MSU Libraries
Digital Repository
Home
About
Collections
Selected filters
Content Type: PDF
×
Copyright Status: In Copyright
×
Subject: Computer security
×
Collection
Sort
Alphabetically
By count
Electronic Theses & Dissertations
18
Material Type
Sort
Alphabetically
By count
Theses
18
Language
Sort
Alphabetically
By count
English
18
Subject
Sort
Alphabetically
By count
Anomaly detection (Computer security)
1
Classification
1
Cloud computing
1
Computer crimes--Prevention
1
Computer network architectures
1
Computer network protocols
1
Computer networks--Security measures
5
Computer science
2
Computer users
1
Computer viruses
1
Cooperating objects (Computer systems)
1
Copyright
1
Cryptography
1
Data encryption (Computer science)
1
Data protection
3
Database management
1
Decision making
1
Deep learning (Machine learning)
1
Digital watermarking
1
Electronic data processing departments--Security measures
1
Electronic data processing--Distributed processing
1
Electronic digital computers
1
Human-computer interaction
1
Intention
1
Internet--Security measures
2
Machine learning
1
Metadata
2
Neural networks (Computer science)
1
Psychology
1
Scheduled tribes in India--Psychology
1
Signal processing--Digital techniques--Mathematics
1
Technological innovations
1
Telecommunication systems--Security measures
1
United States
1
Wireless sensor networks
1
Year
TO
Apply
Search results
Showing 1 to 18 of 18 results
Results per page
20
50
100
Sort by
Most Relevant
Title (A-Z)
Title (Z-A)
Date (Newest)
Date (Oldest)
Most Recent
Least Relevant
Secure bit : buffer-overflow protection
Piromsopa, Krerk
Text (2006)
Part of
Electronic Theses & Dissertations
Secure biometric systems
Uludag, Umut
Text (2006)
Part of
Electronic Theses & Dissertations
Speech watermarking through parametric modeling
Gurijala, Aparna
Text (2007)
Part of
Electronic Theses & Dissertations
Customizable vulnerability analysis and classification
Holtsclaw, Brent Lee
Text (2008)
Part of
Electronic Theses & Dissertations
Canary Bit : extending Secure Bit for data pointer protection from buffer overflow attacks
Kirkpatrick, Michael S.
Text (2007)
Part of
Electronic Theses & Dissertations
Robustness of TEC speech watermarking to cropping and additive noise
Gurijala, Aparna
Text (2001)
Part of
Electronic Theses & Dissertations
Using developmental learning for network intrusion detection
Knoester, David B.
Text (2004)
Part of
Electronic Theses & Dissertations
The last line of defense : a host-based, kernel-level intrusion detection system
Westran, Timothy Robert
Text (2003)
Part of
Electronic Theses & Dissertations
A classification scheme for sandboxes
Prabakaran, Arun
Text (2005)
Part of
Electronic Theses & Dissertations
Trade-offs among data security, usability and complexity in mobile cloud computing
Zhou, Kai (Graduate of Michigan State University)
Text (2018)
Part of
Electronic Theses & Dissertations
Preserving source-location privacy in wireless sensor networks
Lightfoot, Leron J.
Text (2010)
Part of
Electronic Theses & Dissertations
Privacy preserving channel access using blindfolded packet transmissions
Banerjee, Debasmit
Text (2014)
Part of
Electronic Theses & Dissertations
Algorithms for deep packet inspection
Patel, Jignesh
Text (2012)
Part of
Electronic Theses & Dissertations
Intention based authorization dialog boxes
Santa, Marc
Text (2012)
Part of
Electronic Theses & Dissertations
Privacy and integrity preserving computation in distributed systems
Chen, Fei
Text (2011)
Part of
Electronic Theses & Dissertations
Robust learning of deep neural networks under data corruption
Liu, Boyang
Text (2022)
Part of
Electronic Theses & Dissertations
Resilient and safe control of cyber-physical systems under uncertainties and adversaries
Mustafa, Aquib
Text (2020)
Part of
Electronic Theses & Dissertations
Extracting ransomware's keys by utilizing memory forensics
Bajpai, Pranshu
Text (2020)
Part of
Electronic Theses & Dissertations
First
1
(current)
Last