Naval Postgraduate School
Dudley Knox Library
NPS Dudley Knox Library
Search 
  •   Calhoun Home
  • Theses and Dissertations
  • 1. Thesis and Dissertation Collection, all items
  • Search
  •   Calhoun Home
  • Theses and Dissertations
  • 1. Thesis and Dissertation Collection, all items
  • Search
  • How to search in Calhoun
  • My Accounts
  • Ask a Librarian
JavaScript is disabled for your browser. Some features of this site may not work without it.

Browse

All of CalhounCollectionsThis Collection

My Account

LoginRegister

Statistics

Most Popular ItemsStatistics by CountryMost Popular Authors

1. Thesis and Dissertation Collection, all items

  • Advisor

  • Author

  • Branch Of Service

  • Date Issued

  • Degree

  • Department

  • Type

  • Advisor

    • Huntley, Wade (3)
    • Rowe, Neil C. (3)
    • Beverly, Robert (2)
    • Davis, Duane (2)
    • Anderson, Thomas (1)
    • Dinolt, George (1)
    • Fulp, J.D. (1)
    • Gallup, Shelley (1)
    • Plonka, David (1)
    • Shaffer, Alan (1)
    • View More »
  • Author

    • Aybar, Luis E. (1)
    • Carrillo, Camilo (1)
    • Catudal, Joseph W. (1)
    • Dougherty, Kevin R. (1)
    • Gaston, Eric W. (1)
    • Goldberg, Raymond M. (1)
    • Hall, Carissa G. (1)
    • McCaughey, Ryan J. (1)
    • Pantin, Nicholas T. (1)
  • Branch Of Service

    • Lieutenant, United States Navy (4)
    • Second Lieutenant, United States Army (2)
    • Captain, United States Army (1)
    • Information Systems Technician First Class, United States Navy (1)
    • Major, United States Army (1)
  • Date Issued

    • 2017 (9)
  • Degree

    • Masters (9)
  • Department

    • Cyber Systems and Operations (8)
    • Cyber Acadamic Group (CAG) (4)
    • Information Sciences (IS) (3)
    • Acoustics Academic Group (1)
    • Applied Cyber Operations (1)
    • Cyber Academic Group (1)
    • View More »
  • Type

    • Thesis (9)
    • View More »

Filters:

 

Filters

Use filters to refine the search results.

Now showing items 1-9 of 9

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Added Date Asc
  • Added Date Desc
  • Handle Asc
  • Handle Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Added Date Asc
  • Added Date Desc
  • Handle Asc
  • Handle Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Time sensitivity in cyberweapon reusability 

Hall, Carissa G. (Monterey, California: Naval Postgraduate School, 2017-12)
A cyberweapon is weaponized software code that exploits flaws in software. It is only effective if the flaw still exists at the time of weapon deployment. Because of this, there is only a small window of time in which a ...
Thumbnail

Deterring cyberattacks on U.S. critical infrastructure 

Carrillo, Camilo (Monterey, California: Naval Postgraduate School, 2017-12)
Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. ...
Thumbnail

Deception using an SSH honeypot 

McCaughey, Ryan J. (Monterey, California: Naval Postgraduate School, 2017-09)
The number of devices vulnerable to unauthorized cyber access has been increasing at an alarming rate. A honeypot can deceive attackers trying to gain unauthorized access to a system; studying their interactions with ...
Thumbnail

Testing the forensic interestingness of image files based on size and type 

Goldberg, Raymond M. (Monterey, California: Naval Postgraduate School, 2017-09)
In this thesis, we investigate the relationship between the size and type of a file and its forensic usefulness. We investigate GIF, MP3, MP4, PNG, and JPEG files found in a large collection called the Real Drive Corpus, ...
Thumbnail

Developing simulated cyber attack scenarios against virtualized adversary networks 

Aybar, Luis E. (Monterey, California: Naval Postgraduate School, 2017-03)
Cyberspace is now recognized as a critical center of gravity for modern military forces. The ability to maintain operational networks, while degrading the enemy's network capability, is a key consideration for military ...
Thumbnail

Identification of low-latency obfuscated traffic using multi-attribute analysis 

Dougherty, Kevin R. (Monterey, California: Naval Postgraduate School, 2017-03)
There is no process or system capable of detecting obfuscated network traffic on Department of Defense (DOD) networks, and the quantity of obfuscated traffic on DOD networks is unknown. The presence of this traffic on a ...
Thumbnail

High-frequency mapping of the IPv6 Internet using Yarrp 

Gaston, Eric W. (Monterey, California: Naval Postgraduate School, 2017-03)
Both the number of hosts using Internet Protocol version 6 (IPv6), and the volume of IPv6 traffic, has increased exponentially since 2012.With this adoption, the IPv6 routed infrastructure becomes an increasingly important ...
Thumbnail

Blind data attack on BGP routers 

Catudal, Joseph W. (Monterey, California: Naval Postgraduate School, 2017-03)
Transport Communication Protocol (TCP) implementations may not properly implement blind attack protection, leaving long-standing connections, such as Border Gateway Protocol (BGP) sessions, vulnerable to exploitation. This ...
Thumbnail

Key terrain: application to the layers of cyberspace 

Pantin, Nicholas T. (Monterey, California: Naval Postgraduate School, 2017-03)
The concept of key terrain is a common fixture in military strategy and tactics. The emergence of cyberspace, with characteristics unseen in any warfighting domain, challenge the concept's value. This work is a conceptual ...

Refine By:

Advisor

  • Huntley, Wade (3)
  • Rowe, Neil C. (3)
  • Beverly, Robert (2)
  • Davis, Duane (2)
  • Anderson, Thomas (1)
  • Dinolt, George (1)
  • Fulp, J.D. (1)
  • Gallup, Shelley (1)
  • Plonka, David (1)
  • Shaffer, Alan (1)
  • View More »

Author

  • Aybar, Luis E. (1)
  • Carrillo, Camilo (1)
  • Catudal, Joseph W. (1)
  • Dougherty, Kevin R. (1)
  • Gaston, Eric W. (1)
  • Goldberg, Raymond M. (1)
  • Hall, Carissa G. (1)
  • McCaughey, Ryan J. (1)
  • Pantin, Nicholas T. (1)

Branch Of Service

  • Lieutenant, United States Navy (4)
  • Second Lieutenant, United States Army (2)
  • Captain, United States Army (1)
  • Information Systems Technician First Class, United States Navy (1)
  • Major, United States Army (1)

Date Issued

  • 2017 (9)

Degree

  • Masters (9)

Department

  • Cyber Systems and Operations (8)
  • Cyber Acadamic Group (CAG) (4)
  • Information Sciences (IS) (3)
  • Acoustics Academic Group (1)
  • Applied Cyber Operations (1)
  • Cyber Academic Group (1)
  • View More »

Type

  • Thesis (9)
  • View More »
NPS Dudley Knox LibraryDUDLEY KNOX LIBRARY
Feedback

411 Dyer Rd. Bldg. 339
Monterey, CA 93943
circdesk@nps.edu
(831) 656-2947
DSN 756-2947

    Federal Depository Library      


Start Your Research

Research Guides
Academic Writing
Ask a Librarian
Copyright at NPS
Graduate Writing Center
How to Cite
Library Liaisons
Research Tools
Thesis Processing Office

Find & Download

Databases List
Articles, Books & More
NPS Theses
NPS Faculty Publications: Calhoun
Journal Titles
Course Reserves

Use the Library

My Accounts
Request Article or Book
Borrow, Renew, Return
Tech Help
Remote Access
Workshops & Tours

For Faculty & Researchers
For International Students
For Alumni

Print, Copy, Scan, Fax
Rooms & Study Spaces
Floor Map
Computers & Software
Adapters, Lockers & More

Collections

NPS Archive: Calhoun
Restricted Resources
Special Collections & Archives
Federal Depository
Homeland Security Digital Library

About

Hours
Library Staff
About Us
Special Exhibits
Policies
Our Affiliates
Visit Us

NPS-Licensed Resources—Terms & Conditions
Copyright Notice

Naval Postgraduate School

Naval Postgraduate School
1 University Circle, Monterey, CA 93943
Driving Directions | Campus Map

This is an official U.S. Navy Website |  Please read our Privacy Policy Notice  |  FOIA |  Section 508 |  No FEAR Act |  Whistleblower Protection |  Copyright and Accessibility |  Contact Webmaster

Export search results

The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

A logged-in user can export up to 15000 items. If you're not logged in, you can export no more than 500 items.

To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.