COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
7397 open access dissertations and theses found for:
if(Automated cybersecurity)  »   Refine Search
1.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
3.
Understanding Federal Cybersecurity Culture: An Expert Perspective on Current and Ideal State
by Sousane, Richard, Ed.D.  The George Washington University. 2018: 198 pages; 10785377.
8.
Exploring cybersecurity requirements in the defense acquisition process
by Zeng, Kui, D.Sc.  Capitol Technology University. 2016: 292 pages; 10165487.
10.
Applying Random Forest to Mitigate Cybersecurity Data Breaches in Small Businesses
by Liguori, Patricia Ann, D.Engr.  The George Washington University. 2018: 177 pages; 10928320.
11.
Understanding Controls to Detect and Mitigate Malicious Privileged User Abuse
by Harris, Clyde Devince, D.Sc.  Capitol Technology University. 2020: 210 pages; 28088128.
12.
Defensive Model for Protecting Sensitive Information
by Johnson, Dana R., D.I.T.  Capella University. 2020: 135 pages; 28263420.
14.
Rethinking Existing Cybersecurity Frameworks: How to Incentivise Companies to Better Defend against Cyber Threats
by Wang, BaoFa, M.S.  University of London, Royal Holloway, University of London (United Kingdom). 2020: 106 pages; 28087173.
15.
The Security and Performance Impact of Object File Shuffling
by Buch, Jonathan, M.S.  University of Idaho. 2020: 68 pages; 27833446.
16.
Enhancing the Design of a Cybersecurity Risk Management Solution for Communities of Trust
by Fulford, James E., Jr., D.B.A.  University of South Florida. 2018: 180 pages; 10979126.
17.
A Case Study in Safety Engineering Processes for Security Engineering Use
by Hall, Jeffery, D.Sc.  Capitol Technology University. 2018: 165 pages; 27835541.
20.
Internet of Things Device Cybersecurity and National Security
by England, Suzanne K., M.S.  Utica College. 2020: 62 pages; 28094260.
21.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
22.
Cybersecurity testing and intrusion detection for cyber-physical power systems
by Pan, Shengyi, Ph.D.  Mississippi State University. 2014: 161 pages; 3665497.
23.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
24.
Adapting Serious Gamification for Teaching Hands-on Skills in Cybersecurity Distance Learning
by Wood, Steven Wray, T.D.  Capitol Technology University. 2019: 190 pages; 27548825.
25.
Cybersecurity IR: A Thematic-analysis of Practitioner Plans, Policies, and Guidelines
by Fox, Michael B., PhDBA  Trident University International. 2019: 192 pages; 13904714.
26.
An Event Management Framework to Aid Solution Providers in Cybersecurity
by Leon, Ryan James, D.Engr.  The George Washington University. 2018: 114 pages; 10745141.
27.
Critical infrastructure protection
by Shwani, Hazim G., M.S.  Utica College. 2014: 55 pages; 1555605.
28.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
30.
Analyzing and Securing Embedded Systems
by Spensky, Chad Samuel, Ph.D.  University of California, Santa Barbara. 2020: 168 pages; 28090001.
1 - 30 of 7397 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest