Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16794 open access dissertations and theses found for:
if(Cyber defense)  »   Refine Search
302.
The contextualized rapid resolution cycle intervention model for cyberbullying
by Walker, Jenny L., Ph.D.  Arizona State University. 2009: 203 pages; 3392128.
304.
An Examination of User Detection of Business eMail Compromise amongst Corporate Professionals
by Aviv, Shahar Sean, Ph.D.  Nova Southeastern University. 2019: 141 pages; 27667282.
305.
Cyberbullying in Illinois public schools
by Roskamp, Tami Jo, Ed.D.  Western Illinois University. 2009: 237 pages; 3355863.
307.
The Role of Ubiquitination in the Innate Immune System in Arabidopsis
by Guo, Tingwei, Ph.D.  The University of Alabama. 2018: 101 pages; 10815633.
308.
Assessing the Probability of Prototyping Success in Systems Acquisitions (APOPS)
by Medlej, Maroun, Ph.D.  The George Washington University. 2017: 270 pages; 10614977.
310.
An Event Management Framework to Aid Solution Providers in Cybersecurity
by Leon, Ryan James, D.Engr.  The George Washington University. 2018: 114 pages; 10745141.
311.
Perceptions of Cyberbullying within Higher Education
by Luker, Julie Marie, Ed.D.  Hamline University. 2015: 240 pages; 3710778.
312.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
313.
Bullying education and prevention program a grant proposal project
by Tapia, Melissa, M.S.W.  California State University, Long Beach. 2015: 76 pages; 1586171.
316.
Evolving Ransomware Attacks on Healthcare Providers
by Al Qartah, Ayed, M.S.  Utica College. 2020: 70 pages; 28093945.
317.
Cybersecurity of wireless implantable medical devices
by Ash, Sarah L., M.S.  Utica College. 2016: 51 pages; 10109631.
319.
The relationship between African American attitudes toward affirmative action and organizational commitment
by Massingale, Clifton L., Jr., D.B.A.  University of Phoenix. 2011: 211 pages; 3514601.
320.
Role of the Internet in the Sexual Exploitation of Children
by Deep, Danielle, M.S.  Utica College. 2016: 57 pages; 10153533.
321.
Understanding Controls to Detect and Mitigate Malicious Privileged User Abuse
by Harris, Clyde Devince, D.Sc.  Capitol Technology University. 2020: 210 pages; 28088128.
324.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
325.
Peer victimization among youth with anxiety disorders
by Cohen, Jeremy, Ph.D.  Temple University. 2013: 114 pages; 3552314.
326.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
327.
The healthy relationships safe communities project: a teen dating violence prevention program: a grant proposal
by Myers, Kellisa Christine, M.S.W.  California State University, Long Beach. 2015: 69 pages; 1590137.
328.
Misinterpretation of Digital Evidence: Recommendations to Improve Data Integrity
by Bednar-Schadle, Teresa, M.S.  Utica College. 2018: 73 pages; 13423713.
329.
330.
301 - 330 of 16794 displayed.
« First < Previous |   8    9    10    11    12    13    14    15    16    17    18   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest