Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
304 open access dissertations and theses found for:
cybersecurity  »   Refine Search
91.
Continuity and Change: Structural Realism and International Stability in the Information Age
by Mitsutomi, Yuichiro, M.A.  The George Washington University. 2011: 105 pages; 1502439.
92.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
93.
End-to-end Encryption, Backdoors, and Privacy
by Endeley, Robert E., T.D.  Capitol Technology University. 2019: 142 pages; 22624057.
96.
Windows hibernation and memory forensics
by Ayers, Amy L., M.S.  Utica College. 2015: 67 pages; 1586690.
98.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
99.
Cyber terrorrism threats
by Gobran, Ashraf, M.S.  Utica College. 2015: 48 pages; 1588500.
102.
Traveling Domain Theory: A Comparative Approach for Cyberspace Theory Development
by McCarthy, Thomas David, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2012: 343 pages; 3516575.
103.
Global scale identity management
by Tambasco, Michael J., M.S.  Utica College. 2015: 60 pages; 1600350.
105.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
106.
Bioaffinity-Based Methods for Forensic, Biometric, and Clinical Purposes
by Hair, Mindy, Ph.D.  State University of New York at Albany. 2020: 123 pages; 27834677.
107.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
109.
Core Flight System Cryptography Library
by Lucas, John Patrick, M.S.  West Virginia University. 2017: 115 pages; 10268719.
110.
Team Collaboration as a System of Systems Agent-Based Model
by Torres, Edwin Ross, D.Engr.  The George Washington University. 2018: 144 pages; 10743109.
113.
A Comparative Study of Lattice Based Algorithms for Post Quantum Computing
by Easttom, William Charles, II, D.B.A.  Capitol Technology University. 2018: 141 pages; 13901281.
114.
Increasing Gender Equity in Computer Science: A Case Study in One Suburban High School
by Settle, Dawn M., D.Ed.  Indiana University of Pennsylvania. 2020: 259 pages; 27833290.
116.
Application Layer Authentication Using a Time-Based Password Effect upon the Smart Home Automation Controller
by Bringardner, Alan Scott, D.Sc.  Capitol Technology University. 2017: 227 pages; 27739945.
117.
Formal End-to-End Verification of Information-Flow Security for Complex Systems
by Costanzo, David, Ph.D.  Yale University. 2016: 165 pages; 10584941.
118.
Programming QR code scanner, communicating Android devices, and unit testing in fortified cards
by Patil, Aniket V., M.S.  California State University, Long Beach. 2017: 45 pages; 10638699.
119.
Role of the Internet in the Sexual Exploitation of Children
by Deep, Danielle, M.S.  Utica College. 2016: 57 pages; 10153533.
120.
Misinterpretation of Digital Evidence: Recommendations to Improve Data Integrity
by Bednar-Schadle, Teresa, M.S.  Utica College. 2018: 73 pages; 13423713.
91 - 120 of 304 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest