Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
26436 open access dissertations and theses found for:
if(Attack modeling)  »   Refine Search
1.
Emergent Network Defense
by Crane, Earl Newell, Ph.D.  The George Washington University. 2013: 167 pages; 3548491.
2.
Validating Petri Net Models of Cyberattacks
by Christensen, Nicholas M., M.S.  The University of Alabama in Huntsville. 2017: 102 pages; 10608103.
3.
Cyber Agility for Attack Deterrence and Deception
by Jafarian, Jafar Haadi, Ph.D.  The University of North Carolina at Charlotte. 2017: 200 pages; 10686943.
4.
Calcium Carbonate Formation in Energy-Related Subsurface Environments and Engineered Systems
by Li, Qingyun, Ph.D.  Washington University in St. Louis. 2016: 251 pages; 10154786.
5.
Time-averaged surrogate modeling for small scale propellers based on high-fidelity CFD simulations
by Carroll, Joseph Ray, Ph.D.  Mississippi State University. 2013: 190 pages; 3603422.
6.
A method for automatically generating rules for a requires-provides security model of a system
by Orvis, William Snow, M.S.  University of California, Davis. 2009: 109 pages; 1470280.
7.
Cyber Physical System Modeling of Smart Charging Process
by Langschwager, Matthew T., M.S.  University of Louisiana at Lafayette. 2018: 98 pages; 13420593.
8.
Use of Model-Based Design Methods for Enhancing Resiliency Analysis of Unmanned Aerial Vehicles
by Knox, Lenora A., D.Engr.  The George Washington University. 2017: 154 pages; 10265223.
9.
Analysis, Validation, Prediction And Fundamental Understanding Of Rotor Blade Loads In An Unsteady Maneuver
by Abhishek, Abhishek, Ph.D.  University of Maryland, College Park. 2010: 344 pages; 3443414.
12.
Examining Predation Risk as a Guide for Mitigating Large Carnivore Attacks on Livestock
by Miller, Jennifer Rose Bunnell, Ph.D.  Yale University. 2015: 208 pages; 3663650.
13.
Design Automation for Carbon Nanotube Circuits Considering Performance and Security Optimization
by Liu, Lin, Ph.D.  Michigan Technological University. 2017: 169 pages; 10267186.
14.
Malware Vectors: A Technique for Discovering Defense Logics
by Stocco, Gabriel Fortunato, Ph.D.  Dartmouth College. 2014: 121 pages; 3685144.
15.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
16.
Assessing the Influence of Building Geometry on Active Shooter Event Outcomes
by Dane, Kristopher R., D.Engr.  The George Washington University. 2018: 115 pages; 10841977.
17.
A view through the periscope: Advanced and geospatial visualization of naval battlefields
by Sanchagrin, Stephen Paul, M.A.  East Carolina University. 2014: 206 pages; 1558841.
18.
Behavior modeling and forensics for multimedia social networks
by Lin, Wan-Yi, Ph.D.  University of Maryland, College Park. 2009: 253 pages; 3372974.
19.
Micro-simulation of large scale evacuations utilizing metrorail transit
by VanLandegen, Luke David, M.S.  Northern Illinois University. 2010: 82 pages; 1477116.
20.
Numerical Simulation of a Flowfield Around a Hypersonic Missile with Lateral Jets
by Rodriguez, Daniel, Ph.D.  Florida Atlantic University. 2017: 175 pages; 10605920.
21.
Proper Orthogonal Decomposition Based Reduced Order Modeling for Fluid Flow
by Behzad, Fariduddin, Ph.D.  Clarkson University. 2014: 147 pages; 3682451.
22.
Multimedia protection using content and embedded fingerprints
by Varna, Avinash Laxmisha, Ph.D.  University of Maryland, College Park. 2011: 208 pages; 3461319.
23.
"Model-Based Reasoning is Not a Simple Thing": Investigating Enactment of Modeling in Five High School Biology Classrooms
by Gayt├ín, Candice Renee, Ph.D.  University of California, Davis. 2017: 183 pages; 10602659.
24.
Reasoning software process modeling and simulation: A stakeholder-oriented approach
by Bai, Xu, Ph.D.  Southern Methodist University. 2012: 235 pages; 3548130.
25.
26.
Allocation of Resources to Defend Spatially Distributed Networks Using Game Theoretic Allocations
by Kroshl, William M., Ph.D.  The George Washington University. 2015: 146 pages; 3669710.
28.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
29.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
30.
Aerodynamic design optimization of proprotors for convertible-rotor concepts
by Stahlhut, Conor William, M.S.  University of Maryland, College Park. 2012: 170 pages; 1529348.
1 - 30 of 26436 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest