Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
10011 open access dissertations and theses found for:
if(Attack)  »   Refine Search
1.
Assessing City Preparedness for a Biological Attack
by Moore, Joseph T., Ph.D.  Walden University. 2011: 113 pages; 3457361.
2.
Case Study of a Prevented School Rampage Attack at a Rural-Suburban High School
by Morell, Nicholas, III, Ed.D.  Wilkes University. 2013: 185 pages; 3560131.
3.
Analyzing Red and Gray Stages of Bark Beetle Attack in the San Bernardino National Forest Using Remote Sensing
by Morgan, Andy J., M.A.  California State University, Long Beach. 2017: 87 pages; 10263607.
6.
The effects of uninsurance on hospitals and patient health
by Daysal, Nezahat Meltem, Ph.D.  University of Maryland, College Park. 2009: 125 pages; 3379291.
7.
Exploiting Human Factors in User Authentication
by Gupta, Payas, Ph.D.  Singapore Management University (Singapore). 2013: 170 pages; 3601349.
9.
Localizing the effects of link flooding attacks in the Internet
by Lee, Soo Bum, Ph.D.  University of Maryland, College Park. 2009: 142 pages; 3397793.
11.
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
by LeDoux, Charles, Ph.D.  University of Louisiana at Lafayette. 2016: 179 pages; 10245924.
12.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
13.
Performance analysis of software and hardware based firewalls against DDoS attacks
by Agus, Ruben, M.S.  California State University, Long Beach. 2014: 66 pages; 1568899.
14.
Defeating memory error exploits using automated software diversity
by Bhatkar, Sandeep, Ph.D.  State University of New York at Stony Brook. 2007: 123 pages; 3337612.
15.
RAPIDKardia Diagnostic Incorporated: A Point of Care Testing Company Proposal
by Catbagan, Erico Jay, M.S.  California State University, Long Beach. 2019: 72 pages; 13905007.
16.
On the feasibility of intrusion detection system in wireless sensor network
by Murarka, Kishore Ramkisan, M.S.  California State University, Long Beach. 2012: 86 pages; 1517746.
17.
Honeypot with Honeypot Management System for web applications
by Karia, Rutu, M.S.  California State University, Long Beach. 2011: 85 pages; 1504488.
18.
Comparing the Effectiveness of Resilience Measures
by Matta, John, M.S.  Southern Illinois University at Edwardsville. 2014: 59 pages; 1566215.
19.
The legal-military dilemma in the response to international terrorism
by Allan, Matthew Wesley, Ph.D.  Texas A&M University. 2009: 253 pages; 3400678.
20.
Secure Distributed Inference
by Chen, Yuan, Ph.D.  Carnegie Mellon University. 2019: 169 pages; 13883829.
21.
Emergent Network Defense
by Crane, Earl Newell, Ph.D.  The George Washington University. 2013: 167 pages; 3548491.
22.
A model of forensic analysis using goal-oriented logging
by Peisert, Sean Philip, Ph.D.  University of California, San Diego. 2007: 182 pages; 3246091.
23.
A method for automatically generating rules for a requires-provides security model of a system
by Orvis, William Snow, M.S.  University of California, Davis. 2009: 109 pages; 1470280.
24.
Performance Studies on Portland-Limestone Cement in Sulfate Environments
by A Elahi, Md Manjur, M.S.  South Dakota School of Mines and Technology. 2018: 129 pages; 13850813.
25.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
26.
ROVER: A DNS-based method to detect and prevent IP hijacks
by Gersch, Joseph E., Ph.D.  Colorado State University. 2013: 179 pages; 3608195.
27.
Routing in the dark: Pitch black
by Evans, Nathan S., M.S.  University of Denver. 2009: 84 pages; 1465595.
28.
Detecting attacks in building automation system
by Nama, Sumanth, M.S.  California State University, Long Beach. 2015: 45 pages; 1597784.
29.
Byzantine survivable routing for mobile ad hoc networks
by Holmer, David, Ph.D.  The Johns Hopkins University. 2007: 101 pages; 3267877.
30.
1 - 30 of 10011 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest