Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16802 open access dissertations and theses found for:
if(Cyber defense)  »   Refine Search
123.
Secure Distributed Inference
by Chen, Yuan, Ph.D.  Carnegie Mellon University. 2019: 169 pages; 13883829.
125.
Examining the relationship between organization systems and information security awareness
by Tintamusik, Yanarong, D.B.A.  Northcentral University. 2010: 183 pages; 3411167.
126.
How Geo-Strategy Can Be Improved Through Wargaming
by Sisson, Mark, D.S.S.  National American University. 2020: 102 pages; 27832518.
127.
Domain Name Service Trust Delegation in Cloud Computing: Exploitation, Risks, and Defense
by Laprade, Craig, M.S.  The George Washington University. 2021: 73 pages; 28156620.
128.
Probabilistic Clustering Ensemble Evaluation for Intrusion Detection
by McElwee, Steven M., Ph.D.  Nova Southeastern University. 2018: 166 pages; 10844875.
130.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
134.
Authoritative and Unbiased Geographic Services
by Adhikari, Naresh, Ph.D.  Mississippi State University. 2020: 184 pages; 27743848.
135.
Schemes for Surviving Advanced Persistent Threats
by Mehresh, Ruchika, Ph.D.  State University of New York at Buffalo. 2013: 159 pages; 3598713.
136.
Cybersecurity IR: A Thematic-analysis of Practitioner Plans, Policies, and Guidelines
by Fox, Michael B., Ph.D.  Trident University International. 2019: 192 pages; 13904714.
137.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
138.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
139.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
141.
A Deep Learning Approach to Detecting Covert Channels in the Domain Name System
by Peña, Tomás Antonio, T.D.  Capitol Technology University. 2020: 206 pages; 27735496.
142.
The Big Payback: How Corruption Taints Offset Agreements in International Defense Trade
by Lambrecht, Ryan Jay, LL.M.  The George Washington University. 2012: 82 pages; 1531549.
144.
Enhancing the Design of a Cybersecurity Risk Management Solution for Communities of Trust
by Fulford, James E., Jr., D.B.A.  University of South Florida. 2018: 180 pages; 10979126.
145.
A Cybersecurity Strategy for the Small Business
by Perez, Cesar, M.S.  Utica College. 2020: 49 pages; 28092738.
146.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
147.
Defense Institutional Building - Integrating the Work
by McIlwain, Carol J., Ph.D.  University of Maryland, College Park. 2017: 525 pages; 10269397.
148.
Expanding Department of Defense Employee's Access to Special Victims' Counsel Representation in the MSPB Forum
by Maldonado, Jeremy John, LL.M.  The George Washington University. 2018: 69 pages; 10807730.
149.
Practical Inference-Time Attacks against Machine-Learning Systems and a Defense against Them
by Sharif, Mahmood, Ph.D.  Carnegie Mellon University. 2019: 137 pages; 27662625.
150.
Strategies to Minimize the Effects of Information Security Threats on Business Performance
by Okoye, Stella Ifeyinwa, D.B.A.  Walden University. 2017: 197 pages; 10606454.
121 - 150 of 16802 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest