MSU Libraries
Digital Repository
Home
About
Collections
Selected facets
Content Type: PDF
×
Collection: Electronic Theses & Dissertations
×
Material Type: Theses
×
Subject: Computer security
×
Language
English
23
Copyright Status
Creative Commons Licensed
5
In Copyright
18
Subject
Agriculture--Data processing
1
Algorithms
1
Anomaly detection (Computer security)
1
Artificial intelligence
1
Biometric identification
1
Blockchains (Databases)
1
Classification
1
Cloud computing
1
Computer crimes--Prevention
2
Computer network architectures
1
Computer network protocols
1
Computer networks--Management
1
Computer networks--Security measures
6
Computer science
3
Computer users
1
Computer viruses
1
Cooperating objects (Computer systems)
1
Copyright
1
Cryptography
1
Data encryption (Computer science)
1
Data protection
3
Database management
1
Decision making
1
Deep learning (Machine learning)
1
Digital watermarking
1
Disinformation
1
Electronic data processing departments--Security measures
1
Electronic data processing--Distributed processing
1
Electronic digital computers
1
Fake news
1
Firewalls (Computer security)
1
Hashtags (Metadata)
1
Human face recognition (Computer science)
1
Human-computer interaction
1
Intention
1
Internet--Security measures
2
Machine learning
3
Metadata
2
Neural networks (Computer science)
1
Optical pattern recognition
1
Poultry industry--Technological innovations
1
Psychology
1
Scheduled tribes in India--Psychology
1
Signal processing--Digital techniques--Mathematics
1
Social media
1
Streaming technology (Telecommunications)
1
Technological innovations
2
Telecommunication
1
Telecommunication systems--Security measures
1
United States
1
Wireless sensor networks
1
Search results
Showing 1 to 20 of 23 results
Results per page
20
50
100
Sort by
Most Relevant
Title (A-Z)
Title (Z-A)
Date (Newest)
Date (Oldest)
Most Recent
Least Relevant
Robust learning of deep neural networks under data corruption
Liu, Boyang
Text (2022)
Part of
Electronic Theses & Dissertations
Iris recognition : enhancing security and improving performance
Sharma, Renu, 1987-
Text (2022)
Part of
Electronic Theses & Dissertations
Visioning the agriculture blockchain : the role and rise of blockchain in the commercial poultry industry
Fennell, Christopher (Graduate of Michigan State University)
Text (2022)
Part of
Electronic Theses & Dissertations
Extracting ransomware's keys by utilizing memory forensics
Bajpai, Pranshu
Text (2020)
Part of
Electronic Theses & Dissertations
Resilient and safe control of cyber-physical systems under uncertainties and adversaries
Mustafa, Aquib
Text (2020)
Part of
Electronic Theses & Dissertations
Speech watermarking through parametric modeling
Gurijala, Aparna
Text (2007)
Part of
Electronic Theses & Dissertations
Efficient and secure message passing for machine learning
Liu, Xiaorui
Text (2022)
Part of
Electronic Theses & Dissertations
Secure bit : buffer-overflow protection
Piromsopa, Krerk
Text (2006)
Part of
Electronic Theses & Dissertations
Canary Bit : extending Secure Bit for data pointer protection from buffer overflow attacks
Kirkpatrick, Michael S.
Text (2007)
Part of
Electronic Theses & Dissertations
The last line of defense : a host-based, kernel-level intrusion detection system
Westran, Timothy Robert
Text (2003)
Part of
Electronic Theses & Dissertations
Customizable vulnerability analysis and classification
Holtsclaw, Brent Lee
Text (2008)
Part of
Electronic Theses & Dissertations
Algorithms for deep packet inspection
Patel, Jignesh
Text (2012)
Part of
Electronic Theses & Dissertations
Trade-offs among data security, usability and complexity in mobile cloud computing
Zhou, Kai (Graduate of Michigan State University)
Text (2018)
Part of
Electronic Theses & Dissertations
Privacy and integrity preserving computation in distributed systems
Chen, Fei
Text (2011)
Part of
Electronic Theses & Dissertations
A classification scheme for sandboxes
Prabakaran, Arun
Text (2005)
Part of
Electronic Theses & Dissertations
Secure biometric systems
Uludag, Umut
Text (2006)
Part of
Electronic Theses & Dissertations
Using developmental learning for network intrusion detection
Knoester, David B.
Text (2004)
Part of
Electronic Theses & Dissertations
Robustness of TEC speech watermarking to cropping and additive noise
Gurijala, Aparna
Text (2001)
Part of
Electronic Theses & Dissertations
Learning algorithms for detecting disinformation on social media
VanDam, Courtland
Text (2019)
Part of
Electronic Theses & Dissertations
Preserving source-location privacy in wireless sensor networks
Lightfoot, Leron J.
Text (2010)
Part of
Electronic Theses & Dissertations
First
1
(current)
2
Last