Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Computer Networks | 4 |
| Program Effectiveness | 4 |
| Computer Security | 3 |
| Computer System Design | 3 |
| Information Technology | 2 |
| Metadata | 2 |
| Programming | 2 |
| Statistical Analysis | 2 |
| Access to Information | 1 |
| Animals | 1 |
| Automation | 1 |
| More ▼ | |
Source
| ProQuest LLC | 4 |
Publication Type
| Dissertations/Theses -… | 4 |
Education Level
| Higher Education | 1 |
Audience
Location
| Arkansas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Xu, Yiliang – ProQuest LLC, 2011
The development of telerobotic systems has evolved from Single Operator Single Robot (SOSR) systems to Multiple Operator Multiple Robot (MOMR) systems. The relationship between human operators and robots follows the master-slave control architecture and the requests for controlling robot actuation are completely generated by human operators. …
Descriptors: Resource Allocation, Mathematics, Animals, Robotics
Massengale, Ricky L., Sr. – ProQuest LLC, 2009
With the ability of modern system developers to develop intelligent programs that allows machines to learn, modify and evolve themselves, current trends of reactionary methods to detect and eradicate malicious software code from infected machines is proving to be too costly. Addressing malicious software after an attack is the current methodology…
Descriptors: Computer Software, Computer System Design, Computer Security, Prevention
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis

Direct link
