Rozprawy doktorskie na temat „Malicious attacks”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Malicious attacks”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Opie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.
Pełny tekst źródłaAbu-Bakar, Kamalrulnizam. "Protecting agents against malicious host attacks." Thesis, Aston University, 2004. http://publications.aston.ac.uk/10612/.
Pełny tekst źródłaFischer, Benjamin. "Vehicular Group Membership Resilient to Malicious Attacks." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086.
Pełny tekst źródłaCasile, Roberta <1986>. "GNSS interference management techniques against malicious attacks." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7025/1/Casile_Roberta_tesi.pdf.
Pełny tekst źródłaCasile, Roberta <1986>. "GNSS interference management techniques against malicious attacks." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7025/.
Pełny tekst źródłaSivakumaran, Arun. "Malicious user attacks in decentralised cognitive radio networks." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/79657.
Pełny tekst źródłaMahlburg, Karl. "Structure Attacks in Cryptographic Protocols." Scholarship @ Claremont, 2001. https://scholarship.claremont.edu/hmc_theses/130.
Pełny tekst źródłaNarasimhan, Mayur Harn Lein. "Protecting a mobile agent from colluded truncation attacks by malicious hosts." Diss., UMK access, 2007.
Znajdź pełny tekst źródłaJolley, Jason. "Attribution, state responsibility, and the duty to prevent malicious cyber-attacks in international law." Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8452/.
Pełny tekst źródłaLikarish, Peter F. "Early detection of malicious web content with applied machine learning." Diss., University of Iowa, 2011. https://ir.uiowa.edu/etd/4871.
Pełny tekst źródłaSrivastava, Abhinav. "Robust and secure monitoring and attribution of malicious behaviors." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41161.
Pełny tekst źródłaKambhampaty, Krishna Kanth. "Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/29914.
Pełny tekst źródłaKhraisat, Ansam. "Intelligent zero-day intrusion detection framework for internet of things." Thesis, Federation University Australia, 2020. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/179729.
Pełny tekst źródłaAlberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Thesis, Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008/document.
Pełny tekst źródłaAlberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Electronic Thesis or Diss., Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008.
Pełny tekst źródłaLeithead, Travis S. "Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd1007.pdf.
Pełny tekst źródłaCanali, Davide. "Plusieurs axes d'analyse de sites web compromis et malicieux." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0009/document.
Pełny tekst źródłaCanali, Davide. "Plusieurs axes d'analyse de sites web compromis et malicieux." Electronic Thesis or Diss., Paris, ENST, 2014. http://www.theses.fr/2014ENST0009.
Pełny tekst źródłaAndersson, Stig. "Detecting and characterising malicious executable payloads." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/30325/1/Stig_Andersson_Thesis.pdf.
Pełny tekst źródłaAndersson, Stig. "Detecting and characterising malicious executable payloads." Queensland University of Technology, 2009. http://eprints.qut.edu.au/30325/.
Pełny tekst źródłaPrathapani, Anoosha. "Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348.
Pełny tekst źródłaYu, Yue. "Resilience Strategies for Network Challenge Detection, Identification and Remediation." Thesis, The University of Sydney, 2013. http://hdl.handle.net/2123/10277.
Pełny tekst źródłaSung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.
Pełny tekst źródłaLanger, André, and Tom Kühnert. "Security issues in Address Autoconfiguration Protocols." Universitätsbibliothek Chemnitz, 2007. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200700491.
Pełny tekst źródłaFAVALE, THOMAS. "Strengthening Privacy and Cybersecurity through Anonymization and Big Data." Doctoral thesis, Politecnico di Torino, 2023. https://hdl.handle.net/11583/2975701.
Pełny tekst źródłaKALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.
Pełny tekst źródłaChang, Chung-Cheng, and 張仲丞. "Withstanding Malicious RREQ Packets Flooding Attacks in MANET." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/06901169012462375417.
Pełny tekst źródłaChien-Hung, Chen. "Maximization of Network Survivability against Intelligent and Malicious Attacks." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-1707200615234200.
Pełny tekst źródłaTsai, Jen-Sheng, and 蔡仁勝. "Feature-Based Multipurpose Image Watermarking Resistant against Malicious Attacks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/33484253343750229545.
Pełny tekst źródłaChen, Chien-Hung, and 陳建宏. "Maximization of Network Survivability against Intelligent and Malicious Attacks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/00281366107324361645.
Pełny tekst źródłaRamasamy, Harigovind Venkatraj. "Parsimonious service replication for tolerating malicious attacks in asynchronous environments /." 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3223699.
Pełny tekst źródłaChen, Chun-Wei, and 陳俊維. "Maximization of Network Survival Time upon Intelligent and Malicious Attacks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/54993919407182351736.
Pełny tekst źródłaChen, Chun-Wei. "Maximization of Network Survival Time upon Intelligent and Malicious Attacks." 2007. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2507200700194900.
Pełny tekst źródłaLin, Cheng-Hsu, and 林承旭. "Populating Malicious Flow Entries Against SDN Operations: Attacks and Countermeasures." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/ss887w.
Pełny tekst źródłaLin, hsin-hung, and 林信宏. "A Robust Gray-level Image Watermarking Scheme Against Malicious/Unwitting Attacks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/39953727486820295707.
Pełny tekst źródłaPan, Jia-ling, and 潘佳伶. "Effective Network Planning and Defending Strategies to Minimize Attackers’ Success Probabilities under Malicious and Epidemic Attacks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/66477210972395804144.
Pełny tekst źródłaLee, Yu-Hsuan, and 李昱璇. "Droidivision : Vulnerability Analysis of Multiple Layer Collusion Attacks Using Malicious Intent Simulation." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/r5w7jw.
Pełny tekst źródłaShen, Chi-En, and 沈祈恩. "A Flexible Framework for Malicious Open XML Document Detection against APT Attacks." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/55150067458488796714.
Pełny tekst źródłaChang, Yao-Yuan, and 張耀元. "Network Defense and Recovery Strategies for Maximization of Network Survivability under Malicious Attacks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/88861509387291225501.
Pełny tekst źródła"Hitch-hiking attacks in online social networks and their defense via malicious URL classification." 2012. http://library.cuhk.edu.hk/record=b5549120.
Pełny tekst źródłaLEE, Yi-Fan, and 李奕汎. "Defense Mechanism Against Malicious and Selective Forwarding Attacks in Large & Mobile Wireless Networks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/q2k9gk.
Pełny tekst źródłaWu, Yu-Pu, and 吳育溥. "Maximization of Network Survivability through Deception Mechanisms under Malicious Collaborative Attacks in Virtualization Environment." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/91557274591659567133.
Pełny tekst źródłaLee, Chia-Ling, and 李佳玲. "Effective resource allocation strategies to assure service continuity considering malicious attacks and natural disasters." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/53826400742396768950.
Pełny tekst źródłaKuo, Chien-Ting, and 郭建廷. "An Effective Priority Queue-based Scheme to Alleviate Malicious Packet Flows from Distributed DoS attacks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/02344370863990907472.
Pełny tekst źródłaChan, Chi-Hsiang, and 詹棨翔. "Effective Network Planning and Defending Strategies to Minimize Service Compromise Probabilities under Malicious Collaborative Attacks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/55048445757700088710.
Pełny tekst źródłaJiang, Kun-Dao, and 江坤道. "A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/27717984998726634904.
Pełny tekst źródłaJiang, Kun-Dao. "A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks." 2007. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-1907200713220500.
Pełny tekst źródłaChuang, Ho-Yang, and 莊禾暘. "A Study on Exposing Evidences of Malicious Attacks and Features of Malwares Based on Memory Forensics." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/7xq84v.
Pełny tekst źródłaSayed, Bassam. "Protection against malicious JavaScript using hybrid flow-sensitive information flow monitoring." Thesis, 2015. http://hdl.handle.net/1828/7063.
Pełny tekst źródłaChen, Quen-Ting, and 陳冠廷. "Recovery and Resource Reallocation Strategies to Maximize Network Survivability for Multi-Stage Defense Resource Allocation under Malicious Attacks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/93188278162261584891.
Pełny tekst źródła