Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
10224 open access dissertations and theses found for:
if(Cyber crime)  »   Refine Search
1.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
2.
Cyber terrorrism threats
by Gobran, Ashraf, M.S.  Utica College. 2015: 48 pages; 1588500.
4.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
5.
How U.S. political and socio-economic trends promotes hacktivist activity
by Aviles, Grisselle, M.S.  Utica College. 2015: 85 pages; 1590361.
6.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
7.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
8.
Cyber Mobs: A Model for Improving Protections for Internet Users
by Lazarus, Seth A., M.S.  Utica College. 2017: 79 pages; 10271260.
9.
Cyber Agility for Attack Deterrence and Deception
by Jafarian, Jafar Haadi, Ph.D.  The University of North Carolina at Charlotte. 2017: 200 pages; 10686943.
11.
The Role and Impact of Cyber Security Mentoring
by Ellithorpe, James O., Ph.D.  Walden University. 2016: 467 pages; 10126660.
13.
Cyber War in a Small War Environment
by Hermann, Rory Michael, Jr., M.S.  Utica College. 2017: 56 pages; 10271200.
14.
16.
A Qualitative Case Study on Secondary Educators’ Perceptions and Practices in Cyber-Bullying Incidents
by Robertson-Armstrong, Sharon , Ed.D.  Northcentral University. 2020: 175 pages; 27837782.
17.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
19.
Convergence – A Homeland Security and Educational Problem: A Mixed Methodological Study
by Ippolito, Steven Christopher, Ph.D.  Northcentral University. 2017: 495 pages; 10624690.
21.
Cross-Layer Design for Secure and Resilient Control of Cyber-Physical Systems in Smart Cities
by Xu, Zhiheng, Ph.D.  New York University Tandon School of Engineering. 2018: 225 pages; 10840627.
22.
Cyber-harassment in higher education: A study of institutional policies and procedures
by Schaefer-Ramirez, Victoria Ann, Ed.D.  Pepperdine University. 2017: 182 pages; 10265669.
23.
Scalable software control of million-element cyber-physical systems using a graphics processing unit
by Krunic, Veljko, Ph.D.  University of Colorado at Boulder. 2010: 260 pages; 3433308.
24.
An ounce of prevention: Taxpayer costs avoided through preventing crime
by Reinhardt, Victoria Ann, D.P.A.  Hamline University. 2007: 192 pages; 3285715.
26.
Crime and the Control of Crime: An Ethical Analysis from a Theravāda Buddhist Point of View
by Elamaldeniye, Sarananda Thero, Ph.D.  University of the West. 2019: 234 pages; 22622897.
27.
A new distributed framework for cyber attack detection and classification
by Gutta, Sandeep, M.S.  Oklahoma State University. 2011: 86 pages; 1506488.
28.
A Dissertation on the Testing Approaches of Autonomous Cyber-Physical Systems
by Behles, Cody, Ph.D.  The University of Memphis. 2020: 118 pages; 28002820.
29.
Traveling Domain Theory: A Comparative Approach for Cyberspace Theory Development
by McCarthy, Thomas David, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2012: 343 pages; 3516575.
1 - 30 of 10224 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest