COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
7418 open access dissertations and theses found for:
if(Automated cybersecurity)  »   Refine Search
31.
Analyzing and Securing Embedded Systems
by Spensky, Chad Samuel, Ph.D.  University of California, Santa Barbara. 2020: 168 pages; 28090001.
32.
A Deep Learning Approach to Detecting Covert Channels in the Domain Name System
by Peña, Tomás Antonio, T.D.  Capitol Technology University. 2020: 206 pages; 27735496.
33.
Protecting Smart Devices from the Bottom-Up
by Machiry, Aravind K., Ph.D.  University of California, Santa Barbara. 2020: 179 pages; 28092431.
35.
Creating urgency in tech support scam telephone conversations
by Tabron, Judith L., M.A.  Hofstra University. 2016: 99 pages; 10253641.
36.
Cybersecurity of wireless implantable medical devices
by Ash, Sarah L., M.S.  Utica College. 2016: 51 pages; 10109631.
37.
A Cybersecurity Strategy for the Small Business
by Perez, Cesar, M.S.  Utica College. 2020: 49 pages; 28092738.
38.
Cybersecurity of unmanned aircraft systems (UAS)
by Gomez, Cesar A., M.S.  Utica College. 2015: 70 pages; 1605296.
39.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
42.
The Exceptionalist's Approach to Private Sector Cybersecurity: A Marque and Reprisal Model
by Hopkins, Michael Todd, LL.M.  The George Washington University. 2011: 88 pages; 1505935.
43.
Microsoft 365 and Exchange Server Hybrid Forensics
by Carlson, Alex, M.S.  Utica College. 2019: 71 pages; 27670117.
46.
Cybersecurity Workforce Alert: Women's Perspectives on Factors Influencing Female Interest
by Pifer, Carrie L., Ed.D.  Frostburg State University. 2017: 172 pages; 10744000.
49.
Critical Infrastructure: Legislative Factors for Preventing a "Cyber-Pearl Harbor"
by Palmer, Robert Kenneth, LL.M.  The George Washington University. 2013: 75 pages; 1545831.
51.
Prioritization of Open Source Defects Using Predictive Models
by Martinez, Jorge E., D.Engr.  The George Washington University. 2020: 164 pages; 28088873.
52.
How Distributed Ledger Technology is Transforming the Financial Marketplace
by Bougas, Michelle, M.S.  Utica College. 2016: 72 pages; 10245691.
55.
Dynamic Malware Analysis of GPU-Assisted Cryptoviruses Using Contained AES Side-Channels
by Espinoza, Jesus Pastor, D.Sc.  Capitol Technology University. 2018: 503 pages; 13853787.
56.
The Effects of Artificial Intelligence on the Youth
by Howley, Robert J., III, M.S.  Utica College. 2019: 41 pages; 22622916.
57.
Solid State Disk forensics: Is there a path forward?
by Fulton, John William, M.S.  Utica College. 2014: 47 pages; 1555597.
58.
Maintaining Small Retail Business Profitability by Reducing Cyberattacks
by Phillips, Ira J., Jr., D.B.A.  Walden University. 2020: 141 pages; 28024279.
59.
60.
Protecting the Commercial Connected Truck from Vulnerabilities Through Secure Software Development – A Case Study
by McWhite, Maureen C., D.I.T.  Capella University. 2020: 111 pages; 27832866.
31 - 60 of 7418 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest