Teses / dissertações sobre o tema "Cyber defensive"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 44 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Cyber defensive".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.
Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.
Texto completo da fonteWong, Tiong Pern. "Active cyber defense: enhancing national cyber defense." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10713.
Texto completo da fonteStensboel, Karl Birger. "Norwegian cyber defense." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/39016.
Texto completo da fonteCloud, Donald W. "Integrated cyber defenses towards cyber defense doctrine." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FCloud.pdf.
Texto completo da fonteOdhner, Caroline. "Cyber Deterrence Based Upon Conventional Premises : A Discourse Analysis of the US Cyber Deterrence Policy." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10143.
Texto completo da fonteSushereba, Christen Elizabeth Lopez. "Comparison of Cyber Network Defense Visual Displays." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright15272019221867.
Texto completo da fonteMedvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45225.
Texto completo da fonteZhang, Ruide. "Hardware-Aided Privacy Protection and Cyber Defense for IoT." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98791.
Texto completo da fonteAzab, Mohamed Mahmoud Mahmoud. "Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19273.
Texto completo da fonteNsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Texto completo da fonteFlamholz, David B. "Baiting for defense against stealthy attacks on cyber-physical systems." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121858.
Texto completo da fonteDayanikli, Gokcen Yilmaz. "Electromagnetic Interference Attacks on Cyber-Physical Systems: Theory, Demonstration, and Defense." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/104862.
Texto completo da fonteKazinec, Darius. "Issues of cyber warfare in international law." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110705_132153-12860.
Texto completo da fonteSmith, Willarvis. "A Comprehensive Cybersecurity Defense Framework for Large Organizations." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1083.
Texto completo da fonteRubin, Willa. "Waging Wars in Cyberspace: How International Law On Aggression And Self-Defense Falls Short Of Addressing Cyber Warfare.Could Iran Legally Retaliate For The Stuxnet Attack?" Oberlin College Honors Theses / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=oberlin1462921585.
Texto completo da fonteПрокопець, Я. Ю., Михайло Олександрович Думчиков, Михаил Александрович Думчиков та Mykhailo Oleksandrovych Dumchykov. "Реалізація кібербезпеки та шляхи її вдосконалення в Україні". Thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/78670.
Texto completo da fonteLipke, Alexa. "U.S. and NATO Cyber Defense| Bridging the Resource Gap with a Centralized Market Structure." Thesis, The George Washington University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10189713.
Texto completo da fonteEldosouky, Mahmoud Salama Abdelrahman A. "Security of Critical Cyber-Physical Systems: Fundamentals and Optimization." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90281.
Texto completo da fonteBranlat, Matthieu. "Challenges to Adversarial Interplay Under High Uncertainty: Staged-World Study of a Cyber Security Event." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316462733.
Texto completo da fontePombo, Rodrigo. "Política europeia de segurança no ciberespaço." Master's thesis, Academia da Força Aérea, 2019. http://hdl.handle.net/10400.26/39771.
Texto completo da fonteStewart, Alexander. "The Community Defense Approach: A Human Approach to Cybersecurity for Industrial and Manufacturing Systems." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1562059795078067.
Texto completo da fonteЯровенко, Ганна Миколаївна, Анна Николаевна Яровенко, Hanna Mykolaivna Yarovenko та І. Д. Нечепоренко. "Сучасні технології кіберзахисту щодо виявлення шахрайств, що здійснюються персоналом банку". Thesis, Сумський державний університет, 2019. https://essuir.sumdu.edu.ua/handle/123456789/77725.
Texto completo da fonteKullander, Nathalia. "En analys kring det civila försvaret på lokal nivå. : En jämförande studie mellan Värmland och Örebros resurser och samarbetsförmågor." Thesis, Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-85130.
Texto completo da fonteKanerva, Anton, and Fredrik Helgesson. "On the Use of Model-Agnostic Interpretation Methods as Defense Against Adversarial Input Attacks on Tabular Data." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20085.
Texto completo da fontePetras, Christopher M. "The convergence of U.S. military and commercial space activities : self-defense and cyber-attack, "peaceful use" and the space station, and the need for legal reform." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33058.
Texto completo da fonteRobin, Jean-Nicolas. "La matière pénale à l'épreuve du numérique." Thesis, Rennes 1, 2017. http://www.theses.fr/2017REN1G035/document.
Texto completo da fonteКалетнік, В. В. "Сучасний стан адміністративно-правового забезпечення інформаційної безпеки в Україні: теоретико-правовий аналіз". Thesis, Національний авіаційний університет, 2021. https://er.nau.edu.ua/handle/NAU/53718.
Texto completo da fonteTsai, Chung-Weng, and 蔡仲威. "Increasing information security skills by using cyber offensive and defensive competitions." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/07725885062425976779.
Texto completo da fonte"A Hacker-Centric Perspective to Empower Cyber Defense." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.57382.
Texto completo da fonteHasan, Mahmudul. "Cybersecurity Planning Insight: CSCD (Cyber Security and Cyber Defense) Control: Framework For Strategic Direction and Governance." Master's thesis, 2021. http://hdl.handle.net/10362/126392.
Texto completo da fonte柯柏宇. "A Study of Virtual-Machine-Based Cyber Defense Exercises." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/7gghfu.
Texto completo da fonteRullo, Antonino, Andrea Pugliese, Domenico Saccà, and Sergio Greco. "Cyber defense of enterprise information systems: advanced isues and techniques." Thesis, 2014. http://hdl.handle.net/10955/1242.
Texto completo da fonte(10907916), Kelly Anne Cole. "Investigating Cyber Performance: An Individual Differences Study." Thesis, 2021.
Encontre o texto completo da fonteWU, KUAN-SHENG, and 吳冠陞. "Implementation of cyber attack and defense strategy in software defined network." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/m44bqg.
Texto completo da fonteCivins, Braden Eph. "In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by." Thesis, 2011. http://hdl.handle.net/2152/ETD-UT-2011-08-4199.
Texto completo da fonteChing-HuangLin and 林敬皇. "Framework Design for Cyber Attack and Defense Exercises with Empirical Cloud Data." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/58312539008444263933.
Texto completo da fonteLopes, Carvalho Viana André. "NATO and Offensive Cybersecurity: A Strategic Analysis." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-387165.
Texto completo da fonteTzy-ShiahWang and 王子夏. "Cyber-Attack Detection and Defense Based on Spectral Analysis and Community Structure Recognition." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/whhzsj.
Texto completo da fonteMolina, Valdiviezo Lorena Paulina, Felice Crupi, and Angelo Furfaro. "Simulation models for the evaluation of detection and defense protocols against cyber attacks." Thesis, 2016. http://hdl.handle.net/10955/1361.
Texto completo da fonte(8072417), Braiden M. Frantz. "CISTAR Cybersecurity Scorecard." Thesis, 2019.
Encontre o texto completo da fonteCHENG, YI-WEN, and 程詒文. "The Normative Framework of the State’s Right of Self-Defense as a Response to Cyber Attack." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/836597.
Texto completo da fonteHsu, Chin-Ping, and 許錦萍. "The Ideal and Reality of Cross-region Joint Defense Cyber Security Policy – A Case Study of A and B-level Government Agencies." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/pb32mv.
Texto completo da fonteYang, Shih-Feng, and 楊世豐. "Research on Application of Cyber Security in Taiwan''s Defense Industry- CSC v6 of SANS Organization as the Inspection Standard." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/455bq4.
Texto completo da fonte"The What, When, and How of Strategic Movement in Adversarial Settings: A Syncretic View of AI and Security." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.62910.
Texto completo da fonte