Thèses sur le sujet « Computer crimes Computer crimes Computer networks »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Computer crimes Computer crimes Computer networks ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.
Costantini, Kevin C. "Development of a cyber attack simulator for network modeling and cyber security analysis /." Online version of thesis, 2007. http://hdl.handle.net/1850/5440.
Texte intégralSanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.
Texte intégralArgauer, Brian John. "VTAC : virtual terrain assisted impact assessment for cyber attacks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4872.
Texte intégralVan, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.
Texte intégralSeeley, Nathaniel. "Digital receipts : a system to detect the compromise of digital certificates /." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1590.pdf.
Texte intégralFava, Daniel Schnetzer. "Characterization of cyber attacks through variable length Markov models /." Online version of thesis, 2007. http://hdl.handle.net/1850/4776.
Texte intégralFoster, Mark S. "Process forensics the crossroads of checkpointing and intrusion detection /." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0008063.
Texte intégralLee, Christopher Patrick. "Framework for botnet emulation and analysis." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28191.
Texte intégralJudd, Aaron C. "Improved Network Security and Disguising TCP/IP Fingerprint Through Dynamic Stack Modification /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FJudd.pdf.
Texte intégralKortjan, Noloxolo. "A cyber security awareness and education framework for South Africa." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1014829.
Texte intégralKwan, Yuk-kwan, and 關煜群. "The research of using Bayesian inferential network in digital forensicanalysis." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B45898066.
Texte intégralMcConky, Katie Theresa. "Design and analysis of information fusion, dynamic sensor management rules for cyber security systems using simulation /." Online version of thesis, 2007. http://hdl.handle.net/1850/4895.
Texte intégralIbekwe, Chibuko Raphael. "The legal aspects of cybercrime in Nigeria : an analysis with the UK provisions." Thesis, University of Stirling, 2015. http://hdl.handle.net/1893/22786.
Texte intégralTsudama, Brett. "A novel distributed denial-of-service detection algorithm." DigitalCommons@CalPoly, 2004. https://digitalcommons.calpoly.edu/theses/1650.
Texte intégralJiang, Lin, and 蒋琳. "New cryptographic schemes with application in network security and computer forensics." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B44753226.
Texte intégralGottschalk, Jason Howard. "Towards an evaluation and protection strategy for critical infrastructure." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018793.
Texte intégralHashim, Noor Hayati. "An architecture for the forensic analysis of Windows system generated artefacts." Thesis, University of South Wales, 2011. https://pure.southwales.ac.uk/en/studentthesis/forensic-analysis-of-windows-system-generated-artefacts(be571569-2afe-4d52-8c99-9dbc8388b1db).html.
Texte intégralGu, Guofei. "Correlation-based Botnet Detection in Enterprise Networks." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24634.
Texte intégralRansbotham, III Samuel B. "Acquisition and diffusion of technology innovation." Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.
Texte intégralMcRae, Craig Michael. "Using Web bugs and honeytokens to investigate the source of phishing attacks." Master's thesis, Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-04012008-220800.
Texte intégralFairbanks, Kevin D. "Forensic framework for honeypot analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33977.
Texte intégralMelo, Sandro Pereira de. "Taxonomia de técnicas furtivas e antiforenses utilizadas em ataques cibernéticos." Pontifícia Universidade Católica de São Paulo, 2018. https://tede2.pucsp.br/handle/handle/21181.
Texte intégralRansbotham, Samuel B. III. "Acquisition and diffusion of technology innovation." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.
Texte intégralAlharbi, Hani Sayyaf. "Novel analytical modelling-based simulation of worm propagation in unstructured peer-to-peer networks." Thesis, University of Stirling, 2017. http://hdl.handle.net/1893/25389.
Texte intégralEgan, Shaun Peter. "A framework for high speed lexical classification of malicious URLs." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011933.
Texte intégralErdonmez, Erhan. "Investigation of Computer Crimes." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3185/.
Texte intégralSteh, Stephen. "Unauthorized access crimes /." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
Texte intégral孫陸陽. "暗網絡犯罪的刑法問題研究 =Research on criminal law of dark network crime". Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950654.
Texte intégralSamsuddin, Samsuddin Wira Bin Tu Manghui. "Digital forensics curriculum for undergraduate and master graduate students." [Cedar City, Utah] : Southern Utah University, 2009. http://unicorn.li.suu.edu/ScholarArchive/ForensicScience/SamsuddinWira.pdf.
Texte intégralImhof, Robert. "Cyber crime and telecommunications law /." Online version of thesis, 2010. http://hdl.handle.net/1850/12268.
Texte intégralSteh, Stephen R. "Unauthorized Access Crimes." Youngstown State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
Texte intégralWai, Hor Cheong. "Research in computer forensics." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FHor.pdf.
Texte intégralHendry, Gilbert R. "Applicability of clustering to cyber intrusion detection /." Online version of thesis, 2007. http://hdl.handle.net/1850/4777.
Texte intégralBassi, Steven D. "An automated acquisition system for media exploitation." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483619.
Texte intégralStimson, Jared M. "Forensic analysis of Window's® virtual memory incorporating the system's page-file." Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FStimson.pdf.
Texte intégralMaliehe, Mamotumi. "Cybercrime Legislation in Lesotho." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/4662.
Texte intégralYoung, Lap-ping John. "Using cultural perspective to study teenage computer crime." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B31979415.
Texte intégralLaw, Yuet-wing, and 羅越榮. "Investigation models for emerging computer forensic challenges." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46971324.
Texte intégralCassidy, Regis H. Friend. "Automating case reports for the analysis of digital evidence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FCassidy.pdf.
Texte intégralHunter, Harry A. "Computer crime and identity theft." [Denver, Colo.] : Regis University, 2010. http://adr.coalliance.org/codr/fez/view/codr:144.
Texte intégralSonnekus, Michael Hendrik. "A comparison of open source and proprietary digital forensic software." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017939.
Texte intégralProffitt, Tim Gene. "The Effects of Computer Crimes on the Management of Disaster Recovery." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5252.
Texte intégralNeophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.
Texte intégralIbarra, Olivares Rebeca. "Social mechanisms of tax behaviour." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:2893069a-a2bf-46ff-a769-e9ec4ec58b48.
Texte intégralZomba, Lincoln Benn. "Computer related crimes: a comparative analysis of Tanzanian and South African frameworks." Thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/13039.
Texte intégralGunestas, Murat. "An evidence management model for web services behavior." Fairfax, VA : George Mason University, 2009. http://hdl.handle.net/1920/5631.
Texte intégralFei, Bennie Kar Leung. "Data visualisation in digital forensics." Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-03072007-153241.
Texte intégralUrrea, Jorge Mario. "An analysis of Linux RAM forensics." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FUrrea.pdf.
Texte intégralCosta, Fernando José da. "Locus delicti nos crimes informáticos." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/2/2136/tde-24042012-112445/.
Texte intégralHewling, Moniphia Orlease. "Digital forensics : an integrated approach for the investigation of cyber/computer related crimes." Thesis, University of Bedfordshire, 2013. http://hdl.handle.net/10547/326231.
Texte intégral