Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
44 open access dissertations and theses found for:
dep(Cybersecurity)  »   Refine Search
1.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
3.
The Effects of Artificial Intelligence on the Youth
by Howley, Robert J., III, M.S.  Utica College. 2019: 41 pages; 22622916.
4.
How U.S. political and socio-economic trends promotes hacktivist activity
by Aviles, Grisselle, M.S.  Utica College. 2015: 85 pages; 1590361.
6.
The Google Chrome operating system forensic artifacts
by Corbin, George, M.S.  Utica College. 2014: 68 pages; 1571599.
8.
Freedom of Information in the Age of Terrorism: The Mosaic Theory in Practice
by Cooper, Harry R., Ph.D.  Capitol Technology University. 2018: 173 pages; 10902463.
9.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
10.
Windows hibernation and memory forensics
by Ayers, Amy L., M.S.  Utica College. 2015: 67 pages; 1586690.
11.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
12.
Dynamic Malware Analysis of GPU-Assisted Cryptoviruses Using Contained AES Side-Channels
by Espinoza, Jesus Pastor, D.Sc.  Capitol Technology University. 2018: 503 pages; 13853787.
13.
Nation State Threat Actions Against Critical Energy Infrastructures
by Garner, Michael Wilson, Jr., M.S.  Utica College. 2017: 43 pages; 10686214.
14.
Cybersecurity of wireless implantable medical devices
by Ash, Sarah L., M.S.  Utica College. 2016: 51 pages; 10109631.
15.
Microsoft 365 and Exchange Server Hybrid Forensics
by Carlson, Alex, M.S.  Utica College. 2019: 71 pages; 27670117.
16.
An Interference Analysis Framework (IAF) for Spectrum Sharing Feasibility and Coexistence Determination
by Lofquist, Mark, Ph.D.  University of Colorado at Boulder. 2019: 205 pages; 27663207.
17.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
18.
Cyber Mobs: A Model for Improving Protections for Internet Users
by Lazarus, Seth A., M.S.  Utica College. 2017: 79 pages; 10271260.
19.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
20.
Cyber terrorrism threats
by Gobran, Ashraf, M.S.  Utica College. 2015: 48 pages; 1588500.
21.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
23.
24.
Critical infrastructure protection
by Shwani, Hazim G., M.S.  Utica College. 2014: 55 pages; 1555605.
25.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
27.
Electronic discovery
by Keck, Andrew G., M.S.  Utica College. 2016: 58 pages; 10101099.
28.
Susceptibility to Social Engineering: Human Vulnerabilities
by Schroeder, Chelsea, M.S.  Utica College. 2019: 41 pages; 27670795.
29.
Role of the Internet in the Sexual Exploitation of Children
by Deep, Danielle, M.S.  Utica College. 2016: 57 pages; 10153533.
1 - 30 of 44 displayed.
  1    2   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest