Dissertations / Theses on the topic 'Security Vulnerabilities'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Security Vulnerabilities.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Xenitellis, Simeon. "On the identification of security vulnerabilities." Thesis, Royal Holloway, University of London, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.538785.
Full textSandgren, Per. "Security Assessment and *nix Package Vulnerabilities." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16723.
Full textBorstad, Ole Gunnar. "Finding Security Patterns to Countermeasure Software Vulnerabilities." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8850.
Full textLarsson, Josephine, and Ida Waller. "Security in wireless networks : Vulnerabilities and Countermeasures." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2380.
Full textRahimi, Sanaz. "SECURITY VULNERABILITIES: DISCOVERY, PREDICTION, EFFECT, AND MITIGATION." OpenSIUC, 2013. https://opensiuc.lib.siu.edu/dissertations/696.
Full textLiaqat, Imran. "Vulnerabilities in Security Products for Computers 2006-2008." Thesis, Linköping University, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-19472.
Full textTaylor, Barry. "Identitying vulnerabilities and controls in complex composite security architectures." Thesis, University of Aberdeen, 2014. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757.
Full textMorris, Joseph C. "Identifying potential vulnerabilities in software designs." Virtual Press, 2007. http://liblink.bsu.edu/uhtbin/catkey/1380105.
Full textGaboriau-Couanau, Clément. "Security of Embedded Software : An Analysis of Embedded Software Vulnerabilities and Related Security Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215703.
Full textTevis, Jay-Evan J. Hamilton John A. "Automatic detection of software security vulnerabilities in executable program files." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/doctoral/TEVIS_JAY-EVAN_36.pdf.
Full textWindow, Marc. "Security in Precision Agriculture : Vulnerabilities and risks of agricultural systems." Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74309.
Full textLee, Jae Hyung S. M. Massachusetts Institute of Technology. "Systematic approach to analyzing security and vulnerabilities of blockchain systems." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121793.
Full textDemissie, Biniam Fisseha. "Security Testing of Permission Re-delegation Vulnerabilities in Android Applications." Doctoral thesis, Università degli studi di Trento, 2019. https://hdl.handle.net/11572/367794.
Full textDemissie, Biniam Fisseha. "Security Testing of Permission Re-delegation Vulnerabilities in Android Applications." Doctoral thesis, University of Trento, 2019. http://eprints-phd.biblio.unitn.it/3700/1/thesis.pdf.
Full textJo, Arrah-Marie. "Economics of information security and the market for software vulnerabilities." Electronic Thesis or Diss., Institut polytechnique de Paris, 2019. http://www.theses.fr/2019IPPAT003.
Full textNorwood, Charles Ellis. "Demonstration of Vulnerabilities in Globally Distributed Additive Manufacturing." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/99104.
Full textPashchenko, Ivan. "Decision Support of Security Assessment of Software Vulnerabilities in Industrial Practice." Doctoral thesis, Università degli studi di Trento, 2019. http://hdl.handle.net/11572/285410.
Full textPashchenko, Ivan. "Decision Support of Security Assessment of Software Vulnerabilities in Industrial Practice." Doctoral thesis, Università degli studi di Trento, 2019. http://hdl.handle.net/11572/285410.
Full textPashchenko, Ivan. "Decision Support of Security Assessment of Software Vulnerabilities in Industrial Practice." Doctoral thesis, Università degli studi di Trento, 2019. https://hdl.handle.net/11572/368392.
Full textPashchenko, Ivan. "Decision Support of Security Assessment of Software Vulnerabilities in Industrial Practice." Doctoral thesis, University of Trento, 2019. http://eprints-phd.biblio.unitn.it/3812/2/Disclaimer.pdf.
Full textFediushyn, O. I., O. O. Yatsiuk, and H. O. Rusanov. "Virtual environment for training auditors with information security." Thesis, ВА ЗС АР; НТУ "ХПІ"; НАУ, ДП "ПДПРОНДІАВІАПРОМ"; УмЖ, 2021. https://openarchive.nure.ua/handle/document/15754.
Full textAhmad, Nadeem, and M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.
Full textSivaramakrishnan, Hariharan. "On the use of fault injection to discover security vulnerabilities in applications." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3566.
Full textKarabey, Bugra. "Attack Tree Based Information Technology Security Metric Integrating Enterprise Objectives With Vulnerabilities." Phd thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12614100/index.pdf.
Full textJaffer, Navin. "Cyber security vulnerabilities during long term evolution power-saving discontinuous reception protocol." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42650.
Full textFazeen, Mohamed, and Mohamed Issadeen. "Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc700067/.
Full textTwisdale, Jerry Allen. "Exploring SME Vulnerabilities to Cyber-criminal Activities Through Employee Behavior and Internet Access." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5428.
Full textSigot, Marine. "Energy security and the EU : between independency priorities, strategic vulnerabilities and sustainability needs." Thesis, Stockholms universitet, Juridiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-96174.
Full textPerera, George. "Purposefully manufactured vulnerabilities in U.S. government technology microchips: risks and homeland security implications." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27886.
Full textEdström, Viktor, and Eldar Zeynalli. "Penetration testing a civilian drone : Reverse engineering software in search for security vulnerabilities." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280096.
Full textFrazier, Edward Snead. "Assessing Security Vulnerabilities: An Application of Partial and End-Game Verification and Validation." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/31849.
Full textCulpepper, Anna M. "Effectiveness of using red-teams to identify maritime security vulnerabilities to terrorist attack." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sept%5FCulpepper.pdf.
Full textRaymond, David Richard. "Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26629.
Full textBazaz, Anil. "A Framework for Deriving Verification and Validation Strategies to Assess Software Security." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/27006.
Full textBackman, Lars. "Why is security still an issue? : A study comparing developers’ software security awareness to existing vulnerabilities in software applications." Thesis, Linköpings universitet, Programvara och system, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-153438.
Full textHuang, Jin. "Detecting Server-Side Web Applications with Unrestricted File Upload Vulnerabilities." Wright State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=wright163007760528389.
Full textHamadi, Ashraf. "Investigating vulnerabilities in a home network with Kali Linux." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-42612.
Full textSundqvist, Jonathan. "Reasons for lacking web security : An investigation into the knowledge of web developers." Thesis, Blekinge Tekniska Högskola, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17008.
Full textGraux, Pierre. "Challenges of native android applications : obfuscation and vulnerabilities." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S047.
Full textJohnson, Gerald Deawne. "Development of an Audit Classification Index (ACI) for Federal e-learning Systems Security Vulnerabilities." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/187.
Full textFisch, Johan, and Carl Haglund. "Using the SEI CERT Secure Coding Standard to Reduce Vulnerabilities." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176409.
Full textAhlberg, Gustav. "Generating web applications containing XSS and CSRF vulnerabilities." Thesis, Linköpings universitet, Databas och informationsteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-111652.
Full textKotikela, Srujan D. "Secure and Trusted Execution Framework for Virtualized Workloads." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1248514/.
Full textCorral, Torruella Guiomar. "Consensus and analia: new challenges in detection and management of security vulnerabilities in data networks." Doctoral thesis, Universitat Ramon Llull, 2009. http://hdl.handle.net/10803/9160.
Full textLopez, Bryan S. "An investigation and assessment of Linux Ipchains and its vulnerabilities with respect to network security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA380335.
Full textKaluarachchi, Pubudu Kalpani. "Cybersecurity: Stochastic Analysis and Modelling of Vulnerabilities to Determine the Network Security and Attackers Behavior." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6862.
Full textMichel, Hannes, and Emil Christensson. "Framework For Enabling Structured Communication of Security Vulnerabilities in the Production Domain in Industry 4.0." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85475.
Full textBerges, Paul Martin. "Exploring the Vulnerabilities of Traffic Collision Avoidance Systems (TCAS) Through Software Defined Radio (SDR) Exploitation." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/90165.
Full textWanderydz, Kristoffer. "WEB APPLICATION SECURITY IN THE JAVA ENVIRONMENT." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2370.
Full textReimers, Erik. "On the security of TLS and IPsec : Mitigation through physical constraints." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119357.
Full text