Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 15 |
Descriptor
Computer Networks | 15 |
Information Systems | 15 |
Information Technology | 8 |
Models | 6 |
Computer Security | 5 |
Information Security | 5 |
Computer Software | 4 |
Correlation | 3 |
Internet | 3 |
Telecommunications | 3 |
Business | 2 |
More ▼ |
Source
ProQuest LLC | 15 |
Author
Publication Type
Dissertations/Theses -… | 15 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Adult Education | 1 |
High School Equivalency… | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hari Prasad Challa – ProQuest LLC, 2024
The increasing complexity of modern power systems, coupled with the integration of diverse rapidly evolving technologies involving physical systems requiring cybersecurity, has presented significant challenges for engineers in the field and researchers in laboratory facilities. This research and dissertation presents the development of a…
Descriptors: Computer Security, Information Systems, Technology Integration, Information Technology
DeSerranno, Allen Ronald – ProQuest LLC, 2017
Internet of Things ("IoT") systems are complex, asynchronous solutions often comprised of various software and hardware components developed in isolation of each other. These components function with different degrees of reliability and performance over an inherently unreliable network, the Internet. Many IoT systems are developed within…
Descriptors: Computer Software, Internet, Computer Networks, Engineering
White, Jautau Kelton – ProQuest LLC, 2017
Current cybersecurity measures have become a major concern for commercial organizations in the United States. As the cyber-attack landscape expands and the skills and knowledge of the cyber-attacker become broader, the current measures that are taken and the laws structured around them are making it increasingly difficult for commercial…
Descriptors: Information Security, Computer Security, Computer Networks, Crime
Dikaliotis, Theodoros K. – ProQuest LLC, 2013
In this thesis, delay and security issues in network coding are considered. First, we study the delay incurred in the transmission of a fixed number of packets through acyclic networks comprised of erasure links. The two transmission schemes studied are routing with hop-by-hop retransmissions, where every node in the network simply stores and…
Descriptors: Computer Networks, Information Security, Information Systems, Coding
Mohammadi, Hadi – ProQuest LLC, 2014
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…
Descriptors: Computer Networks, Computer Software, Computer Security, Prevention
Alomari, Firas – ProQuest LLC, 2013
The back-end databases of multi-tiered applications are a major data security concern for enterprises. The abundance of these systems and the emergence of new and different threats require multiple and overlapping security mechanisms. Therefore, providing multiple and diverse database intrusion detection and prevention systems (IDPS) is a critical…
Descriptors: Information Security, Information Systems, Databases, Models
Perigo, Levi – ProQuest LLC, 2013
In this dissertation, the author examined the capabilities of Internet Protocol version 6 (IPv6) in regard to replacing Internet Protocol version 4 (IPv4) as the internetworking technology for Medium-sized Businesses (MBs) in the Information Systems (IS) field. Transition to IPv6 is inevitable, and, thus, organizations are adopting this protocol…
Descriptors: Internet, Computer Networks, Business, Information Systems
Gendreau, Audrey – ProQuest LLC, 2014
Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research,…
Descriptors: Computer Simulation, Computer Networks, Costs, Risk
Yu, Han – ProQuest LLC, 2012
In this dissertation, several control problems are studied that arise when passive or dissipative systems are interconnected and controlled over a communication network. Since communication networks can impact the systems' stability and performance, there is a need to extend the results on control of passive or dissipative systems to networked…
Descriptors: Information Systems, Information Technology, Network Analysis, Computer Networks
Sanborn, Mark – ProQuest LLC, 2011
Wireless sensor networks (WSNs) represent a class of miniaturized information systems designed to monitor physical environments. These smart monitoring systems form collaborative networks utilizing autonomous sensing, data-collection, and processing to provide real-time analytics of observed environments. As a fundamental research area in…
Descriptors: Information Systems, Models, Physical Environment, Networks
Cuthrell, Michael Gerard – ProQuest LLC, 2011
Optical transmission networks are an integral component of the critical infrastructures for many nations. Many people believe that optical transmission networks are impenetrable. In actuality, these networks possess weaknesses that can be exploited to bring about harm. An emerging Information Assurance (IA) industry has as its goals: to…
Descriptors: Information Technology, Information Systems, Telecommunications, Expertise
Dutt, Abhijit – ProQuest LLC, 2013
Improvements in Information Technology (IT) infrastructure and standardization of interoperability standards among heterogeneous Information System (IS) applications have brought a paradigm shift in the way an IS application could be used and delivered. Not only an IS application can be built using standardized component but also parts of it can…
Descriptors: Essays, Economic Factors, Information Technology, Technology Integration
Reifers, Andrew – ProQuest LLC, 2010
Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…
Descriptors: Visualization, Administrators, Computer Networks, Information Technology
Elhindi, Mohamed A. – ProQuest LLC, 2010
Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…
Descriptors: Credentials, State Colleges, Models, Information Systems
Meador, Ryan E. – ProQuest LLC, 2012
This study examined students who successfully applied for reinstatement after being academically dismissed for the first time in order to discover indicators of future success. This study examined 666 students' appeals filed at the DeVry University Kansas City campus between 2004 and 2009. Binary logistic regression was used to discover if a…
Descriptors: Remedial Instruction, Academic Achievement, Academic Probation, Academic Failure