Tesi sul tema "Computer security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Computer security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Anderson, Ross John. "Robust computer security". Thesis, University of Cambridge, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338198.
Testo completoPohrebniak. "IMPROVING COMPUTER SECURITY". Thesis, Київ 2018, 2018. http://er.nau.edu.ua/handle/NAU/33885.
Testo completoBurchett, Ian. "Quantifying Computer Network Security". TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.
Testo completoBesada, Jorge L. "Personal computer security system". FIU Digital Commons, 1993. http://digitalcommons.fiu.edu/etd/1707.
Testo completoMemon, Abdul Qudoos, Ali Hasan Raza e Sadia Iqbal Iqbal. "WLAN Security : WLAN Security". Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.
Testo completoWLANs are become popular due to their different advantages. Beside all these advantages WLANs are also facing the major problem of the security, so that why lots of people are doing research on WLAN to improve the security because many companies want to transfer their sensible data over WLAN.
This report discusses the security issues of WLAN based on IEEE 802.11 standard, such type of networks are referred to as wifi network. WLAN is deployed as an extension of already existed wired LAN. Therefore it is necessary to provide the security of WLAN equals to Wired LAN.
We worked in a lab environment in order to configure the three different security solutions (WEP, WPA & WPA2 using IEEE 802.1X and RADIUS Server) on infrastructure mode for personnel and enterprise architecture of WLAN. For each security solution we used the backtrack as a security cracking tool, in order to break the WEP (64 and 128 bit long) security key of WLAN, make comparison between 64 and 128 bit long WEP key and also analyzed the different kind of attacks and some drawbacks of using WEP security in WLAN. In the same way configure the WPA and WPA2 (using IEEE 802.1X and RADIUS Server) security solution in infrastructure mode of WLAN and use the same security cracking tool backtrack in order to break the security of the WLAN and analyze the different attacks on the network in these architecture and drawbacks of using WPA and WPA2 Security solutions. By using IEEE 802.1X and RADIUS Server we can improve the security of the enterprise network.
In the end we come with many conclusions and suggestions that will help in order to provide better security while deploying Wireless LAN.
Opponents: Ali Murtaza & Mansoor Ahmed
Taramonli, Chryssanthi. "Energy conscious adaptive security". Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/74094/.
Testo completoSkaria, Sherin, e Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network". Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.
Testo completoLomas, Thomas Mark Angus. "Aspects of computer network security". Thesis, University of Cambridge, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241051.
Testo completoSoewito, Benfano. "Adaptive Security In Computer Networks". Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1879096201&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Testo completo"Department of Electrical and Computer Engineering." Keywords: Adaptive security, Computer networks, Intrusion detection. Includes bibliographical references (p. 78-84). Also available online.
Li, QianQian. "Human-Computer Interaction: Security Aspects". Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3427166.
Testo completoInsieme al rapido sviluppo dell'era dell'informazione, gli utenti stanno avendo una crescente interazione con i dispositivi intelligenti. Tali dispositivi intelligenti sono interconnessi tra loro nell'Internet of Things (IoT). I sensori dei dispositivi IoT raccolgono informazioni sui comportamenti degli utenti dall'interazione tra utenti e dispositivi. Poiché gli utenti interagiscono con i dispositivi intelligenti IoT per le attività quotidiane di comunicazione e social network, tale interazione genera un'enorme quantità di traffico di rete. Quindi, i comportamenti degli utenti stanno giocando un ruolo importante nella sicurezza dei dispositivi intelligenti IoT e gli aspetti di sicurezza dell'interazione uomo-macchina stanno diventando significativi. In questa tesi, forniamo un triplice contributo: (1) esaminiamo le sfide alla sicurezza dell'autenticazione basata su HCI e progettiamo uno strumento per rilevare utenti ingannevoli tramite la dinamica dei tasti; (2) presentiamo l'impatto dei comportamenti degli utenti sul traffico di rete e proponiamo un framework per gestire tale traffico di rete; (3) illustriamo una proposta per dispositivi intelligenti IoT con vincoli energetici per essere resilienti contro attacchi energetici ed efficienti nella comunicazione di rete. Più in dettaglio, nella prima parte di questa tesi, analizziamo il modo in cui i comportamenti degli utenti influiscono sul modo in cui essi interagiscono con un dispositivo. Quindi, esaminiamo il lavoro relativo alle sfide di sicurezza dell'autenticazione basata su HCI su smartphone e Brain-Computer Interfaces (BCI). Inoltre, progettiamo uno strumento per valutare la veridicità delle informazioni che gli utenti inseriscono usando la tastiera di un computer. Questo strumento si basa sulla dinamica dei tasti e si basa sulla tecnica di apprendimento automatico per raggiungere tale obiettivo. Per quanto siamo a conoscenza, questo è il primo lavoro che associa i comportamenti degli utenti di digitazione alla produzione di informazioni personali ingannevoli. Abbiamo raggiunto un'accuratezza complessiva del 76% nella classificazione di una singola risposta come veritiera o mendace. Nella seconda parte di questa tesi, esaminiamo l'analisi del traffico di rete, in particolare in relazione all'interazione tra dispositivi mobili e utenti. Poiché l'interazione genera un'enorme quantità di traffico di rete, proponiamo un framework innovativo, GolfEngine, per gestire e controllare l'impatto del comportamento degli utenti sulla rete facendo affidamento sulle tecniche di Software Defined Networking (SDN). GolfEngine fornisce agli utenti uno strumento per costruire le loro applicazioni di sicurezza e offre una GUI (Graphical User Interface) per la gestione e il monitoraggio della rete. In particolare, GolfEngine fornisce la funzione di controllare i conflitti di policy quando gli utenti progettano applicazioni di sicurezza e il meccanismo per controllare la ridondanza dell'archiviazione dei dati. GolfEngine non solo previene le politiche di inserimento malizioso, ma impone anche la sicurezza sulla gestione della rete del traffico di rete. I risultati della nostra simulazione sottolineano che GolfEngine fornisce prestazioni efficienti, sicure e robuste per la gestione del traffico di rete tramite SDN. Nella terza e ultima parte di questa tesi, analizziamo gli aspetti di sicurezza dei dispositivi IoT dotati di batteria dal punto di vista del consumo energetico. Sebbene la maggior parte del consumo di energia dei dispositivi IoT sia dovuta all'interazione dell'utente, c'è ancora una quantità significativa di energia consumata dalla comunicazione point-to-point e dalla gestione della rete IoT. In questo scenario, un avversario può compromettere un dispositivo IoT e condurre un attacco Denial of Service (DoS) che punta a esaurire le batterie di altri dispositivi. Pertanto, proponiamo EnergIoT, un nuovo metodo basato su politiche energetiche che prevengono tali attacchi e, allo stesso tempo, ottimizza la comunicazione tra utenti e dispositivi IoT ed estende la durata della rete. EnergIoT si basa su un approccio di clustering gerarchico, basato su diversi rapporti di duty cycle, per massimizzare la durata della rete di dispositivi intelligenti con vincoli energetici. I risultati mostrano che EnergIoT migliora la sicurezza e la durata della rete del 32%, rispetto agli approcci utilizzati in precedenza, senza sacrificare le prestazioni della rete (cioè, ritardo end-to-end).
Huang, Jianyong. "Security for PDAs". School of Information Technology and Computer Science - Faculty of Informatics, 2004. http://ro.uow.edu.au/theses/184.
Testo completoShonola, Shaibu A. "Mobile learning security in Nigeria". Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/98529/.
Testo completoHoltje, Carl. "Security in serverless network environments /". Link to online version, 2004. https://ritdml.rit.edu/dspace/handle/1850/439.
Testo completoFrisk, Ulf, e Semir Drocic. "The State of Home Computer Security". Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.
Testo completoHundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security.
This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed in the following chapter. These threats include worms, email worms, spyware and trojan horses. After this chapter some possible solutions for improving home computer security are presented. Finally this master thesis contains a short user survey to find out what the problems are in the real world and what can be doneto improve the current situation.
Ali, Dana, e Goran Kap. "Statistical Analysis of Computer Network Security". Thesis, KTH, Matematisk statistik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-129948.
Testo completoNeophytou, Andonis. "Computer security : data control and protection". Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.
Testo completoDepartment of Computer Science
Kong, Jingfei. "ARCHITECTURAL SUPPORT FOR IMPROVING COMPUTER SECURITY". Doctoral diss., University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2610.
Testo completoPh.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Science PhD
Baldwin, Robert W. (Robet William). "Rule based analysis of computer security". Thesis, Massachusetts Institute of Technology, 1987. http://hdl.handle.net/1721.1/14592.
Testo completoIncludes bibliographical references.
Supported by the Defense Advanced Research Projects Agency of the Department of Defense, monitored by the Office of Naval Research. N00014-83-K-0125
by Robert W. Baldwin.
Ph.D.
Щеглов, Сергій Анатолійович, Сергей Анатольевич Щеглов, Serhii Anatoliiovych Shchehlov, Віра Вікторівна Шендрик, Вера Викторовна Шендрик, Vira Viktorivna Shendryk e I. Sumtsova. "Bell-LaPadula model of computer security". Thesis, Сумський державний університет, 2012. http://essuir.sumdu.edu.ua/handle/123456789/28822.
Testo completoHausrath, Nathaniel L. "Methods for Hospital Network and Computer Security". University of Cincinnati / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.
Testo completoKainda, Ronald. "Usability and security of human-interactive security protocols". Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36.
Testo completoBaratz, Joshua W. (Joshua William) 1981. "Regions Security Policy (RSP) : applying regions to network security". Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/17933.
Testo completoIncludes bibliographical references (p. 51-54).
The Regions network architecture is a new look at network organization that groups nodes into regions based on common purposes. This shift from strict network topology groupings of nodes requires a change in security systems. This thesis designs and implements the Regions Security Policy (RSP). RSP allows a unified security policy to be set across a region, fully controlling data as it enters into, exits from, and transits within a region. In doing so, it brings together several existing security solutions so as to provide security comparable to existing systems that is more likely to function correctly.
by Joshua W. Baratz.
M.Eng.and S.B.
Pino, Luca. "Security aware service composition". Thesis, City University London, 2015. http://openaccess.city.ac.uk/13170/.
Testo completoJackson, Jennifer T. "A biodiversity approach to cyber security". Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/106820/.
Testo completoKatsikas, Stamatios. "Game theoretic models of networks security". Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/102611/.
Testo completoAlAdraj, Resala A. "Security and collaborative groupware tools usage". Thesis, University of Warwick, 2015. http://wrap.warwick.ac.uk/73319/.
Testo completoGoktepe, Meftun. "Windows XP Operating System security analysis". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FGoktepe.pdf.
Testo completoThesis advisor(s): Richard Harkins, Cynthia Irvine. Includes bibliographical references (p. 105-107). Also available online.
Haley, Charles B. "Arguing security : a framework for analyzing security requirements". n.p, 2006. http://ethos.bl.uk/.
Testo completoTyukala, Mkhululi. "Governing information security using organisational information security profiles". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Testo completoLurain, Sher. "Networking security : risk assessment of information systems /". Online version of thesis, 1990. http://hdl.handle.net/1850/10587.
Testo completoAkinbi, Olushola Alexander. "An adaptive security framework for evaluating and assessing security implementations in PaaS cloud models". Thesis, Edge Hill University, 2015. http://repository.edgehill.ac.uk/7762/.
Testo completoClarke, Marlon Renese. "The Role of Self-Efficacy in Computer Security Behavior: Developing the Construct of Computer Security Self-Efficacy (CSSE)". NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/121.
Testo completoLu, Long. "Reinforcing the weakest link in cyber security: securing systems and software against attacks targeting unwary users". Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/49090.
Testo completoUmeh, Njideka Adaku. "Security architecture methodology for large net-centric systems". Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.mst.edu/thesis/Umeh_09007dcc8049b3f0.pdf.
Testo completoVita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed December 6, 2007) Includes bibliographical references (p. 60-63).
Simpson, Andrew C. "Safety through security". Thesis, University of Oxford, 1996. http://ora.ox.ac.uk/objects/uuid:4a690347-46af-42a4-91fe-170e492a9dd1.
Testo completoHaroutunian, George V. "Security aspects of computer supported collaborative work". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA275638.
Testo completoThesis advisor(s): Tung X. Bui ; Roger Stemp. "September 1993." Bibliography: p. 75-78. Also available online.
Teoh, Soon Tee. "Interactive visualization techniques for computer network security /". For electronic version search Digital dissertations database. Restricted to UC campuses. Access is free to UC campus dissertations, 2004. http://uclibs.org/PID/11984.
Testo completoLázaro, Pablo García-Crovetto. "Forensic Computing from a Computer Security perspective". Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2421.
Testo completoThis work contains a brief study about Forensic Computing problems done from a Computer Security perspective.
Based on the description and investigation methods of Forensic Computing, a list of common difficulties that forensic examiners have to deal with has been created. After making an analysis about each difficulty in the Forensic Computing field, it can be said that the main reasons are related to the legal restrictions and an incorrect security management.
Using a Computer Security perspective for analysing why the incorrect security management generates problems in the forensic computing field, we have made a risk analysis of a possible distribution for a correct security management. Later, based on own results, a list on priorities in prevention methods in t he Forensic Computing field has been created.
Finally it can be said that the difficulties in the Forensic Computing field could be avoided by creating awareness among users about the importance of taking prevention methods for protecting data and consequently for decreasing the number of e-crimes.
Årnes, Andre. "Risk, Privacy, and Security in Computer Networks". Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1725.
Testo completoWith an increasingly digitally connected society comes complexity, uncertainty, and risk. Network monitoring, incident management, and digital forensics is of increasing importance with the escalation of cybercrime and other network supported serious crimes. New laws and regulations governing electronic communications, cybercrime, and data retention are being proposed, continuously requiring new methods and tools.
This thesis introduces a novel approach to real-time network risk assessment based on hidden Markov models to represent the likelihood of transitions between security states. The method measures risk as a composition of individual hosts, providing a precise, fine-grained model for assessing risk and providing decision support for incident response. The approach has been integrated with an existing framework for distributed, large-scale intrusion detection, and the results of the risk assessment are applied to prioritize the alerts produced by the intrusion detection sensors. Using this implementation, the approach is evaluated on both simulated and real-world data.
Network monitoring can encompass large networks and process enormous amounts of data, and the practice and its ubiquity can represent a great threat to the privacy and confidentiality of network users. Existing measures for anonymization and pseudonymization are analyzed with respect to the trade-off of performing meaningful data analysis while protecting the identities of the users. The results demonstrate that most existing solutions for pseudonymization are vulnerable to a range of attacks. As a solution, some remedies for strengthening the schemes are proposed, and a method for unlinkable transaction pseudonyms is considered.
Finally, a novel method for performing digital forensic reconstructions in a virtual security testbed is proposed. Based on a hypothesis of the security incident in question, the testbed is configured with the appropriate operating systems, services, and exploits. Attacks are formulated as event chains and replayed on the testbed. The effects of each event are analyzed in order to support or refute the hypothesis. The purpose of the approach is to facilitate reconstruction experiments in digital forensics. Two examples are given to demonstrate the approach; one overview example based on the Trojan defense and one detailed example of a multi-step attack. Although a reconstruction can neither prove a hypothesis with absolute certainty, nor exclude the correctness of other hypotheses, a standardized environment combined with event reconstruction and testing can lend credibility to an investigation and can be a valuable asset in court.
Bouffard, Marc. "A commercially viable computer security implementation framework". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ39963.pdf.
Testo completoWolfe, Alex Forrest. "Mental Models of Computer Security Among Adolescents". Kent State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=kent1619032044319319.
Testo completoWhitaker, Robert Bruce. "Applying Information Visualization to Computer Security Applications". DigitalCommons@USU, 2010. https://digitalcommons.usu.edu/etd/636.
Testo completoRamilli, Marco <1983>. "A Design Methodology for Computer Security Testing". Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amsdottorato.unibo.it/4438/4/Marco_Ramilli_Dissertation.pdf.
Testo completoRamilli, Marco <1983>. "A Design Methodology for Computer Security Testing". Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amsdottorato.unibo.it/4438/.
Testo completoDalwadi, Chintan. "Network and data security". Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/dalwadi.pdf.
Testo completoDesrosiers, Simon Pierre. "Quantum entropic security". Thesis, McGill University, 2009. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=95620.
Testo completoUne généralisation complète des notions de sécurité entropique et d'indistinguabilitéentropique, telles que définies par Russell et Wang puis par Dodis et Smith, aumonde quantique est présentée. Aucune autre hypothèse qu'une borne inférieure surl'incertitude de l'adversaire, incertitude quantifiée par la notion de min-entropie conditionellequantique telle que définie par Renner, n'est présumée. Ce modèle permettoute forme de corrélation ou d'intrication entre l'adversaire et l'émetteur du message.Une démonstration de l'équivalence entre ces deux notions de sécurité est présentéequi est beaucoup plus simple que ce qui était connue au-paravant. Cette nouvellesimplicité est une contribution notable. Deux chiffres sont aussi généralisés à ce nouveaumodèle de sécurité et leur sécurité est démontrée. La taille de la clef requise afind'assurer la sécurité de ces deux chiffres est exactement la même que celle requise parleur équivalent classique. Ces chiffres sont sécuritaires même en présence d'intricationentre l'adversaire et l'émetteur, ce qui est, autant que nous le sachions, une premièresans requérir une sécurité parfaite.
Deccio, Casey T. "Network-layer Selective Security". Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd560.pdf.
Testo completoGlisson, William Bradley. "The Web Engineering Security (WES) methodology". Thesis, University of Glasgow, 2008. http://theses.gla.ac.uk/186/.
Testo completoEl, Salamouny Ehab. "Probabilistic trust models in network security". Thesis, University of Southampton, 2011. https://eprints.soton.ac.uk/179163/.
Testo completoDonta, Praveen Kumar. "Performance Analysis of Security Protocols". UNF Digital Commons, 2007. http://digitalcommons.unf.edu/etd/172.
Testo completo