Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
33371 open access dissertations and theses found for:
if(Computer security)  »   Refine Search
2.
Techniques for Enhancing the Security of Future Smart Grids
by Saed, Mustafa, Ph.D.  University of Detroit Mercy. 2018: 444 pages; 10793626.
4.
Security and Performance Analysis for RFID Protocols
by Liang, Bing, M.Sc.  Singapore Management University (Singapore). 2011: 93 pages; 1489343.
5.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
7.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
9.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
11.
Evaluation of security methods for the prevention of malware on mobile devices
by Giacalone, Anthony S., M.S.  California State University, Long Beach. 2014: 87 pages; 1527936.
12.
13.
Strengthening System Security on the ARMv7 Processor Architecture with Hypervisor-Based Security Mechanisms
by Vetter, Julian, Ph.D.  Technische Universitaet Berlin (Germany). 2017: 115 pages; 27610268.
14.
Identifying Factors Contributing towards Information Security Maturity in an Organization
by Edwards, Madhuri M., Ph.D.  Nova Southeastern University. 2018: 245 pages; 10746212.
15.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
16.
Efficiently managing the computer engineering and Computer Science labs
by Pickrell, Nathan, M.S.  California State University, Long Beach. 2013: 113 pages; 1522647.
17.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
19.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
20.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
22.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
23.
Side channel attack resistance: Migrating towards high level methods
by Borowczak, Mike, Ph.D.  University of Cincinnati. 2013: 183 pages; 3601397.
24.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
25.
Performance evaluation of SIP authentication and TLS
by Maguluri, Swapna, M.S.C.E.  California State University, Long Beach. 2012: 121 pages; 1520910.
26.
Improving the Quality of Security Policies
by Hwang, JeeHyun, Ph.D.  North Carolina State University. 2014: 146 pages; 3584006.
28.
Software vulnerabilities: Lifespans, metrics, and case study
by Wright, Jason L., M.S.  University of Idaho. 2014: 117 pages; 1556964.
29.
Reliable and Efficient Routing for Wireless Sensor Networks
by Sinha, Saket, M.S.  California State University, Long Beach. 2017: 55 pages; 10263570.
1 - 30 of 33371 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest