Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
36282 open access dissertations and theses found for:
if(Computer Security)  »   Refine Search
1.
Dynamic Partitioning of Security Systems
by Paxton, Eric B., M.Sc.C.S.  California State University, Long Beach. 2020: 74 pages; 27833492.
3.
Techniques for Enhancing the Security of Future Smart Grids
by Saed, Mustafa, Ph.D.  University of Detroit Mercy. 2018: 444 pages; 10793626.
6.
Enhancing IoT Security with Blockchain
by Liu, Chunchi, Ph.D.  The George Washington University. 2020: 133 pages; 28091048.
7.
Security and Performance Analysis for RFID Protocols
by Liang, Bing, M.Sc.  Singapore Management University (Singapore). 2011: 93 pages; 1489343.
9.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
10.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
11.
Evaluation of security methods for the prevention of malware on mobile devices
by Giacalone, Anthony S., M.S.  California State University, Long Beach. 2014: 87 pages; 1527936.
12.
13.
Rethinking Existing Cybersecurity Frameworks: How to Incentivise Companies to Better Defend against Cyber Threats
by Wang, BaoFa, M.S.  University of London, Royal Holloway, University of London (United Kingdom). 2020: 106 pages; 28087173.
14.
Analyzing and Securing Embedded Systems
by Spensky, Chad Samuel, Ph.D.  University of California, Santa Barbara. 2020: 168 pages; 28090001.
15.
16.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
17.
19.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
20.
Efficiently managing the computer engineering and Computer Science labs
by Pickrell, Nathan, M.S.  California State University, Long Beach. 2013: 113 pages; 1522647.
21.
Light-Weight Accountable Privacy Preserving Protocol in Cloud Computing Based on a Third-Party Auditor
by Ben Haj Frej, Mohamed, Ph.D.  University of Bridgeport. 2019: 110 pages; 27743650.
22.
Side channel attack resistance: Migrating towards high level methods
by Borowczak, Mike, Ph.D.  University of Cincinnati. 2013: 183 pages; 3601397.
23.
An Educational Operating System Supporting Computer Security
by McGee, Patrick J., M.S.  Marquette University. 2020: 52 pages; 27838086.
24.
Identifying Factors Contributing towards Information Security Maturity in an Organization
by Edwards, Madhuri M., Ph.D.  Nova Southeastern University. 2018: 245 pages; 10746212.
25.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
26.
Performance evaluation of SIP authentication and TLS
by Maguluri, Swapna, M.S.C.E.  California State University, Long Beach. 2012: 121 pages; 1520910.
27.
Practical Black-Box Analysis for Network Functions and Services
by Moon, Soo-Jin, Ph.D.  Carnegie Mellon University. 2020: 202 pages; 28148170.
28.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
29.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
1 - 30 of 36282 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest