COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
7411 open access dissertations and theses found for:
if(Automated cybersecurity)  »   Refine Search
181.
Factors Influencing the Decision to Adopt a Digital Identity: A Correlational Study
by Cespiva, Richard B., D.I.T.  Capella University. 2018: 117 pages; 10937601.
182.
The Google Chrome operating system forensic artifacts
by Corbin, George, M.S.  Utica College. 2014: 68 pages; 1571599.
183.
Cyber Mobs: A Model for Improving Protections for Internet Users
by Lazarus, Seth A., M.S.  Utica College. 2017: 79 pages; 10271260.
184.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
185.
186.
A General Purpose Neural Processor
by Mountain, David Jerome, Ph.D.  University of Maryland, Baltimore County. 2017: 171 pages; 10268058.
188.
Protecting Digital Evidence during Natural Disasters: Why It Is Important
by Dodrill, Charles A., M.S.  Utica College. 2018: 66 pages; 10788395.
190.
Integrity Analysis for Aviation and Automotive Applications
by Mario, Courtney, M.S.  Tufts University. 2011: 121 pages; 1495492.
191.
Impact of Information Breaches on Health Care Records
by Antony Arockiasamy, Anton, Ph.D.  Walden University. 2021: 123 pages; 28318026.
193.
Analyzing Historical Data Breaches to Improve Public Cloud Security Postures
by Zhou, Yucheng, D.Engr.  The George Washington University. 2020: 125 pages; 27664530.
196.
Automation of Electroweak NLO Corrections in General Models
by Lang, Jean-Nicolas Olivier, Ph.D.  Bayerische Julius-Maximilians-Universitaet Wuerzburg (Germany). 2017: 164 pages; 27766771.
197.
Implementation Strategies for Modeling and Simulation in Military Organizations
by Taylor, Cody, D.I.T.  Walden University. 2021: 191 pages; 28320616.
201.
Discovery and Remediation of Vulnerabilities in Monolithic IoT Firmware
by Gustafson, Eric D., Ph.D.  University of California, Santa Barbara. 2020: 151 pages; 28025862.
202.
Survey and Analytical Methods for Long-Term Monitoring of Wildlife Metacommunities in California Montane Forests
by Furnas, Brett Jonathan, Ph.D.  University of California, Berkeley. 2013: 85 pages; 10075566.
204.
Verification of ramps software for design of steel I-girders
by Berti, Michael A., M.C.E.  University of Delaware. 2015: 90 pages; 10014925.
205.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
206.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
207.
Select problems at the intersection of computer science and economics
by Naroditskiy, Victor, Ph.D.  Brown University. 2010: 169 pages; 3430201.
208.
First order decision diagrams for decision theoretic planning
by Joshi, Saket, Ph.D.  Tufts University. 2010: 190 pages; 3427479.
209.
Formal proofs and refutations
by Alama, Jesse, Ph.D.  Stanford University. 2009: 254 pages; 3364492.
210.
Planning in incomplete domains
by Robertson, Jared, M.S.  Utah State University. 2012: 71 pages; 1532849.
181 - 210 of 7411 displayed.
« First < Previous |   4    5    6    7    8    9    10    11    12    13    14   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest