Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16791 open access dissertations and theses found for:
if(Cyber defense)  »   Refine Search
33.
Reimagined: How the U.S. Defense Department Responds to Triggers and Organizes to Balance against Threats
by Roman, Javier Alexsandro, M.A.  The University of Texas at San Antonio. 2019: 100 pages; 13881251.
34.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
35.
Cyber War in a Small War Environment
by Hermann, Rory Michael, Jr., M.S.  Utica College. 2017: 56 pages; 10271200.
36.
A Qualitative Case Study on Secondary Educators’ Perceptions and Practices in Cyber-Bullying Incidents
by Robertson-Armstrong, Sharon , Ed.D.  Northcentral University. 2020: 175 pages; 27837782.
37.
Critical Infrastructure: Legislative Factors for Preventing a "Cyber-Pearl Harbor"
by Palmer, Robert Kenneth, LL.M.  The George Washington University. 2013: 75 pages; 1545831.
39.
Iranian Cyber Espionage
by Spataro, Jason G., M.S.  Utica College. 2019: 72 pages; 13877649.
41.
A Dissertation on the Testing Approaches of Autonomous Cyber-Physical Systems
by Behles, Cody, Ph.D.  The University of Memphis. 2020: 118 pages; 28002820.
43.
Scalable software control of million-element cyber-physical systems using a graphics processing unit
by Krunic, Veljko, Ph.D.  University of Colorado at Boulder. 2010: 260 pages; 3433308.
44.
A new distributed framework for cyber attack detection and classification
by Gutta, Sandeep, M.S.  Oklahoma State University. 2011: 86 pages; 1506488.
45.
Cyber-based behavioral modeling
by Robinson, David John, Ph.D.  Dartmouth College. 2010: 225 pages; 3426407.
46.
An Economic Analysis of Cyber Warfare Governance Models
by Kelleher, Kevin M., M.A.  University of Denver. 2020: 97 pages; 28088728.
47.
Academic honesty in the digital age
by Ananou, T. Simeon, D.Ed.  Indiana University of Pennsylvania. 2014: 194 pages; 3615494.
50.
Private Packet Filtering Searching for Sensitive Indicators without Revealing the Indicators in Collaborative Environments
by Oehler, Michael John, Ph.D.  University of Maryland, Baltimore County. 2013: 207 pages; 3609975.
51.
A Case Study in Safety Engineering Processes for Security Engineering Use
by Hall, Jeffery, D.Sc.  Capitol Technology University. 2018: 165 pages; 27835541.
52.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
53.
Defensive Model for Protecting Sensitive Information
by Johnson, Dana R., D.I.T.  Capella University. 2020: 135 pages; 28263420.
54.
Nanopower Analog Frontends for Cyber-Physical Systems
by Aono, Kenji, Ph.D.  Washington University in St. Louis. 2018: 208 pages; 13425251.
55.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
57.
Former Students' and Their Learning Coaches' Perceptions of Their Cyber-Charter School Experiences: A Case Study
by Shoemake, James J., D.Ed.  Indiana University of Pennsylvania. 2018: 185 pages; 10787137.
59.
A Cyber Physical Approach and Framework for Micro Devices Assembly
by Albuhamood, Sadiq, Ph.D.  Oklahoma State University. 2017: 116 pages; 10608345.
60.
A Security Strategy for the United States of America
by Pedersen, Christian E.||||||Payne, Michael A.||||||Gagner, Cari, M.P.P.  Pepperdine University. 2014: 91 pages; 1594924.
31 - 60 of 16791 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest