Дисертації з теми "Improving Defence and Security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Improving Defence and Security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Opasinov, Aleksandar, and Sina Eftekhari. "Improving the Cyber defence of an organisation based on IP Geolocation and security appliances." Thesis, Högskolan Väst, Avdelningen för Matematik, Data- och Lantmäteriteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-16149.
Повний текст джерелаDå stora framsteg och användning av datakommunikation har ökat exponentiellt på en global skala, med en förödande exponering av attacker och säkerhetshot mot hemanvändare såväl som stora företag, finns detalltid ett behov av förbättrad nätverksskydd. IT-avdelningen hos företaget OneDefence, valdes för att utföra examensprojektet och baserade sig på organisationens angivna information för att förbättra deras nätverksförsvar. Syftet med denna rapport är att sammanställa en lista på tio länder som utgör de allvarligaste IT-hoten i världen, samt begränsa attackytan för organisationens nätverk så mycket som möjligt medan man behåller alla nödvändiga tjänster till användare utomlands. Efter att ha undersökt länderna, anordnades en prototyp för att efterlikna delar av OneDefences topologi av intresse och testattacker utfördes enligt metodologikapitlet. Resultaten av utredningarna visade att från de länder som utfört de allra allvarliga cyberhoten inkluderade bland annat Kina, Ryssland och Nordkorea, som har beräknats statistiskt baserat på antalet igenkända cyberwarfare attacker. Resultaten från de olika DoS-attackerna visade att en IPS bör vara kärnan i en organisations nätverksförsvar för att kunna bekämpa dessa intrång, samt potentiellt andra typer. Med hjälp av den prototyp som byggdes baserad på organisationens topologi, blockerades flera attacker rätt framgångsrikt, med en låg procentandel av paketen som gick genom säkerhetsenheten. Slutligen utforskades ytterligare förbättringar av försvarsförmågan hos organisationen genom att jämföra olika produkter och enheter. Detta resulterade i produkter från Fortinet-varumärket såsom FortiGate NGFW med UTM förmåga, då de erbjuder flera fördelar jämfört med konkurrenter.
Wu, Xuan. "Improving Electric Grid Security: Defense Planning and Security Constrained ACOPF via Robust Optimization." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1543563463428344.
Повний текст джерелаCaudle, Sharon L. "Homeland security and capabilities-based planning : improving national preparedness." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FCaudle.pdf.
Повний текст джерелаThesis Advisor(s): C.J. LaCivita, Kathryn E. Newcomer. Includes bibliographical references (p. 87-94). Also available online.
Morrell, Christopher Frank. "Improving the Security, Privacy, and Anonymity of a Client-Server Network through the Application of a Moving Target Defense." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/79791.
Повний текст джерелаPh. D.
Navas, Renzo Efraín. "Improving the resilience of the constrained Internet of Things : a moving target defense approach." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0217.
Повний текст джерелаInternet of Things (IoT) systems are increasingly being deployed in the real world, but their security lags behind the state of the art of non-IoT systems. Moving Target Defense (MTD) is a cyberdefense paradigm that proposes to randomize components of systems, with the intention of thwarting cyberattacks that previously relied in the static nature of systems. Attackers are now constrained by time. MTD has been successfully implemented in conventional systems, but its use to improve IoT security is still lacking in the literature. Over the course of this thesis, we validated MTD as a cybersecurity paradigm suitable for IoT systems. We identified and synthesized existing MTD techniques for IoT using a systematic literature review method,and defined and used four novel entropy related metrics to measure MTD techniques qualitative properties. Secondly, we proposed a generic distributed MTD framework that allows the instantiation of concrete MTD strategies suitable for the constraints of the IoT. Finally, we designed an secure time synchronization protocol, and instantiated three particular MTD techniques: two at the upper network layers (e.g. port-hopping, and application RESTful interfaces) -and validated one of them in real hardware-, and the third one at the physical layer to achieve IoT systems resilient to insider attacks/jamming by using Direct Sequence Spread-Spectrum techniques with cryptographically-strong pseudo-random sequences
Pohrebniak. "IMPROVING COMPUTER SECURITY." Thesis, Київ 2018, 2018. http://er.nau.edu.ua/handle/NAU/33885.
Повний текст джерелаYoung, Christopher J. "The European security and defence identity debate." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ56151.pdf.
Повний текст джерелаFrey, Stefanie. "Swiss defence and security policy 1945-73." Thesis, King's College London (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268809.
Повний текст джерелаBellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.
Повний текст джерелаWing, Ian Politics Australian Defence Force Academy UNSW. "Australian Defence in transition: responding to new security challenges." Awarded by:University of New South Wales - Australian Defence Force Academy. School of Politics, 2002. http://handle.unsw.edu.au/1959.4/38662.
Повний текст джерелаGhorbanian, Sara, and Glenn Fryklund. "Improving DLP system security." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5453.
Повний текст джерелаMüller-Wille, Björn Wilhelm. "Thinking security in europe? is there a European security and defence identity? /." [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=970705735.
Повний текст джерелаKeogh, Darrin M. "European security and defence policy reform : a theoretical challenge." Thesis, London Metropolitan University, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.507077.
Повний текст джерелаHussain, S. Y. "Application of quantum magnetometers to security and defence screening." Thesis, University College London (University of London), 2018. http://discovery.ucl.ac.uk/10047132/.
Повний текст джерелаMuniz, Manuel. "Explaining security and defence integration : the case of Europe." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:ae151580-c6d1-43ae-857d-9a3c2ab1b597.
Повний текст джерелаMella, Luca. "Ict security: Testing methodology for targeted attack defence tools." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.
Повний текст джерелаIvanovski, Hristijan. "A common defence for Europe." Israel Defence, 2015. http://hdl.handle.net/1993/31255.
Повний текст джерелаMay 2016
Dyson, Philip Thomas Adrian. "The politics of German defence policy : policy leadership, Bundeswehr reform and European defence and security policy." Thesis, London School of Economics and Political Science (University of London), 2005. http://etheses.lse.ac.uk/1778/.
Повний текст джерелаPenttila, Risto E. J. "Finland's search for security through defence : defence policy in the stabilisation of Finland's international position 1944-1967." Thesis, University of Oxford, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.293486.
Повний текст джерелаStamate, Gheorghe. "European Security and Defence Policy, or Back to Political Realism?" Thesis, Linköping University, Department of Management and Economics, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2514.
Повний текст джерелаIn the course of this master thesis I will argue the following:
a) ESDP project is an interesting initiative and concern issues that stand at the core of the EU integration processes. It relates to the most significant and updated development of the EU institutional, conceptual and strategic design, but is yet relatively unexplored and underdeveloped.
b) The aim of this study is to evaluate the efforts to enhance cooperation among European countries in the provision and use of military force. To set the scene and illustrate constrains and complications that bear upon activities in this field. Indeed, the author intends to recommend a theoretical framework, as a fundamental prerequisite for the proper study of EU Defense and Security Policy.
c) Constructivism and neo- Realism and their theoretical tenets offer an unexplored avenue to investigate and account for the development of the European Security and Defense Policy.
d) The efficiency of such an account depends on a meticulous evaluation of proposed theoretical approaches versus the emerging security complex. This theoretical choice allows for a construction beyond that of the unit or system levels of analysis and may therefore grant a causal role to perceived interests in terms of non- traditional approach to research in social science. Also it may thereby provoke an interest in terms of security and threat.
e) The originality and validity of a combination between Realism and Constructivism as a starting point for inquiries in IR may not only be relevant to an understanding of how such a development can unfold, but mostly how a real social phenomena can be unfolded by such a non-traditional theoretical approach.
Shetler-Jones, Philip. "The Globalisation of Japan's Defence and Security Policies 1989-2009." Thesis, University of Sheffield, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.527056.
Повний текст джерелаKendric, Hood A. "Improving Cryptocurrency Blockchain Security and Availability Adaptive Security and Partitioning." Kent State University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=kent1595038779436782.
Повний текст джерелаPersson, Jesper. "Improving smartphone security with remote attestation." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138429.
Повний текст джерелаKauer, Bernhard. "Improving System Security Through TCB Reduction." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-162177.
Повний текст джерелаHwang, JeeHyun. "Improving the Quality of Security Policies." Thesis, North Carolina State University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3584006.
Повний текст джерелаSystems such as web applications, database systems, and cloud services regulate users’ access control to sensitive resources based on security policies. Organizations often manage security policies in an ad-hoc and inconsistent manner due to a lack of budget, resources, and staff. This management could cause crucial security problems such as unauthorized access to sensitive resources.
A security policy is a set of restrictions and properties that specify how a computing system prevents information and computing resources from being used in violation of an organization’s security laws, rules, and practices. In computer systems, security policies are enforced to ensure correct functioning of access control such as “who” (e.g., authorized users or processes) can perform actions under “what” conditions.
Policy authors may follow common patterns in specifying and maintaining security policies. Researchers applied data mining techniques for deriving (implicit) patterns such as a group of users (i.e., roles in RBAC policies) who have the same access permissions. Policy authors reuse common patterns to reduce mistakes. Anomalies of those patterns are candidates for inspection to determine whether these anomalies expose faults.
Faults (i.e., misconfigurations) in security policies could result in tragic consequences, such as disallowing an authorized user to access her/his resources and allowing malicious users to access critical resources. Therefore, to improve the quality of security policies in terms of policy correctness, policy authors must conduct rigorous testing and verification during testing and maintenance phases of software development process. However, manual test-input generation and verification is an error-prone, time-consuming, and tedious task.
In this dissertation, we propose approaches that help improve the quality of security policies automatically. Our research goal is to help policy authors through automated pattern mining and testing techniques in the efficient detection and removal of faults. This dissertation is comprised of three research projects where each project focuses on a specific software engineering task. The three research projects are as follows:
Pattern Mining. We present an approach to mine patterns from security policies used in open source software products. Our approach applies data mining techniques on policy evolution and specification data of those security policies to identify common patterns, which represent usage of security policies. Our approach uses mined patterns as policy specification rules and detect faults in security policies under analysis as deviations from the mined patterns.
Automated Test Generation. We present a systematic structural testing approach for security policies. Our approach is based on the concept of policy coverage, which helps test a policy’s structural entities (i.e., rules, predicates, and clauses) to check whether each entity is specified correctly. Our approach analyzes security policies under test and generates test cases automatically to achieve high structural coverage. These test cases can achieve high fault-detection capability (i.e., detecting faults).
Automated Test Selection for Regression Testing. We present a safe-test-selection approach for regression testing of security policies. Among given initial test cases in access control systems under test, our approach selects and executes only test cases that could expose different policy behaviors across multiple versions of security policies. Our approach helps detect unexpected policy behaviors (i.e., regression faults) caused by policy changes efficiently.
These three research project have resulted in the following contributions:
• Patterns characterizing correlations of attributes in security policies help detect faults.
• Structural coverage for security policies is closely related to fault-detection capability. An original set of test cases with higher structural coverage often achieves higher fault-detection capability. Furthermore, its reduced set of test cases while maintaining the same structural coverage achieves similar fault-detection capability with the original set.
• Substantial number of test cases for regression testing can be reduced to help improve performance.
Kong, Jingfei. "ARCHITECTURAL SUPPORT FOR IMPROVING COMPUTER SECURITY." Doctoral diss., University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2610.
Повний текст джерелаPh.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Science PhD
Jones, Benjamin Edward. "Improving security in the FDDI protocol." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23700.
Повний текст джерелаKulkarni, Rucha. "Mitigating Security Issues While Improving Usability." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin153907988305034.
Повний текст джерелаScannell, David Luke. "Legal aspects of the European Union's European Security and Defence Policy." Thesis, University of Cambridge, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.614899.
Повний текст джерелаBorysenkov, Dmytro, and Serhii Rozhok. "Features of national cyber defence." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/50755.
Повний текст джерелаBecause of Russia’s actions in April 2014, the Ukraine decided to make a step from historic alignment with Russia to find itself in NATO membership. On September 20, 2018 Ukraine’s president Petro Poroshenko said “We need to amend our constitution to make NATO membership a long-term goal” [1]. These words played an irreversible role of transformation our country toward European and Euro-Atlantic course integration. And one of the main goals was to transform consciousness of Ukrainian people to convince them that Ukraine is not a part of Russian Federation. The importance of this message made by Ukrainian law was directly counter to Putin’s influence operations attempting to convince the entire world that Ukrainians were ethnically Russians.
Через дії Росії у квітні 2014 року Україна вирішила зробити крок від історичного приєднання до Росії, щоб опинитися в членстві в НАТО. 20 вересня 2018 р. Президент України Петро Порошенко заявив: "Нам потрібно внести зміни в нашу Конституцію, щоб зробити членство в НАТО довгостроковою метою" [1]. Ці слова зіграли незворотну роль в трансформації нашої країни в бік європейської та євроатлантичної інтеграції курсів. І однією з головних цілей було перетворення свідомості українського народу, щоб переконати його в тому, що Україна не є частиною Російської Федерації. Важливість цього повідомлення, поданого українським законодавством, прямо суперечила операціям впливу Путіна, які намагалися переконати весь світ у тому, що українці є етнічно росіянами.
Wei, Jinpeng. "Improving operating systems security two case studies /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31849.
Повний текст джерелаCommittee Chair: Pu, Calton; Committee Member: Ahamad, Mustaque; Committee Member: Blough, Douglas; Committee Member: Giffin, Jonathon; Committee Member: Li, Kang. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Aliti, Admirim, and Deniz Akkaya. "Employees' Role in Improving Information Systems Security." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13769.
Повний текст джерелаKarger, Paul Ashley. "Improving security and performance for capability systems." Thesis, University of Cambridge, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.293032.
Повний текст джерелаKylmänen, J. (Juha). "Information security improving blocklist driven firewall implementation." Master's thesis, University of Oulu, 2013. http://urn.fi/URN:NBN:fi:oulu-201312021940.
Повний текст джерелаInternetistä on tullut yleishyödyke ja sitä myötä on ilmaantunut tietoturvaan ja yksityisyyteen liittyviä ongelmia. Eräitä uhkia käyttäjiä kohtaan ovat haittaohjelmat ja khalastelu. Khalastelu on urkintaa, jossa matkitaan toista palvelua, kuten pankkia, ja jonka tavoitteena on saada käyttäjä luovuttamaan henkilökohtaista tietoa. Haittaohjelmat ovat puolestaan ohjelmistoja, joilla on haitallinen tarkoitus. Internet-palomuuri on olennainen osa modernia tietoverkkoa ja se toteuttaa politiikan, jolla voidaan estää yhteys tietoverkon tietokoneisiin. Tämä työ kuvaa ja toteuttaa Defensia-nimisen henkilökohtaisen palomuurin. Se toteuttaa perinteiset palomuuriominaisuudet, mutta parantaa myös tietoturvaa käyttämällä IP-estolistauksia ja tukemalla organisaatioihin, maan nimeen ja ohjelmiin pohjautuvaa kulunvalvontaa. Paketin käsittelyn havaittiin olevan riittävän nopea henkilökohtaiseen käyttöön. Mitattu viive paketin käsittelyssä oli 0,490 millisekuntia ja se koskee yhteyden ensimmäistä pakettia, koska yhteyden tilan seurantaa hyödynnetään. Organisaation estoa havainnollistettiin tutkimuksessa, jossa Facebook, Inc. laitettiin estolistalle ja IP-pohjaista estolistausta havainnollistettiin estämällä Nordean verkkopankista löytyvän seurantakoodin toiminta. Kolmannen osapuolen estolistauksia Abuse.ch:lta ja Wizcrafts Computer Serviceltä käytettiin havainnollistamaan, kuinka Defensia hyötyy ulkopuolisista resursseista. Abuse.ch:n Zeus-estolistausta käytettiin estämään verkkoyhteys Zeus-troijalaisen komentopalvelimeen ja toisessa tutkimuksessa Wizcrafts Computer Servicen estolistausta hyödynnettiin havainnollistamaan, kuinka pääsy kalastelusivustolle voidaan estää Defensialla. Lisäksi ohjelmiin pohjautuvalla kulunvalvonnalla havainnollistettiin, kuinka Defensia voi ennakoivasti estää tuntemattomien ohjelmien pääsyn verkkoon. Defensia havainnollisti onnistuneesti osuutensa tietoturvan ja yksityisyyden parantamiseen
Carey-Smith, Mark T. "Improving information security management in nonprofit organisations." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/45717/1/Mark_Carey-Smith_Thesis.pdf.
Повний текст джерелаDoherty, Roisin. "Passivity v engagement? : the impact of an emerging European security architecture on Irish neutrality." Thesis, University of Ulster, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.314032.
Повний текст джерелаHuff, Ariella Rachel. "Parliamentary discourses on the European security and defence policy in Britain, Ireland and Poland, 1998-2008." Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610552.
Повний текст джерелаGray, Gavan Patrick. "Japanese defence production, national security and alliance relations in the 21st century." Thesis, University of Leicester, 2014. http://hdl.handle.net/2381/29244.
Повний текст джерелаReyzin, Leonid (Leonid Natanovich) 1975. "Improving the exact security of digital signature schemes." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80564.
Повний текст джерелаHemberger, Paul Wang. "Improving information flow control design with security contexts." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/100598.
Повний текст джерелаThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 83-85).
This thesis outlines a new language feature for Ruby: the security context, which enables complex information flow control schemes to be written in Ruby without modification to the virtual machine. Security contexts are Ruby objects that act as transparent proxies and can be attached to other objects, allowing them to seamlessly modify parameters and return values into and out of those objects' methods. Security contexts are demonstrated to be simple and effective in creating two flow control applications that would otherwise pose significant challenge to build: taint tracking as a Ruby library, and data flow assertions for Ruby on Rails applications. The performance of these systems was benchmarked while running as a part of a Rails application, and reached acceptable performance: taint tracking had no impact on performance, and data flow assertions saw a 50% throughput decrease, while providing considerable protection against privacy leaks and security vulnerabilities.
by Paul Wang Hemberger.
M. Eng.
Yip, Alexander Siumann 1979. "Improving web site security with data flow management." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/54647.
Повний текст джерелаCataloged from PDF version of thesis.
Includes bibliographical references (p. 91-98).
This dissertation describes two systems, RESIN and BFLow, whose goal is to help Web developers build more secure Web sites. RESIN and BFLOW use data flow management to help reduce the security risks of using buggy or malicious code. RESIN provides programmers with language-level mechanisms to track and manage the flow of data within the server. These mechanisms make it easy for programmers to catch server-side data flow bugs that result in security vulnerabilities, and prevent these bugs from being exploited. BFLow is a system that adds information flow control, a restrictive form of data flow management, both to the Web browser and to the interface between a browser and a server. BFLOW makes it possible for a Web site to combine confidential data with untrusted JavaScript in its Web pages, without risking leaks of that data. This work makes a number of contributions. RESIN introduces the idea of a data flow assertion and demonstrates how to build them using three language-level mechanisms, policy objects, data tracking, and filter objects. We built prototype implementations of RESIN in both the PHP and Python runtimes. We adapt seven real off-the-shelf applications and implement 11 different security policies in RESIN which thwart at least 27 real security vulnerabilities. BFLow introduces an information flow control model that fits the JavaScript communication mechanisms, and a system that maps that model to JavaScript's existing isolation system.
(cont.) Together, these techniques allow untrusted JavaScript to read, compute with, and display confidential data without the risk of leaking that data, yet requires only minor changes to existing software. We built a prototype of the BFLow system and three different applications including a social networking application, a novel shared-data Web platform, and BFlogger, a third-party JavaScript platform similar to that of Blogger.com. We ported several untrusted JavaScript extensions from Blogger.com to BFlogger, and show that the extensions cannot leak data as they can in Blogger.com.
by Alexander Siumann Yip.
Ph.D.
Ashenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.
Повний текст джерелаKarlsson, Marcus, and Oscar Zaja. "Improving Security In Embedded Systems With IEEE 802.1X." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-53322.
Повний текст джерелаGiannini, Martina. "Improving Cyber-Security of Power System State Estimators." Thesis, KTH, Reglerteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142843.
Повний текст джерелаWei, Wei. "Improving Security and Privacy in Online Social Networks." W&M ScholarWorks, 2013. https://scholarworks.wm.edu/etd/1539623628.
Повний текст джерелаEmerson, Kaye M. "Defence procurement in the United Kingdom which way will it go? /." Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA243126.
Повний текст джерелаThesis Advisor(s): Laurance, E. J. Second Reader: Breemer, J. S. "December 1990." Description based on title screen as viewed on March 30, 2010. DTIC Identifier(s): Westland Case Study, NATO Frigate Replacement-90 Case Study, European Fighter Aircraft Case Study. Author(s) subject terms: Defense Procurement, Westland Helicopter, NATO Frigate, European Fighter Aircraft. Includes bibliographical references. Also available in print.
Moholt, van Reeuwijk Yvonne. "Enhancing the European security and defence policy : European integration and the changing of the Norwegian and the Swedish security identities." Thesis, Uppsala universitet, Teologiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-359694.
Повний текст джерелаNoetzel, Timo. "Making strategy : German defence and security policy in the post-Cold War period." Thesis, University of Oxford, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.433281.
Повний текст джерелаTorun, Zerrin. "Constructivist approach to Europeanization under the European foreign, security and defence policy framework." Thesis, University of Sussex, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.499564.
Повний текст джерелаLadzik, Jeannette. "Britain, Germany and the European Security and Defence Policy : constructivist socialisation at work?" Thesis, London Metropolitan University, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.590147.
Повний текст джерела