Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
4295 open access dissertations and theses found for:
if(Cyber deception)  »   Refine Search
2.
Cyber Agility for Attack Deterrence and Deception
by Jafarian, Jafar Haadi, Ph.D.  The University of North Carolina at Charlotte. 2017: 200 pages; 10686943.
3.
Stratagem in asymmetry: Nonstate armed groups' use of deception
by Jessee, Devin Duke, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2011: 378 pages; 3475330.
4.
The Rhetoric of Deliberate Deception: What Catfishing Can Teach Us
by Kottemann, Kathrin L., Ph.D.  University of Louisiana at Lafayette. 2015: 175 pages; 3712554.
5.
Detecting deception in speech
by Enos, Frank, Ph.D.  Columbia University. 2009: 233 pages; 3348430.
6.
Cyber terrorrism threats
by Gobran, Ashraf, M.S.  Utica College. 2015: 48 pages; 1588500.
7.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
8.
Cyber Mobs: A Model for Improving Protections for Internet Users
by Lazarus, Seth A., M.S.  Utica College. 2017: 79 pages; 10271260.
9.
Therapists' Perceptions of Deception in Psychotherapy
by Doll, Sadie, Psy.D.  The Chicago School of Professional Psychology. 2017: 140 pages; 10160006.
10.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
12.
Punishing deception and rewarding honesty
by Wang, Cynthia S., Ph.D.  Northwestern University. 2007: 146 pages; 3278063.
15.
The Role and Impact of Cyber Security Mentoring
by Ellithorpe, James O., Ph.D.  Walden University. 2016: 467 pages; 10126660.
16.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
17.
Scalable software control of million-element cyber-physical systems using a graphics processing unit
by Krunic, Veljko, Ph.D.  University of Colorado at Boulder. 2010: 260 pages; 3433308.
18.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
19.
Traveling Domain Theory: A Comparative Approach for Cyberspace Theory Development
by McCarthy, Thomas David, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2012: 343 pages; 3516575.
21.
Cross-Layer Design for Secure and Resilient Control of Cyber-Physical Systems in Smart Cities
by Xu, Zhiheng, Ph.D.  New York University Tandon School of Engineering. 2018: 225 pages; 10840627.
22.
The Relationship between Psychopathic Personality Traits and Lying
by Dobrow, Jason A., Ph.D.  University of South Florida. 2016: 98 pages; 10112575.
23.
Academic honesty in the digital age
by Ananou, T. Simeon, D.Ed.  Indiana University of Pennsylvania. 2014: 194 pages; 3615494.
25.
A Cyber Physical Approach and Framework for Micro Devices Assembly
by Albuhamood, Sadiq, Ph.D.  Oklahoma State University. 2017: 116 pages; 10608345.
26.
Cyber War in a Small War Environment
by Hermann, Rory Michael, Jr., M.S.  Utica College. 2017: 56 pages; 10271200.
27.
Electronic discovery
by Keck, Andrew G., M.S.  Utica College. 2016: 58 pages; 10101099.
28.
U.S. and NATO Cyber Defense: Bridging the Resource Gap with a Centralized Market Structure
by Lipke, Alexa, M.A.  The George Washington University. 2016: 71 pages; 10189713.
29.
Cyber Physical Security Analysis for Synchrophasor Applications
by Liu, Ren, Ph.D.  Washington State University. 2017: 148 pages; 10639030.
30.
Former Students' and Their Learning Coaches' Perceptions of Their Cyber-Charter School Experiences: A Case Study
by Shoemake, James J., D.Ed.  Indiana University of Pennsylvania. 2018: 185 pages; 10787137.
1 - 30 of 4295 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest