Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
63 open access dissertations and theses found for:
if(Botnets)  »   Refine Search
31.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
32.
Navigating the Malweb: Authentication Schemes for Mobile Devices
by Niu, Yuan, Ph.D.  University of California, Davis. 2011: 116 pages; 3474442.
33.
The Implications of the Internet's Topological Structure for Its Efficiency, Security, and Reliability
by Nur, Abdullah Yasin, Ph.D.  University of Louisiana at Lafayette. 2018: 170 pages; 10980025.
34.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
35.
An Efficient System for Subgraph Discovery
by Joshi, Aparna, Ph.D.  State University of New York at Albany. 2018: 72 pages; 13418791.
36.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
38.
Awareness of malicious social engineering among facebook users
by Slonka, Kevin J., D.Sc.  Robert Morris University. 2014: 140 pages; 3620246.
39.
41.
Improving anonymity networks via end-to-end design
by Viecco, Camilo Hernan, Ph.D.  Indiana University. 2011: 140 pages; 3509948.
42.
Zero-Day Defense: Discovering and Removing Vulnerabilities throughProgram Customization and Fuzzing
by Chen, Yurong, D.Engr.  The George Washington University. 2020: 102 pages; 27740940.
43.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
44.
Emergent Network Defense
by Crane, Earl Newell, Ph.D.  The George Washington University. 2013: 167 pages; 3548491.
45.
Localizing the effects of link flooding attacks in the Internet
by Lee, Soo Bum, Ph.D.  University of Maryland, College Park. 2009: 142 pages; 3397793.
47.
Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
by Herr, Trey, Ph.D.  The George Washington University. 2016: 317 pages; 10076294.
48.
Wrinkles in Time: An Exploration of Non-uniform Temporal Resolution in Network Data
by DiTursi, Daniel J., Ph.D.  State University of New York at Albany. 2019: 109 pages; 22615148.
50.
Privilege Leakage in Practical Systems
by Grace, Michael C., Ph.D.  North Carolina State University. 2017: 114 pages; 10969800.
52.
Formal reasoning in software-defined networks
by Reitblatt, Mark, Ph.D.  Cornell University. 2017: 179 pages; 10254203.
54.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
55.
Examining the Influence of Gender and Age on Acceptance Rates of Bitcoin
by Siquian, John Vincent , D.B.A.  Grand Canyon University. 2020: 208 pages; 27741724.
56.
Extensible Performance-aware Runtime Integrity Measurement
by Delgado, Brian G., Ph.D.  Portland State University. 2020: 234 pages; 27741720.
57.
Quantifying and improving wireless privacy
by McCoy, Damon Liwanu, Ph.D.  University of Colorado at Boulder. 2009: 206 pages; 3387545.
58.
Enhancing the Design of a Cybersecurity Risk Management Solution for Communities of Trust
by Fulford, James E., Jr., D.B.A.  University of South Florida. 2018: 180 pages; 10979126.
59.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
31 - 60 of 63 displayed.
« First < Previous |   1    2    3   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest