Dissertationen zum Thema „Computer networks – Security measures – Zimbabwe“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Computer networks – Security measures – Zimbabwe" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Bailey, Carmen F. „Analysis of security solutions in large enterprises“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.
Der volle Inhalt der QuelleLU, WEN-PAI. „SECURITY OF COMMUNICATION IN COMPUTER NETWORKS (KEY MANAGEMENT, VERIFICATION)“. Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/183922.
Der volle Inhalt der QuelleDong, Ying, und 董穎. „Providing security services for mobile ad hoc networks“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B3955711X.
Der volle Inhalt der QuelleKalutarage, H. K. „Effective monitoring of slow suspicious activites on computer networks“. Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1.
Der volle Inhalt der QuelleDavis, Carlton R. „Security protocols for mobile ad hoc networks“. Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=102970.
Der volle Inhalt der QuelleOne of the challenging security problems is the issue of certificate revocation in MANETs where there are no on-line access to trusted authorities. In wired network environments, when certificates are to be revoked, certificate authorities (CAs) add the information regarding the certificates in question to certificate revocation lists (CRLs) and post the CRLs on accessible repositories or distribute them to relevant entities. In purely ad hoc networks, there are typically no access to centralized repositories or trusted authorities; therefore the conventional method of certificate revocation is not applicable.
Another challenging MANET security problem is the issue of secure routing in the presence of selfish or adversarial entities which selectively drop packets they agreed to forward; and in so doing these selfish or adversarial entities can disrupt the network traffic and cause various communication problems.
In this thesis, we present two security protocols we developed for addressing the above-mentioned MANET security needs. The first protocol is a decentralized certificate revocation scheme which allows the nodes within a MANET to have full control over the process of certificate revocation. The scheme is fully contained and it does not rely on any input from centralized or external entities such as trusted CAs. The second protocol is a secure MANET routing scheme we named Robust Source Routing (RSR). In addition to providing data origin authentication services and integrity checks, RSR is able to mitigate against intelligent, colluding malicious agents which selectively drop or modify packets they are required to forward.
Tyukala, Mkhululi. „Governing information security using organisational information security profiles“. Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Der volle Inhalt der QuelleRen, Kui. „Communication security in wireless sensor networks“. Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.
Der volle Inhalt der QuelleSanyamahwe, Tendai. „Digital forensic model for computer networks“. Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.
Der volle Inhalt der QuelleMayisela, Simphiwe Hector. „Data-centric security : towards a utopian model for protecting corporate data on mobile devices“. Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011094.
Der volle Inhalt der QuelleKing-Lacroix, Justin. „Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems“. Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Der volle Inhalt der QuelleReid, Rayne. „Guidelines for cybersecurity education campaigns“. Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/14091.
Der volle Inhalt der QuelleNaude, Kevin Alexander. „Assessing program code through static structural similarity“. Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.
Der volle Inhalt der QuelleFana, Akhona. „An evaluation of security issues in cloud-based file sharing technologies“. Thesis, University of Fort Hare, 2015. http://hdl.handle.net/10353/1841.
Der volle Inhalt der QuelleBaratz, Joshua W. (Joshua William) 1981. „Regions Security Policy (RSP) : applying regions to network security“. Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/17933.
Der volle Inhalt der QuelleIncludes bibliographical references (p. 51-54).
The Regions network architecture is a new look at network organization that groups nodes into regions based on common purposes. This shift from strict network topology groupings of nodes requires a change in security systems. This thesis designs and implements the Regions Security Policy (RSP). RSP allows a unified security policy to be set across a region, fully controlling data as it enters into, exits from, and transits within a region. In doing so, it brings together several existing security solutions so as to provide security comparable to existing systems that is more likely to function correctly.
by Joshua W. Baratz.
M.Eng.and S.B.
Shankaran, Rajan, University of Western Sydney, of Science Technology and Environment College und School of Computing and Information Technology. „Security issues in mobile IP and mobile ad hoc networks“. THESIS_CSTE_CIT_Shankaran_R.xml, 2004. http://handle.uws.edu.au:8081/1959.7/585.
Der volle Inhalt der QuelleDoctor of Philosophy (PhD)
Frauenstein, Edwin Donald. „A framework to mitigate phishing threats“. Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021208.
Der volle Inhalt der QuelleLoutsios, Demetrios. „A holistic approach to network security in OGSA-based grid systems“. Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/550.
Der volle Inhalt der QuelleFelker, Keith A. „Security and efficiency concerns with distributed collaborative networking environments“. Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/852.
Der volle Inhalt der QuelleThe progression of technology is continuous and the technology that drives interpersonal communication is not an exception. Recent technology advancements in the areas of multicast, firewalls, encryption techniques, and bandwidth availability have made the next level of interpersonal communication possible. This thesis answers why collaborative environments are important in today's online productivity. In doing so, it gives the reader a comprehensive background in distributed collaborative environments, answers how collaborative environments are employed in the Department of Defense and industry, details the effects network security has on multicast protocols, and compares collaborative solutions with a focus on security. The thesis ends by providing a recommendation for collaborative solutions to be utilized by NPS/DoD type networks. Efficient multicast collaboration, in the framework of security is a secondary focus of this research. As such, it takes security and firewall concerns into consideration while comparing and contrasting both multicast-based and non-multicast-based collaborative solutions.
Martina, Jean Everson. „Verification of security protocols based on multicast communication“. Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609650.
Der volle Inhalt der QuelleLabbe, Keith G. „Evaluation of two host-based intrusion prevention systems“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FLabbe.pdf.
Der volle Inhalt der QuelleWhite, Dominic Stjohn Dolin. „Limiting vulnerability exposure through effective patch management: threat mitigation through vulnerability remediation“. Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1006510.
Der volle Inhalt der QuelleTeX output 2007.02.08:2212
Adobe Acrobat 9.51 Paper Capture Plug-in
Michael, Robert J., und Zachary H. Staples. „Redefining attack: taking the offensive against networks“. Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1063.
Der volle Inhalt der QuelleThis thesis done in cooperation with the MOVES Institute
The Information Age empowers individuals, and affords small groups an opportunity to attack states' interests with an increasing variety of tactics and great anonymity. Current strategies to prevail against these emerging threats are inherently defensive, relying on potential adversaries to commit mistakes and engage in detectable behavior. While defensive strategies are a critical component of a complete solution set, they cede initiative to the adversary. Moreover, reactive measures are not suited to quickly suppress adversary networks through force. To address this shortfall in strategic planning, the science of networks is rapidly making clear that natural systems built over time with preferential attachment form scale-free networks. These networks are naturally resilient to failure and random attack, but carry inherent vulnerabilities in their highly connected hubs. Taking the offensive against networks is therefore an exercise in discovering and attacking such hubs. To find these hub vulnerabilities in network adversaries, this thesis proposes a strategy called Stimulus Based Discovery, which leads to rapid network mapping and then systematically improves the accuracy and validity of this map while simultaneously degrading an adversary's network cohesion. Additionally, this thesis provides a model for experimenting with Stimulus Based Discovery in a Multi-Agent System.
Lieutenant, United States Navy
Wang, Ke, und 黃岢. „Designing authenication scheme for wireless sensor networks“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B42841732.
Der volle Inhalt der QuelleBenbrook, Jimmie Glen 1943. „A SYSTEM ANALYSIS OF A MULTILEVEL SECURE LOCAL AREA NETWORK (COMPUTER)“. Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/275531.
Der volle Inhalt der QuelleRumelioglu, Sertac. „Evaluation of Embedded Firewall System“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FRumelioglu.pdf.
Der volle Inhalt der QuellePosthumus, Shaun Murray. „Corporate information risk : an information security governance framework“. Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.
Der volle Inhalt der QuelleDesai, Mohammed Reza. „An integrated approach for information security compliance in a financial services organisation“. Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.
Der volle Inhalt der QuelleThe aim of this research is to identify and explore the factors affecting information security compliance of information security policies and regulations, in a financial services organisation. The organisation has to comply with information security regulations and legislations by righteousness of its operations in light of the fact that any wrong doing together with misuse of data, are continually expanding. Corporate embarrassments comes about due to rupture of security, results in expanded thoughtfulness regarding corporate consistency. Legislature and policies have been set up to counter information security issues. This legislature and policies are not adequately addressing the compliance issues that arise, but are needed within organisations. Compliance targets are not met due to inconsistent guidelines that turns out to be significant in diminishing the financial position, reputation and security of information. This research further aims to explore whether employees comply with laws and regulations regarding information in an organisation. This is done in order to confirm whether governance and human factors play any significant part in compliance. The research is an exploratory study and specifically analyses the governance function and which stakeholders influence its operations in information compliance. The research investigates certain questions on organisational culture and the human factor, do influence employee’s compliance to laws and regulations. The objectives of the research are to investigate which factors, and how such factors influence compliance of information security policies and compliance with the goal of designing an integrated framework to assist in counteracting these findings. The research is underpinned by the Neo-institutional theory, Agency Theory and Rational choice theory. The Denison organisational cultural model and a framework proposed by von Solms are used as lenses to interpret the data of the research.
Clayton, Bradley. „Securing media streams in an Asterisk-based environment and evaluating the resulting performance cost“. Thesis, Rhodes University, 2007. http://eprints.ru.ac.za/851/.
Der volle Inhalt der QuelleSears, Joseph D. „Simultaneous connection management and protection in a distributed multilevel security environment“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FSears.pdf.
Der volle Inhalt der QuelleThesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 65-66, 85, 117, 119-121). Also available online.
Artore, Diane. „Honeynet design and implementation“. Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22614.
Der volle Inhalt der QuelleLevine, John G. (John Glenn). „A Methodology for Detecting and Classifying Rootkit Exploits“. Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5139.
Der volle Inhalt der QuelleKortjan, Noloxolo. „A cyber security awareness and education framework for South Africa“. Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1014829.
Der volle Inhalt der QuelleKane, Douglas Robert. „Web-based dissemination system for the Trusted Computing Exemlar [i.e. Exemplar] project“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FKane.pdf.
Der volle Inhalt der QuelleThesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 127-128). Also available online.
Lau, Cheuk Wan William Computer Science & Engineering Faculty of Engineering UNSW. „Restoration strategies and algorithms for survivable networks“. Awarded by:University of New South Wales. School of Computer Science and Engineering, 2004. http://handle.unsw.edu.au/1959.4/24330.
Der volle Inhalt der QuelleFragkos, Grigorios. „Near real-time threat assessment using intrusion detection system's data“. Thesis, University of South Wales, 2011. https://pure.southwales.ac.uk/en/studentthesis/near-realtime-threat-assessment-using-intrusion-detection-systems-data(96a9528f-f319-4125-aaf0-71593bb61b56).html.
Der volle Inhalt der QuelleSung, Minho. „Scalable and efficient distributed algorithms for defending against malicious Internet activity“. Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.
Der volle Inhalt der QuelleXu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
Lububu, Steven. „Perception of employees concerning information security policy compliance : case studies of a European and South African university“. Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2802.
Der volle Inhalt der QuelleThis study recognises that, regardless of information security policies, information about institutions continues to be leaked due to the lack of employee compliance. The problem is that information leakages have serious consequences for institutions, especially those that rely on information for its sustainability, functionality and competitiveness. As such, institutions ensure that information about their processes, activities and services are secured, which they do through enforcement and compliance of policies. The aim of this study is to explore the extent of non-compliance with information security policy in an institution. The study followed an interpretive, qualitative case study approach to understand the meaningful characteristics of the actual situations of security breaches in institutions. Qualitative data was collected from two universities, using semi-structured interviews, with 17 participants. Two departments were selected: Human Resources and the Administrative office. These two departments were selected based on the following criteria: they both play key roles within an institution, they maintain and improve the university’s policies, and both departments manage and keep confidential university information (Human Resources transects and keeps employees’ information, whilst the Administrative office manages students’ records). This study used structuration theory as a lens to view and interpret the data. The qualitative content analysis was used to analyse documentation, such as brochures and information obtained from the websites of the case study’s universities. The documentation was then further used to support the data from the interviews. The findings revealed some factors that influence non-compliance with regards to information security policy, such as a lack of leadership skills, favouritism, fraud, corruption, insufficiency of infrastructure, lack of security education and miscommunication. In the context of this study, these factors have severe consequences on an institution, such as the loss of the institution’s credibility or the institution’s closure. Recommendations for further study are also made available.
Srivatsa, Mudhakar. „Security Architecture and Protocols for Overlay Network Services“. Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16284.
Der volle Inhalt der QuelleLim, Yu-Xi. „Secure Geolocation for Wireless Indoor Networks“. Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.
Der volle Inhalt der QuelleCoertze, Jacques Jacobus. „A framework for information security governance in SMMEs“. Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1014083.
Der volle Inhalt der QuelleJeong, Juyong. „WebSAT: Web-based systems administration tool“. CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2667.
Der volle Inhalt der QuelleJones, Andrew. „Threats to information systems and effective countermeasures“. Thesis, University of South Wales, 2004. https://pure.southwales.ac.uk/en/studentthesis/threats-to-information-systems-and-effective-countermeasures(2ffda7b3-38d8-48a3-90da-386ee85f10bf).html.
Der volle Inhalt der QuelleGcaza, Noluxolo. „A national strategy towards cultivating a cybersecurity culture in South Africa“. Thesis, Nelson Mandela University, 2017. http://hdl.handle.net/10948/13735.
Der volle Inhalt der QuelleFani, Noluvuyo. „Governing information security within the context of "bring your own device" in small, medium and micro enterprises“. Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/7626.
Der volle Inhalt der QuelleMonk, Thomas Philippus. „Educating users about information security by means of game play“. Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1493.
Der volle Inhalt der QuelleBloch, Matthieu. „Physical-layer security“. Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24658.
Der volle Inhalt der QuelleCommittee Chair: McLaughlin, Steven; Committee Member: Barros, Joao; Committee Member: Bellissard, Jean; Committee Member: Fekri, Faramarz; Committee Member: Lanterman, Aaron
Vasisht, Vikas R. „Architectural support for autonomic protection against stealth by rootkit exploits“. Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26618.
Der volle Inhalt der QuelleCommittee Chair: Lee, Hsien-Hsin; Committee Member: Blough, Douglas; Committee Member: Copeland, John. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Viljoen, Melanie. „A framework towards effective control in information security governance“. Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/887.
Der volle Inhalt der QuelleDe, Wit Roland Duyvené. „Provisioning VolP wireless networks with security“. Thesis, Bloemfontein : Central University of Technology, Free State, 2008. http://hdl.handle.net/11462/47.
Der volle Inhalt der QuelleHart, Dennis. „An approach to vulnerability assessment for Navy Supervisory Control and Data Acquisition (SCADA) system“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FHart.pdf.
Der volle Inhalt der QuelleThesis advisor(s): Cynthia E. Irvine, Karen Burke. Includes bibliographical references (p. 161-162). Also available online.