Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
304 open access dissertations and theses found for:
cybersecurity  »   Refine Search
62.
Cyber War in a Small War Environment
by Hermann, Rory Michael, Jr., M.S.  Utica College. 2017: 56 pages; 10271200.
63.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
64.
Freedom of Information in the Age of Terrorism: The Mosaic Theory in Practice
by Cooper, Harry R., Ph.D.  Capitol Technology University. 2018: 173 pages; 10902463.
65.
A Deep Learning Approach to Detecting Covert Channels in the Domain Name System
by Peña, Tomás Antonio, T.D.  Capitol Technology University. 2020: 206 pages; 27735496.
66.
Nation State Threat Actions Against Critical Energy Infrastructures
by Garner, Michael Wilson, Jr., M.S.  Utica College. 2017: 43 pages; 10686214.
67.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
70.
Electronic discovery
by Keck, Andrew G., M.S.  Utica College. 2016: 58 pages; 10101099.
71.
The effects of conformity and training in a phishing context: Conforming to the school of phish
by Jones, Matt, M.A.  The University of Alabama in Huntsville. 2015: 43 pages; 10182209.
73.
Susceptibility to Social Engineering: Human Vulnerabilities
by Schroeder, Chelsea, M.S.  Utica College. 2019: 41 pages; 27670795.
74.
Creating urgency in tech support scam telephone conversations
by Tabron, Judith L., M.A.  Hofstra University. 2016: 99 pages; 10253641.
75.
Validating Petri Net Models of Cyberattacks
by Christensen, Nicholas M., M.S.  The University of Alabama in Huntsville. 2017: 102 pages; 10608103.
77.
Benchmarks for Evaluating Anomaly-Based Intrusion Detection Solutions
by Miller, Nicholas J., M.S.  California State University, Long Beach. 2018: 30 pages; 10752128.
78.
Model Network Methodology for Experimental Development of Industrial Monitoring Systems
by Poresky, Christopher, Ph.D.  University of California, Berkeley. 2019: 154 pages; 22618563.
79.
An Investigation of Anomaly-based Ensemble Models for Multi-domain Intrusion Detection
by Mikhail, Joseph W., D.Engr.  The George Washington University. 2019: 117 pages; 10977908.
80.
Factors Influencing the Decision to Adopt a Digital Identity: A Correlational Study
by Cespiva, Richard B., D.I.T.  Capella University. 2018: 117 pages; 10937601.
81.
The Google Chrome operating system forensic artifacts
by Corbin, George, M.S.  Utica College. 2014: 68 pages; 1571599.
83.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
88.
How U.S. political and socio-economic trends promotes hacktivist activity
by Aviles, Grisselle, M.S.  Utica College. 2015: 85 pages; 1590361.
89.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
90.
Consumer Preference: A Study of Mobile Digital Wallet
by Oyewole, Anas Olateju, D.B.A.  Capitol Technology University. 2018: 175 pages; 22624060.
61 - 90 of 304 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest