Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
26562 open access dissertations and theses found for:
if(Computer forensics)  »   Refine Search
2.
Microsoft 365 and Exchange Server Hybrid Forensics
by Carlson, Alex, M.S.  Utica College. 2019: 71 pages; 27670117.
4.
Photo forensics from partial constraints
by Kee, Eric, Ph.D.  Dartmouth College. 2013: 124 pages; 3613660.
5.
Effects of clipping distortion on an Automatic Speaker Recognition system
by Ramirez, Jose Luis, M.S.  University of Colorado at Denver. 2016: 51 pages; 10112619.
6.
7.
Windows hibernation and memory forensics
by Ayers, Amy L., M.S.  Utica College. 2015: 67 pages; 1586690.
8.
Solid State Disk forensics: Is there a path forward?
by Fulton, John William, M.S.  Utica College. 2014: 47 pages; 1555597.
9.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
10.
Digital and multimedia forensics justified: An appraisal on professional policy and legislation
by Popejoy, Amy Lynnette, M.S.  University of Colorado at Denver. 2015: 56 pages; 1598313.
11.
Defending Forensics as a Tool for Assessment
by Hall, Douglas A., M.A.  Southern Illinois University at Edwardsville. 2013: 64 pages; 1543923.
15.
The Google Chrome operating system forensic artifacts
by Corbin, George, M.S.  Utica College. 2014: 68 pages; 1571599.
16.
A forensic investigation of the electrical properties of digital audio recording
by LeRoi, Jack, M.S.  University of Colorado at Denver. 2014: 71 pages; 1556863.
17.
Hardware-Assisted Protection and Isolation
by Wang, Jiang, Ph.D.  George Mason University. 2011: 126 pages; 3471624.
18.
Software signature derivation from sequential digital forensic analysis
by Nelson, Alexander J., Ph.D.  University of California, Santa Cruz. 2016: 177 pages; 10140317.
20.
Behavior modeling and forensics for multimedia social networks
by Lin, Wan-Yi, Ph.D.  University of Maryland, College Park. 2009: 253 pages; 3372974.
21.
Protecting Digital Evidence during Natural Disasters: Why It Is Important
by Dodrill, Charles A., M.S.  Utica College. 2018: 66 pages; 10788395.
22.
Misinterpretation of Digital Evidence: Recommendations to Improve Data Integrity
by Bednar-Schadle, Teresa, M.S.  Utica College. 2018: 73 pages; 13423713.
24.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
25.
Efficiently managing the computer engineering and Computer Science labs
by Pickrell, Nathan, M.S.  California State University, Long Beach. 2013: 113 pages; 1522647.
27.
A Review of Closed Canine Forensics DNA Case Reports from the University of California, Davis
by Scharnhorst, Gunther Konrad, M.S.  University of California, Davis. 2010: 36 pages; 1489390.
29.
The Role of Diverse Skill Sets in Incident Response
by Moore, Sandra, T.D.  Capitol Technology University. 2019: 128 pages; 27662834.
30.
Computer-based visualizing : learning from science texts by means of self-generated computer-based drawings
by Lorenz, Luisa Amelie, Ph.D.  Universitaet Duisburg-Essen (Germany). 2019: 27551676.
1 - 30 of 26562 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest