Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
26532 open access dissertations and theses found for:
if(Computer virus)  »   Refine Search
1.
Exploring the effect of cognitive load on the propensity for query reformulation behavior
by Na, Kyoungsik, Ph.D.  The Florida State University. 2012: 178 pages; 3539828.
2.
Evaluation of security methods for the prevention of malware on mobile devices
by Giacalone, Anthony S., M.S.  California State University, Long Beach. 2014: 87 pages; 1527936.
3.
Polymorphic attacks and network topology: Application of concepts from natural systems
by Rangan, Prahalad, Ph.D.  State University of New York at Albany. 2010: 102 pages; 3402465.
4.
Study of W32/NetSky.Q worm and malicious website detection using packed malware string search
by Dongre, Ankush, M.S.  California State University, Long Beach. 2011: 94 pages; 1504450.
5.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
6.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
8.
The roles of double-stranded RNA-dependent enzymes PKR protein kinase and ADAR1 deaminase during measles virus infection
by Toth, Ann M., Ph.D.  University of California, Santa Barbara. 2009: 218 pages; 3350385.
9.
Leadership styles and information security in small businesses: An empirical investigation
by Bhattacharya, Debasis, D.B.A.  University of Phoenix. 2008: 252 pages; 3324059.
10.
It is risky business: Three essays on ensuring reliability, security and privacy in technology-mediated settings
by Anderson, Catherine L., Ph.D.  University of Maryland, College Park. 2010: 228 pages; 3409866.
11.
Microfluidic techniques for the study of self-assembly of soft materials
by Aguade Cabanas, Rafael, Ph.D.  Brandeis University. 2014: 137 pages; 3611603.
13.
Investigation of virus capsid self-assembly kinetics using discrete-event stochastic simulation
by Zhang, Tiequan, Ph.D.  Carnegie Mellon University. 2007: 131 pages; 3293505.
15.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
17.
Creating urgency in tech support scam telephone conversations
by Tabron, Judith L., M.A.  Hofstra University. 2016: 99 pages; 10253641.
19.
The Impact of Climate on Culex tarsalis and its Role in the Transmission of West Nile Virus in California
by Danforth, Mary Elizabeth, Ph.D.  University of California, Davis. 2015: 125 pages; 10036043.
20.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
21.
Health Data Analysis and Predictions
by Pandya, Nisarg P., M.S.  California State University, Long Beach. 2018: 41 pages; 10689789.
22.
African-American males in computer science—Examining the pipeline for clogs
by Stone, Daryl Bryant, D.Sc.  The George Washington University. 2008: 350 pages; 3341359.
24.
Efficiently managing the computer engineering and Computer Science labs
by Pickrell, Nathan, M.S.  California State University, Long Beach. 2013: 113 pages; 1522647.
25.
An attack-resistant and rapid recovery desktop system
by Deshane, Todd, Ph.D.  Clarkson University. 2010: 149 pages; 3428987.
26.
The 1878 yellow fever epidemic in Memphis, Tennessee: An historical geographic information systems (HGIS) approach
by Kennedy, Sheridan Wright, M.A.  California State University, Long Beach. 2011: 120 pages; 1504491.
27.
Interference of host innate immune response by hepatitis E virus
by Nan, Yuchen, Ph.D.  University of Maryland, College Park. 2014: 182 pages; 3644495.
28.
The viral genomics revolution: Big data approaches to basic viral research, surveillance, and vaccine development
by Schobel, Seth Adam Micah, Ph.D.  University of Maryland, College Park. 2015: 208 pages; 10011480.
1 - 30 of 26532 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest