Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16934 open access dissertations and theses found for:
if(Cyber defense)  »   Refine Search
391.
Predicting Political Development After United States Military Assistance: Evidence from Case Study Analysis
by Alaniz, Susan Rae, Ph.D.  The University of Southern Mississippi. 2020: 499 pages; 28030655.
393.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
394.
Toxic Desecration: Science and the Sacred in Navajo Environmentalism
by Dunstan, Adam Darron, Ph.D.  State University of New York at Buffalo. 2016: 352 pages; 10127784.
395.
A Model-Based Framework for Predicting Autonomous Unmanned Ground Vehicle System Performance
by Young, Stuart Harry, Ph.D.  The George Washington University. 2016: 135 pages; 10124164.
397.
Executive Perception of the Nature of Their Involvement in Forming and Sustaining Cross-Sector Strategic Alliances
by Shields, Philip W., D.E.Lead.  University of Charleston - Beckley. 2017: 263 pages; 10743439.
398.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
399.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
400.
Talking the Talk: An Exploration of Parent-Child Communication about Cyberbullying
by Droser, Veronica Anne, M.S.  Portland State University. 2013: 120 pages; 1547403.
401.
Is a European Union Foreign Policy Possible?
by Cobuccio, Marie-Victoire, M.A.  The American University of Paris (France). 2014: 93 pages; 10305846.
402.
Relationship of Organizational Structures in Higher Education to Risk Management
by Asante, Robert, Ed.D.  University of Pennsylvania. 2019: 230 pages; 27664719.
403.
Hybrid simulation with distributed substructures including overlapping domains
by Cortes-Delgado, Maria D., Ph.D.  State University of New York at Buffalo. 2014: 425 pages; 3612962.
404.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
405.
Unite against bullying an educational after-school program: A grant proposal
by Bautista, Paloma, M.S.W.  California State University, Long Beach. 2014: 66 pages; 1527884.
407.
Rhetoric, the First Amendment, and cyberbullying: An examination of space and place in American law
by Primack, Alvin Jack, M.A.  California State University, Long Beach. 2016: 130 pages; 10105279.
409.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
411.
Validating Petri Net Models of Cyberattacks
by Christensen, Nicholas M., M.S.  The University of Alabama in Huntsville. 2017: 102 pages; 10608103.
412.
Electric Power Grid Resilience against Electromagnetic Pulse (EMP) Disturbances
by Wang, Dingwei, M.S.  The George Washington University. 2020: 93 pages; 27956165.
413.
Mobile Phone Use in a Pennsylvania Public High School: Does Policy Inform Practice?
by Thackara, Susan Tomchak, Ed.D.  Wilkes University. 2014: 127 pages; 3610219.
414.
How Distributed Ledger Technology is Transforming the Financial Marketplace
by Bougas, Michelle, M.S.  Utica College. 2016: 72 pages; 10245691.
415.
An exploratory study of the impact of school-wide positive behavior support on bullying
by Wilson, Lindsay A., Ed.S.  California State University, Long Beach. 2014: 78 pages; 1528071.
416.
A Coherent Classifier/Prediction/Diagnostic Problem Framework and Relevant Summary Statistics
by Eiland, E. Earl, Ph.D.  New Mexico Institute of Mining and Technology. 2017: 173 pages; 10617960.
417.
Integrating Immature Systems and Program Schedule Growth
by Kamp, John C., D.Engr.  The George Washington University. 2019: 116 pages; 10979355.
418.
Understanding Security Education Training and Awareness Program Impact: A Study of Recipient Motivation
by Duffy, Christopher Scott, D.B.A.  Capitol Technology University. 2019: 222 pages; 27737299.
419.
The bidding war: Proliferation over eBay
by Grundy, Kenneth G., M.S.  California State University, Long Beach. 2013: 102 pages; 1527378.
420.
ROVER: A DNS-based method to detect and prevent IP hijacks
by Gersch, Joseph E., Ph.D.  Colorado State University. 2013: 179 pages; 3608195.
391 - 420 of 16934 displayed.
« First < Previous |   11    12    13    14    15    16    17    18    19    20    21   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest