architecture." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA383767.

Full text
Abstract:
Thesis (M.S. in Software Engineering) Naval Postgraduate School, Sept. 2000.<br>Thesis advisor(s): LuQi; Shing, Mantak. "September 2000." Includes bibliographical references (p. 63-65). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
34

Kukuruzovic, Naida. "Security Management : Fulfillment of the Government Requirements for a component assurance process." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189983.

Full text
Abstract:
Protecting organization’s assets from various security threats is a necessity for every organization. Efficient security management is vital to effectively protect the organization’s assets. However, the process of implementing efficient security management is complex and needs to address many requirements. The problem that this master’s thesis project addressed was to propose a component assurance process for the Swedish Armed Forces. This process has to be followed in order for a solution or product to be approved at a specific component assurance level. This problem was solved by first perf
APA, Harvard, Vancouver, ISO, and other styles
35

Sousa, Goncalo. "A legal reasoning component of a network security command and control system." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5457.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>There are numerous computer-aided tools to enable Computer Network Defense. However, their effectiveness in countering attacks is less than optimal when they are used independently of one another. Research has identified the requirements for an integrated command and control (C2) system that is able to conduct full-spectrum operations in the cyberspace environment. The most notable of that research revolves around the development and experimentation with the prototype system known as Cyber Command, Control and Information Operati
APA, Harvard, Vancouver, ISO, and other styles
36

Tran, Tam M., and James O. Allen. "Interoperability and security support for heterogeneous Cots/Gots/legacy component-based architecture." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/9419.

Full text
Abstract:
There is a need for Commercial-off-the-shelf (COTS), Government-off- the-shelf (GOTS) and legacy components to interoperate in a secure distributed computing environment in order to facilitate the development of evolving applications. This thesis researches existing open standards solutions to the distributed component integration problem and proposes an application framework that supports application wrappers and a uniform security policy external to the components. This application framework adopts an Object Request Broker (ORB) standard based on Microsoft Distributed Component Object Model
APA, Harvard, Vancouver, ISO, and other styles
37

Fiore, Ugo. "Improving Network Anomaly Detection with Independent Component Analysis." Doctoral thesis, Universita degli studi di Salerno, 2015. http://hdl.handle.net/10556/1978.

Full text
Abstract:
2013 - 2014<br>Complexity, sophistication, and rate of growth of modern networks, coupled with the depth, continuity, and pervasiveness of their role in our everyday lives, stress the importance of identifying potential misuse or threats that could undermine regular operation. To ensure an adequate and prompt reaction, anomalies in network traffic should be detected, classified, and identified as quickly and correctly as possible. Several approaches focus on inspecting the content of packets traveling through the network, while other techniques aim at detecting suspicious activity by measuri
APA, Harvard, Vancouver, ISO, and other styles
38

Elish, Karim Omar Mahmoud. "User-Intention Based Program Analysis for Android Security." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/54943.

Full text
Abstract:
The number of mobile applications (i.e., apps) is rapidly growing, as the mobile computing becomes an integral part of the modern user experience. Malicious apps have infiltrated open marketplaces for mobile platforms. These malicious apps can exfiltrate user's private data, abuse of system resources, or disrupting regular services. Despite the recent advances on mobile security, the problem of detecting vulnerable and malicious mobile apps with high detection accuracy remains an open problem. In this thesis, we address the problem of Android security by presenting a new quantitative program
APA, Harvard, Vancouver, ISO, and other styles
39

Peterson, Mikael. "CAESAR : A proposed method for evaluating security in component-based distributed information systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2470.

Full text
Abstract:
<p>Background: The network-centric defense requires a method for securing vast dynamic distributed information systems. Currently, there are no efficient methods for establishing the level of IT security in vast dynamic distributed information systems. </p><p>Purpose: The target of this thesis was to design a method, capable of determining the level of IT security of vast dynamic component-based distributed information systems. </p><p>Method: The work was carried out by first defining concepts of IT security and distributed information systems and by reviewing basic measurement and modeling th
APA, Harvard, Vancouver, ISO, and other styles
40

Vorobiev, Artem. "An architectural approach to achieving higher-level security for component (service) based software systems." Swinburne Research Bank, 2008. http://hdl.handle.net/1959.3/47779.

Full text
Abstract:
Thesis (Ph.D) - Swinburne University of Technology, Faculty of Information & Communication Technologies, 2008.<br>Submitted in fulfillment of the requirements of for the degree of Doctor of Philosophy, Faculty of Information and Communication Technologies, Swinburne University of Technology, 2008. Typescript. Includes bibliographical references (p. 228-238)
APA, Harvard, Vancouver, ISO, and other styles
41

Rempfer, Thomas L. "Anthrax vaccine as a component of the strategic national stockpile: a dilemma for Homeland Security." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FRempfer.pdf.

Full text
Abstract:
Thesis (Master of Arts in Security Studies(Homeland Security and Defense))--Naval Postgraduate School, December 2009.<br>Thesis Advisor: Supinski, Stanley. Second Reader: Lynch, Dean. "December 2009." Description based on title screen as viewed on January 29, 2010. Author(s) subject terms: Anthrax Vaccine Adsorbed; AVA; BioThrax; Homeland Security; Strategic National Stockpile; biodefense; bioterrorism; biological warfare; Amerithrax; Anthrax Vaccine Immunization Program; AVIP; Gulf War Illness; Gulf War Syndrome; Investigational New Drug, IND; Experimental; Civilian Control of the Military, P
APA, Harvard, Vancouver, ISO, and other styles
42

Rich, Ronald P., and Jonathan S. Holmgren. "Metric methodology for the creation of environments and processes to certify a component : specifically the Naval Research Laboratory Pump." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1102.

Full text
Abstract:
This thesis was completed in cooperation with the Cebrowski Institute for Information Innovation and Superiority.<br>Approved for public release; distribution is unlimited<br>A of the NP, but the key requirement for Certification and Accreditation is the creation of a Protection Profile and an understanding of the DITSCAP requirements and process. This thesis creates a Protection Profile for the NP along with a draft Type SSAA for Certification and Accreditation of the NP.<br>Lieutenant, United States Navy<br>Lieutenant, United States Navy
APA, Harvard, Vancouver, ISO, and other styles
43

Kulkarni, Keyur. "Android Malware Detection through Permission and App Component Analysis using Machine Learning Algorithms." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1525454213460236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Sahd, Lize-Marie. "A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96674.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2015.<br>ENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and enterprises are forced to incorporate mobile solutions into their business processes in order to remain competitive. While there are many benefits relating to the investment in and use of mobile technology, significant risks are also being introduced into the business. The fast pace of technological innovation and the rate of adoption of mobile technology by employees has, however, created an environment where enterprises are deploying mobile s
APA, Harvard, Vancouver, ISO, and other styles
45

Alesand, Elias, and Hanna Sterneling. "A shoulder-surfing resistant graphical password system." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138163.

Full text
Abstract:
The focus of this report is to discuss graphical password systems and how they can contribute to handle security problems that threaten authentication processes. One such threat is shoulder-surfing attacks, which are also reviewed in this report. Three already existing systems that are claimed to be shoulder-surfing resilient are described and a new proposed system is presented and evaluated through a user study. Moreover, the system is compared to the mentioned existing systems to further evaluate the usability, memorability and the time it takes to authenticate. The user study shows that tes
APA, Harvard, Vancouver, ISO, and other styles
46

Holmgren, Jonathan S. Rich Ronald P. "Metric methodology for the creation of environments and processes to certify a component : specifically the Naval Research Laboratory Pump /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FHolmgren.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2003.<br>Thesis advisor(s): George Dinolt, Craig Rasmussen. Includes bibliographical references (p. 155-157). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
47

Thakkar, Jatin. "Securing Cognitive Radios with a Policy Enforcer and Secure Inter-component Transport Mechanisms." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/34948.

Full text
Abstract:
Current wireless communications are confronted with two significant problems with regard to spectrum use --- spectrum scarcity and deployment difficulties. It is widely believed that Software Defined Radios (SDRs) and Cognitive Radios (CRs) are the key enabling technologies to address these problems. The reconfigurability of SDRs combined with the decoupling of policies and the platform in policy-based radios poses a new technical problem --- viz, enforcing policy conformance. Each DARPA XG radio is equipped with a set of policy conformance components (PCCs) which are responsible for ensuring
APA, Harvard, Vancouver, ISO, and other styles
48

Steiner, Max [Verfasser], and Peter [Akademischer Betreuer] Liggesmeyer. "Integrating Security Concerns into Safety Analysis of Embedded Systems Using Component Fault Trees / Max Steiner ; Betreuer: Peter Liggesmeyer." Kaiserslautern : Technische Universität Kaiserslautern, 2016. http://d-nb.info/1115183664/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Bo, Yibo. "Liquidity measurements and the return-liquidity relationship : empirical evidence from Germany, the UK, the US and China." Thesis, Brunel University, 2017. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.707764.

Full text
Abstract:
With reference to the existing literature on liquidity, three key questions have emerged during the last several decades: (i) How to measure liquidity in the most efficient way? (ii) What is the empirical pattern in the relation between market liquidity and stock returns? (iii) What are the determinants of the changes in the Return-Liquidity Relationship? This thesis take the above three questions as its principal focus and studies them by undertaking three separate empirical chapters, using a substantial dataset that covers all the listed firms in these four global economies – Germany, the UK
APA, Harvard, Vancouver, ISO, and other styles
50

Eskenazi, Sébastien. "On the stability of document analysis algorithms : application to hybrid document hashing technologies." Thesis, La Rochelle, 2016. http://www.theses.fr/2016LAROS019/document.

Full text
Abstract:
Un nombre incalculable de documents est imprimé, numérisé, faxé, photographié chaque jour. Ces documents sont hybrides : ils existent sous forme papier et numérique. De plus les documents numériques peuvent être consultés et modifiés simultanément dans de nombreux endroits. Avec la disponibilité des logiciels d’édition d’image, il est devenu très facile de modifier ou de falsifier un document. Cela crée un besoin croissant pour un système d’authentification capable de traiter ces documents hybrides. Les solutions actuelles reposent sur des processus d’authentification séparés pour les document
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!