Dissertations / Theses on the topic 'Security of ADS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Security of ADS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Miah, Abdul. "Product-based environmental metrics for use within aerospace, defence, space and security industries (ADS)." Thesis, University of Surrey, 2018. http://epubs.surrey.ac.uk/845983/.
Full textWahlgren, Alex, and Joakim Thorn. "Detecting ADS-B spoofing attacks : using collected and simulated data." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-179040.
Full textChi, Lijun. "Security and Robustness of Autonomous Driving Systems Against Physical Adversarial Attack." Electronic Thesis or Diss., Institut polytechnique de Paris, 2025. http://www.theses.fr/2025IPPAT009.
Full textShankaran, Rajan. "Asynchronous transfer mode security /." View thesis, 1999. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030616.142410/index.html.
Full textMead, Jonathan, and mikewood@deakin edu au. "The Australia-Indonesia security relationship." Deakin University. School of International and Political Studies, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051017.144017.
Full textAlach, Zachary James. "Mapping the elements of physical security towards the creation of a holistic physical security model." Connect to thesis, 2007. http://portal.ecu.edu.au/adt-public/adt-ECU2007.0034.html.
Full textZhao, Weiliang. "Security techniques for electronic commerce applications /." View thesis View thesis, 2003. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030505.155156/index.html.
Full textKong, Yibing. "Security and privacy model for association databases." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.
Full textKazi, Mazharul Haque. "Systematic risk factors in Australian security pricing /." View thesis, 2004. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20050913.105500/index.html.
Full textParnell, Winsome R., and n/a. "Food security in New Zealand." University of Otago. Department of Human Nutrition, 2005. http://adt.otago.ac.nz./public/adt-NZDU20070426.162526.
Full textArakala, Arathi, and arathi arakala@ems rmit edu au. "Secure and Private Fingerprint-based Authentication." RMIT University. Mathematical and Geospatial Sciences, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20081128.102017.
Full textNg, Ching Yu. "Contributions to security in wireless ad-hoc networks." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060320.153622/index.html.
Full textKintis, Andreas G. "The European Union's Common Foreign and Security Policy : much ado about nothing?" Thesis, University of Hull, 2002. http://hydra.hull.ac.uk/resources/hull:15917.
Full textSzewczyk, Patryk. "An Investigation into factors inhibiting Australian end-users from utilising ADSL Router security effectively." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1705.
Full textLessner, Dirk. "Network security for embedded systems /." [St. Lucia, Qld.], 2005. http://adt.library.uq.edu.au/public/adt-QU20060215.160952/index.html.
Full textGrose, Robert, and robert grose@deakin edu au. "Formal and Informal Controls of Government over Social Security Expenditure-An Analysis." RMIT University. Business, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080627.102004.
Full textZavodny, Joseph E. "Security requirements and organization for non-tactical ADP systems on small surface ships." Thesis, Monterey, California. Naval Postgraduate School, 1985. http://hdl.handle.net/10945/21539.
Full textKailasanathan, Chandrapal. "Securing digital images." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20041026.150935/index.html.
Full textSun, Zhaohui, and n/a. "Improving Security in WLAN With the Use of Smart Antennas." Griffith University. School of Engineering, 2006. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20070115.143811.
Full textQuinn, Peter Thomas, and peter quinn@anu edu au. "HUMAN SECURITY AND DEVELOPMENT: THE CASE OF CAMBODIA." The Australian National University. Centre for Asian Societies and Histories, College of Asia & the Pacific, 2008. http://thesis.anu.edu.au./public/adt-ANU20100701.122958.
Full textKhoo, How San, and xiaosan@starhub net sg. "Approaches to the Regional Security Analysis of Southeast Asia." The Australian National University. Choose one, 1999. http://thesis.anu.edu.au./public/adt-ANU20050617.140925.
Full textau, D. Mickler@murdoch edu, and David Mickler. "Protecting Civilians or Preserving Interests? Explaining the UN Security Council's Non-intervention in Darfur, Sudan, 2003-06." Murdoch University, 2009. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20091112.122459.
Full textau, c. liss@murdoch edu, and Carolin Liss. "Maritime Piracy in Southeast Asia and Bangladesh, 1992-2006: A Prismatic Interpretation of Security." Murdoch University, 2007. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20080218.120400.
Full textVanMeter, Robert Andrew. "Is hypertext a solution to implementing an ADP security program in DON? Issues and problems." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/28320.
Full textTootell, Holly. "The social impact of using automatic identification technologies and location-based services in national security." Access electronically, 2007. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20080519.145309/index.html.
Full textBai, Yun. "On formal specification of authorization policies and their transformations : thesis /." View thesis View thesis, 2000. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030612.090157/index.html.
Full textBROOKS, David, and d. brooks@ecu edu au. "Public street surveillance: a psychometric study on the perceived social risk." Edith Cowan University. Computing, Health And Science: School Of Engineering, 2003. http://adt.ecu.edu.au/adt-public/adt-ECU2006.0007.html.
Full textGupta, Rajat. "Diversification Premium on Indian ADRs During the Financial Crisis." Scholarship @ Claremont, 2010. http://scholarship.claremont.edu/cmc_theses/23.
Full textMickler, David. "Protecting civilians or preserving interests? : explaining the UN Security Council's non-intervention in Darfur, 2003-06 /." Murdoch University Digital Theses Program, 2009. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20091112.122459.
Full textZhang, Jun Qi. "Oblivious transfer protocols for securing electronic commerce /." View thesis View thesis, 2002. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030417.113506/index.html.
Full textSong, Beomsik. "Observations on the cryptologic properties of the AES algorithm." Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20041028.102719/index.html.
Full textPirzada, Asad Amir. "Trust-based routing in pure ad-hoc wireless networks." University of Western Australia. School of Computer Science and Software Engineering, 2007. http://theses.library.uwa.edu.au/adt-WU2007.0193.
Full textKC, Sharan Kumar. ""Filling the sinful stomach" : a critical, systemic learning action research approach to food security in the eastern hills of Nepal /." View thesis View thesis, 2001. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030414.142817/index.html.
Full textWeekley, Paul. "Improving Sahelian food security through facilitating action learning networks : a case study among the Fulbe Jelgobe of Northern Burkina Faso /." [Richmond, N.S.W.} : Faculty of Environmental Management and Agriculture, University of Western Sydney, Hawkesbury, 1999. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030508.110110/index.html.
Full textFeld, Klaus-Peter. "Bilanzierung von ABS-Transaktionen im IFRS-Abschluss : Anwendung von IAS 39 und SIC-12, konzeptionelle Probleme und Folgen für die Abschlussprüfung /." Düsseldorf : IDW-Verl, 2007. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=015520157&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textXiong, Linping, and n/a. "Modelling Medical Insurance Reform in China - Distributional Effects for Urban Employees and Residents." University of Canberra, 2009. http://erl.canberra.edu.au./public/adt-AUC20091215.151814.
Full textWhitehouse, Jennie L. Alexander Sara E. ""Just add women and stir gently" : gendered impacts of tourism development on household livelihood security and implications for local participation /." Waco, Tex. : Baylor University, 2006. http://hdl.handle.net/2104/5001.
Full textMcLennan, Bruce Clark. "Contemporary maritime pressures and their implications for naval force structure planning." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20070315.111709/index.html.
Full textSedaghat, Soroush. "Web authenticity /." View thesis, 2002. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20031216.135109/index.html.
Full textWeiland, John, and n/a. "The Future of International Media Coverage of Military Operations." Griffith University. School of International Business and Asian Studies, 2003. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20051104.143303.
Full textSmith, Andrew Humanities & Social Sciences Australian Defence Force Academy UNSW. "The factors influencing the employment of the Australian Defence Organisation in homeland security roles since 11 September 2001." Awarded by:University of New South Wales - Australian Defence Force Academy. School of Humanities and Social Sciences, 2007. http://handle.unsw.edu.au/1959.4/38735.
Full textBartrum, Dee A., and n/a. "Job Change and Job Insecurity in the Police Service: Applying the Cognitive-Motivational-Relational Theory of Emotion." Griffith University. School of Psychology, 2006. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20070219.115614.
Full textKurnio, Hartono. "Contributions to group key distribution schemes." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060509.103409/index.html.
Full textFares, Tony Yussef. "Digital rights management for smart containment objects." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060511.151012/index.html.
Full textSalim, Farzad. "Detecting and resolving redundancies in EP3P policies." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20061120.151611/index.html.
Full textTechateerawat, Piya, and piyat33@yahoo com. "Key distribution and distributed intrusion detection system in wireless sensor network." RMIT University. Electrical and Computer Systems Engineering, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080729.162610.
Full textRipiloski, Sasho, and sash1982@optusnet com au. "Macedonia 1991-2001: a case-study of conflict prevention - lessons learned and broader theoretical implications." RMIT University. Global Studies, Social Science and Planning, 2009. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20090507.141532.
Full textChen, YiQun. "Contributions to privacy preserving with ring signatures." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20070104.134826/index.html.
Full textPersson, Pontus. "Ökad leveranssäkerhet i fjärrvärmesystem med hjälp av externa panncentraler : En simulerings- och optimeringsstudie på Sandviken Energi ABs fjärrvärmenät." Thesis, Högskolan i Gävle, Avdelningen för byggnadsteknik, energisystem och miljövetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-36959.
Full textAhl, Gullan. "Reliabilitets- och validitetstestning av ADL-instrument RAINBOW - ett teamdokument." Thesis, Högskolan i Örebro, 1998. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-54256.
Full text