Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
13986 open access dissertations and theses found for:
if(Intrusion detection)  »   Refine Search
1.
An Investigation of Anomaly-based Ensemble Models for Multi-domain Intrusion Detection
by Mikhail, Joseph W., D.Engr.  The George Washington University. 2019: 117 pages; 10977908.
2.
Probabilistic Clustering Ensemble Evaluation for Intrusion Detection
by McElwee, Steven M., Ph.D.  Nova Southeastern University. 2018: 166 pages; 10844875.
3.
A framework for cost-sensitive automated selection of intrusion response
by Strasburg, Christopher Roy, M.S.  Iowa State University. 2009: 76 pages; 1468160.
4.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
5.
Application of a Hidden Bayes Naïve Multiclass Classifier in Network Intrusion Detection
by Koc, Levent, Ph.D.  The George Washington University. 2013: 146 pages; 3546303.
7.
Enhanced adaptive acknowledgment intrusion detection for mobile ad-hoc network
by Benede Umapathy, Rakesh, M.S.  California State University, Long Beach. 2017: 49 pages; 10253596.
8.
Diagnosis-based Intrusion Detection
by Jackson, Conner Patrick Stearns, M.S.  University of California, Davis. 2016: 97 pages; 10124452.
9.
A new distributed framework for cyber attack detection and classification
by Gutta, Sandeep, M.S.  Oklahoma State University. 2011: 86 pages; 1506488.
10.
Mechanisms for database intrusion detection and response
by Kamra, Ashish, Ph.D.  Purdue University. 2010: 144 pages; 3444799.
11.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
13.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
15.
16.
Benchmarks for Evaluating Anomaly-Based Intrusion Detection Solutions
by Miller, Nicholas J., M.S.  California State University, Long Beach. 2018: 30 pages; 10752128.
17.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
18.
Polymorphic attacks and network topology: Application of concepts from natural systems
by Rangan, Prahalad, Ph.D.  State University of New York at Albany. 2010: 102 pages; 3402465.
19.
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
by LeDoux, Charles, Ph.D.  University of Louisiana at Lafayette. 2016: 179 pages; 10245924.
20.
On the feasibility of intrusion detection system in wireless sensor network
by Murarka, Kishore Ramkisan, M.S.  California State University, Long Beach. 2012: 86 pages; 1517746.
21.
Cybersecurity testing and intrusion detection for cyber-physical power systems
by Pan, Shengyi, Ph.D.  Mississippi State University. 2014: 161 pages; 3665497.
22.
A model of forensic analysis using goal-oriented logging
by Peisert, Sean Philip, Ph.D.  University of California, San Diego. 2007: 182 pages; 3246091.
23.
Network traffic analysis through statistical signal processing methods
by AsSadhan, Basil Abdullah, Ph.D.  Carnegie Mellon University. 2009: 104 pages; 3394005.
24.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
25.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
26.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
27.
Evaluation of the public health risks associated with former manufactured gas plants
by DeHate, Robin Brewer, Ph.D.  University of South Florida. 2008: 135 pages; 3376238.
29.
Water Quality and Quantity in Intermittent and Continuous Piped Water Supplies in Hubli-Dharwad, India
by Kumpel, Emily, Ph.D.  University of California, Berkeley. 2013: 108 pages; 3616477.
30.
Using cognitive radio as an intrusion detection for ZigBee networks
by Sarakbi, Lelass, M.S.  California State University, Long Beach. 2012: 84 pages; 1507781.
1 - 30 of 13986 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest