Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
304 open access dissertations and theses found for:
cybersecurity  »   Refine Search
121.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
122.
An Interference Analysis Framework (IAF) for Spectrum Sharing Feasibility and Coexistence Determination
by Lofquist, Mark, Ph.D.  University of Colorado at Boulder. 2019: 205 pages; 27663207.
123.
Cross-Layer Design for Secure and Resilient Control of Cyber-Physical Systems in Smart Cities
by Xu, Zhiheng, Ph.D.  New York University Tandon School of Engineering. 2018: 225 pages; 10840627.
125.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
128.
MyMark: A Mobile App Business Plan Proposal
by Enriquez, Andres, M.S.  California State University, Long Beach. 2017: 57 pages; 10262420.
129.
Probabilistic Clustering Ensemble Evaluation for Intrusion Detection
by McElwee, Steven M., Ph.D.  Nova Southeastern University. 2018: 166 pages; 10844875.
130.
Decision-Making by Effective Information Security Managers
by Pettigrew, James Andrew, III, Ph.D.  The George Washington University. 2012: 359 pages; 3502331.
131.
Relationship of Organizational Structures in Higher Education to Risk Management
by Asante, Robert, Ed.D.  University of Pennsylvania. 2019: 230 pages; 27664719.
132.
Permeable Socialization Flow and Hacker Code Switching Practice: A Metacognitive, Situated Approach
by DiGiovanni, Frank Christopher, Ed.D.  University of Pennsylvania. 2018: 283 pages; 10977668.
133.
Modernizing Check Fraud Detection with Machine Learning
by Rose, Lydia M., M.S.  Utica College. 2018: 64 pages; 13421455.
134.
Digital Image Source Authentication
by Schippers, David A., D.Sc.  Capitol Technology University. 2018: 223 pages; 27828526.
135.
It is risky business: Three essays on ensuring reliability, security and privacy in technology-mediated settings
by Anderson, Catherine L., Ph.D.  University of Maryland, College Park. 2010: 228 pages; 3409866.
136.
Feature Extraction from Network Data
by Oles, Vladyslav, Ph.D.  Washington State University. 2019: 92 pages; 27547130.
139.
The relationship between cell phone use and identity theft
by Saunders, Lewis O., Ph.D.  Walden University. 2014: 135 pages; 3615824.
140.
Reimagined: How the U.S. Defense Department Responds to Triggers and Organizes to Balance against Threats
by Roman, Javier Alexsandro, M.A.  The University of Texas at San Antonio. 2019: 100 pages; 13881251.
141.
DocUpfront: An App that Empowers Consumers to Receive Health Coverage through Direct Primary Care Physicians
by Rebello, Vida B., M.S.  California State University, Long Beach. 2018: 52 pages; 10752234.
143.
White House computer adoption and information policy from 1969 – 1979
by Laprise, John Paul, Ph.D.  Northwestern University. 2009: 261 pages; 3386523.
144.
Improving Software Project Outcomes through Predictive Analytics
by Guillaume-Joseph, Gina, Ph.D.  The George Washington University. 2016: 94 pages; 3744330.
146.
Collective Relational Data Integration with Diverse and Noisy Evidence
by Memory, Alexander, Ph.D.  University of Maryland, College Park. 2019: 204 pages; 27547597.
147.
Cyber Physical System Modeling of Smart Charging Process
by Langschwager, Matthew T., M.S.  University of Louisiana at Lafayette. 2018: 98 pages; 13420593.
148.
Making It in America: A Phenomenological Study of the Identity Reformation of Syrian Refugees
by Jarrah, Mohaymen, Ed.D.  The George Washington University. 2018: 241 pages; 10785201.
150.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
121 - 150 of 304 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest