Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
43863 open access dissertations and theses found for:
if(Intrusion detection system)  »   Refine Search
1.
An Investigation of Anomaly-based Ensemble Models for Multi-domain Intrusion Detection
by Mikhail, Joseph W., D.Engr.  The George Washington University. 2019: 117 pages; 10977908.
2.
Diagnosis-based Intrusion Detection
by Jackson, Conner Patrick Stearns, M.S.  University of California, Davis. 2016: 97 pages; 10124452.
3.
A framework for cost-sensitive automated selection of intrusion response
by Strasburg, Christopher Roy, M.S.  Iowa State University. 2009: 76 pages; 1468160.
4.
Probabilistic Clustering Ensemble Evaluation for Intrusion Detection
by McElwee, Steven M., Ph.D.  Nova Southeastern University. 2018: 166 pages; 10844875.
5.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
6.
Cybersecurity testing and intrusion detection for cyber-physical power systems
by Pan, Shengyi, Ph.D.  Mississippi State University. 2014: 161 pages; 3665497.
7.
Enhanced adaptive acknowledgment intrusion detection for mobile ad-hoc network
by Benede Umapathy, Rakesh, M.S.  California State University, Long Beach. 2017: 49 pages; 10253596.
9.
A new distributed framework for cyber attack detection and classification
by Gutta, Sandeep, M.S.  Oklahoma State University. 2011: 86 pages; 1506488.
10.
Application of a Hidden Bayes Naïve Multiclass Classifier in Network Intrusion Detection
by Koc, Levent, Ph.D.  The George Washington University. 2013: 146 pages; 3546303.
11.
Mechanisms for database intrusion detection and response
by Kamra, Ashish, Ph.D.  Purdue University. 2010: 144 pages; 3444799.
12.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
14.
15.
Polymorphic attacks and network topology: Application of concepts from natural systems
by Rangan, Prahalad, Ph.D.  State University of New York at Albany. 2010: 102 pages; 3402465.
16.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
17.
On the feasibility of intrusion detection system in wireless sensor network
by Murarka, Kishore Ramkisan, M.S.  California State University, Long Beach. 2012: 86 pages; 1517746.
18.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
19.
A model of forensic analysis using goal-oriented logging
by Peisert, Sean Philip, Ph.D.  University of California, San Diego. 2007: 182 pages; 3246091.
20.
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
by LeDoux, Charles, Ph.D.  University of Louisiana at Lafayette. 2016: 179 pages; 10245924.
21.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
23.
Benchmarks for Evaluating Anomaly-Based Intrusion Detection Solutions
by Miller, Nicholas J., M.S.  California State University, Long Beach. 2018: 30 pages; 10752128.
24.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
25.
Water Quality and Quantity in Intermittent and Continuous Piped Water Supplies in Hubli-Dharwad, India
by Kumpel, Emily, Ph.D.  University of California, Berkeley. 2013: 108 pages; 3616477.
26.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
27.
Using cognitive radio as an intrusion detection for ZigBee networks
by Sarakbi, Lelass, M.S.  California State University, Long Beach. 2012: 84 pages; 1507781.
28.
An attack-resistant and rapid recovery desktop system
by Deshane, Todd, Ph.D.  Clarkson University. 2010: 149 pages; 3428987.
29.
Cyber Physical Security Analysis for Synchrophasor Applications
by Liu, Ren, Ph.D.  Washington State University. 2017: 148 pages; 10639030.
30.
1 - 30 of 43863 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest