Rozprawy doktorskie na temat „Hacking network”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 17 najlepszych rozpraw doktorskich naukowych na temat „Hacking network”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Schuhart, Russell G. "Hacking social networks examining the viability of using computer network attack against social networks". Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FSchuhart.pdf.
Pełny tekst źródłaThesis Advisor(s): David Tucker. "March 2007." Includes bibliographical references (p. 55-56). Also available in print.
Akkaya, Deniz, i Fabien Thalgott. "Honeypots in network security". Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6600.
Pełny tekst źródłaDay by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. However, while performingall these things, how many people know about security? Do they know the risk of beingattacked, infecting by malicious software? Even some of the malicious software arespreading over network to create more threats by users. How many users are aware of thattheir computer may be used as zombie computers to target other victim systems? Astechnology is growing rapidly, newer attacks are appearing. Security is a key point to getover all these problems. In this thesis, we will make a real life scenario, using honeypots.Honeypot is a well designed system that attracts hackers into it. By luring the hackerinto the system, it is possible to monitor the processes that are started and running on thesystem by hacker. In other words, honeypot is a trap machine which looks like a realsystem in order to attract the attacker. The aim of the honeypot is analyzing, understanding,watching and tracking hacker’s behaviours in order to create more secure systems.Honeypot is great way to improve network security administrators’ knowledge and learnhow to get information from a victim system using forensic tools. Honeypot is also veryuseful for future threats to keep track of new technology attacks.
Maloušek, Zdeněk. "Aplikace pro monitorování a kontrolu zabezpečení rozsáhlých počítačových sítí LAN a WAN". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217444.
Pełny tekst źródłaOlovson, Natali. "Hacking for the State? : The Use of Private Persons in Cyber Attacks and State Responsibility". Thesis, Försvarshögskolan, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10218.
Pełny tekst źródłaHaywood, Douglas. "The ethic of the code : values, networks and narrative among the civic hacking community". Thesis, Goldsmiths College (University of London), 2018. http://research.gold.ac.uk/23348/.
Pełny tekst źródłaMaggs, Catherine. "WikiLeaks and Communicative Counterpower". Thesis, The University of Sydney, 2015. http://hdl.handle.net/2123/13511.
Pełny tekst źródłaDostál, Otto. "Právní aspekty boje proti počítačové trestné činnosti". Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-433079.
Pełny tekst źródłaSilva, Luísa Carina Cabodeira Viana da. "Growth hacking e consumidores oportunistas: O impacto de rewards em programas de marketing referral". Master's thesis, 2020. http://hdl.handle.net/10362/94984.
Pełny tekst źródłaOs programas de marketing referral têm vindo a tornar-se numa ferramenta popular entre as empresas. Os seus benefícios são um tema polémico na literatura, uma vez que são programas propensos a atraírem utilizadores com um comportamento de compra oportunista. Como resultado disso, a entrega de recompensas despoleta uma corrida ao reward por parte de utilizadores com perfil oportunista. No presente estudo, propomos um modelo matemático baseado em agentes e suportado por 20.000 simulações, capaz de estudar o impacto desta população na disseminação do programa e na sua lucratividade. Mostrámos que os agentes interessados numa recolha oportunista do reward são responsáveis pelo sucesso do programa e pela sua disseminação. Este efeito ganha dimensão quando a disparidade monetária entre o custo do serviço e o valor do reward é maior. Por fim, concluímos que o aumento do número de convites, que os oportunistas realizam, despoleta uma intensificação dos resultados supra indicados.
Referral marketing programs have become a popular tool among businesses. Its benefits are a controversial topic in the literature, as they are programs likely to attract users with opportunistic buying behavior. As a result, reward distribution triggers a rush for rewards by users who have this opportunistic behavior. In the present study, we propose a mathematical model based on agents and supported by 20.000 simulations, capable of studying the impact of this population on the dissemination of the program and its profitability. We have shown that agents interested in an opportunistic reward collection are responsible for the success of the program and its dissemination. This effect gains dimension when the monetary disparity between the cost of the service and the reward value is greater. Finally, we conclude that the increase in the number of invitations that opportunists make triggers the intensification of the above results.
Soares, João Pedro dos Santos. "Implementation of a distributed intrusion detection and reaction system". Master's thesis, 2016. http://hdl.handle.net/10316/99196.
Pełny tekst źródłaSecurity was not always an important aspect in terms of networking and hosts. Nowadays, it is absolutely mandatory. Security measures must make an e ort to evolve at the same rate, or even at a higher rate, than threats, which is proving to be the most di cult of tasks. In this report we will detail the process of the implementation of a real distributed intrusion detection and reaction system, that will be responsible for securing a core set of networks already in production, comprising of thousands of servers, users and their respective con dential information.
"A Hacker-Centric Perspective to Empower Cyber Defense". Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.57382.
Pełny tekst źródłaDissertation/Thesis
Doctoral Dissertation Computer Science 2020
Gregor, Filip. "Ukradeno 77 milionů účtů služby PlayStation Network, týká se nás to?: analýza internetových diskuzí pod články týkajícími se tématu". Master's thesis, 2013. http://www.nusl.cz/ntk/nusl-321518.
Pełny tekst źródłaBhati, Bhawani Shanker. "Design of Privacy Protection Schemes for Mobile Adhoc Networks using Rough Set Theory". Thesis, 2018. https://etd.iisc.ac.in/handle/2005/5264.
Pełny tekst źródłaJansen, van Rensburg Shandre Kim. "The human in information security : an analysis of social engineering attacks in the greater Tshwane area of Gauteng, South Africa". Thesis, 2017. http://hdl.handle.net/10500/22646.
Pełny tekst źródłaMaat, Sandra Mariana. "Cyber crime: a comparative law analysis". Diss., 2004. http://hdl.handle.net/10500/2056.
Pełny tekst źródłaJurisprudence
L. L. M.
Van, Rensburg Kim Shandre Jansen. "The human element in information security : an analysis of social engineering attacks in the greater Tshwane area of Gauteng, South Africa". Thesis, 2017. http://hdl.handle.net/10500/22681.
Pełny tekst źródłaNjotini, Mzukisi Niven. "E-crimes and e-authentication - a legal perspective". Thesis, 2016. http://hdl.handle.net/10500/21720.
Pełny tekst źródłaJurisprudence
LL. D.
Perlman, Leon Joseph. "Legal and regulatory aspects of mobile financial services". Thesis, 2012. http://hdl.handle.net/10500/13362.
Pełny tekst źródłaPublic, Constitutional and International Law
LLD