Follow

Theses/Dissertations from 2016

PDF

A user driven cloud based multisystem malware detection system, Brian Steven Cain

PDF

Application of active device authentication mechanisms in the human-machine interface of SCADA networks, Matthew Jeffrey Schlue

PDF

On quantum computation capabilities in an information assurance context, Garrett Ridge Yord

Theses/Dissertations from 2015

PDF

3G UMTS man in the middle attacks and policy reform considerations, Jennifer Lynn Adesso

Theses/Dissertations from 2014

PDF

ADAPT: an anonymous, distributed, and active probing-based technique for detecting malicious fast-flux domains, Tsolmon Otgonbold

Theses/Dissertations from 2008

PDF

Intercept System to Edit, Control, and Analyze Packets (ISECAP), Grant Rogers Brinkmeyer

PDF

IseHarvest: TCP packet data re-assembler framework for network traffic content, Stephen Michael Eilers

PDF

Reference models for network trace anonymization, Shantanu Gattani

PDF

Cryptic Backup: a framework for automated compression, encryption, and backup of data, Christopher David Hoff

PDF

CONDENSER: A custom tool for capturing and summarizing network traffic for AVALANCHE and ISEAGE, Jason Charles Maughan

PDF

Visualization for network forensic analyses: extending the Forensic Log Investigator (FLI), Paul Michael Miller

PDF

A formal approach toward authenticated authorization without identification, Lucas D. Witt

Theses/Dissertations from 2007

PDF

Automation in digital photo management, Benjamin Arthur Brady

PDF

Restricting wireless network access within the classroom, Andrew Daniel Buschbom

PDF

The relative influence of information assurance mechanisms on content integrity in peer-to-peer networks: a field study, Steven Michael Collins

PDF

A novel approach to finding frequency patterns in noisy network traffic, Charles Anthony Hall

PDF

Security Integrated Messaging: a protocol for secure electronic mail, Andrew Todd Hoernecke

PDF

Customization and automation in the future of digital forensics: live OS forensics with FENIX (forensic examiner unix), Sean David Howard

PDF

DeepFreeze: a management interface for ISEAGE, Nathan Lyle Karstens

PDF

Detection of encrypted streams for egress monitoring, Paras Malhotra

PDF

Forensic Log Investigator (FLI): a log analysis and visualization tool, Thieu Van Tran Pham

PDF

An algebraic hash function based on SL2, Andrew Richard Regenscheid

PDF

The intrusion collector and emulator, Matthew Kyle Wilden

Theses/Dissertations from 2006

PDF

Online self reported information: Facebook, a hiring tool for businesses , Jason Decker

PDF

Investigation of magnetic and magnetoelastic properties of novel materials involving cobalt ferrite and terbium silicon germanium systems, Andrew Phillip Ring

PDF

Using the singular value decomposition for image steganography , Daniel Wengerhoff