1. Thesis and Dissertation Collection, all items
Similarities and differences in patterns and geolocation of SSH attack data
Identifying and embedding common indicators of compromise in virtual machines for lab-based incident response education
Utilization of concurrent buffers to facilitate seamless data transition in tactical cellular communications
Exposing vital forensic artifacts of USB devices in the Windows 10 registry
Supporting the maritime information dominance: optimizing tactical network for biometric data sharing in maritime interdiction operations
Examining cyber command structures
Cyber-warfare: jus post bellum
A communications strategy for disaster relief
Performance testing of GPU-based approximate matching algorithm on network traffic
Methods for intelligent mapping of the IPv6 address space
Refine By:
Advisor
Author
Branch Of Service
Date Issued
-
2015 (12)