Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
1789 open access dissertations and theses found for:
if(Vulnerabilities)  »   Refine Search
1.
Software vulnerabilities: Lifespans, metrics, and case study
by Wright, Jason L., M.S.  University of Idaho. 2014: 117 pages; 1556964.
2.
Quantitative analyses of software vulnerabilities
by Joh, HyunChul, Ph.D.  Colorado State University. 2011: 224 pages; 3489881.
5.
Automatic verification of string manipulating programs
by Yu, Fang, Ph.D.  University of California, Santa Barbara. 2010: 239 pages; 3422651.
6.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
7.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
8.
Detection and Prevention of Misuse of Software Components
by Ting, Dai, Ph.D.  National University of Singapore (Singapore). 2015: 141 pages; 10005992.
9.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
10.
Cybersecurity of unmanned aircraft systems (UAS)
by Gomez, Cesar A., M.S.  Utica College. 2015: 70 pages; 1605296.
12.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
14.
Interconnectedness, Vulnerabilities, and Crisis Spillovers: Implications for the New Financial Stability Framework
by Tintchev, Kalin Iliev, Ph.D.  The George Washington University. 2014: 183 pages; 3610421.
15.
Critical infrastructure protection
by Shwani, Hazim G., M.S.  Utica College. 2014: 55 pages; 1555605.
16.
Internet Protocol version Six (IPv6) at UC Davis: Traffic Analysis with a Security Perspective
by Ard, Julia Boxwell, M.S.  University of California, Davis. 2012: 115 pages; 1519649.
17.
Decision-Making by Effective Information Security Managers
by Pettigrew, James Andrew, III, Ph.D.  The George Washington University. 2012: 359 pages; 3502331.
18.
Web browsers as operating systems: Supporting robust and secure web programs
by Reis, Charles, Ph.D.  University of Washington. 2009: 173 pages; 3370601.
19.
Critical Infrastructure: Legislative Factors for Preventing a "Cyber-Pearl Harbor"
by Palmer, Robert Kenneth, LL.M.  The George Washington University. 2013: 75 pages; 1545831.
21.
Analysis Of Decision Factors For The Application Of Information Access Controls Within The Organization
by Foerster, Carl A., D.Sc.  The George Washington University. 2013: 165 pages; 3553953.
23.
Defeating memory error exploits using automated software diversity
by Bhatkar, Sandeep, Ph.D.  State University of New York at Stony Brook. 2007: 123 pages; 3337612.
24.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
25.
Building disaster resilience: Why community gardens improve community resilience
by Brown, Nancy, M.S.  California State University, Long Beach. 2015: 106 pages; 1573030.
26.
27.
More than just good deeds: Fraud within religious organizations
by Peters, Carrol Susan, M.S.  Utica College. 2015: 62 pages; 1599154.
28.
An examination of hurricane vulnerability of the U.S. northeast and mid-Atlantic region
by Prasad, Shivangi, Ph.D.  Florida Atlantic University. 2013: 179 pages; 3571436.
29.
ROVER: A DNS-based method to detect and prevent IP hijacks
by Gersch, Joseph E., Ph.D.  Colorado State University. 2013: 179 pages; 3608195.
30.
Hardware-Assisted Protection and Isolation
by Wang, Jiang, Ph.D.  George Mason University. 2011: 126 pages; 3471624.
1 - 30 of 1789 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >