Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
2574 open access dissertations and theses found for:
if(Cyber deterrence)  »   Refine Search
61.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
62.
Critical infrastructure protection
by Shwani, Hazim G., M.S.  Utica College. 2014: 55 pages; 1555605.
66.
Cyber-harassment in higher education: A study of institutional policies and procedures
by Schaefer-Ramirez, Victoria Ann, Ed.D.  Pepperdine University. 2017: 182 pages; 10265669.
68.
Enhancing the Design of a Cybersecurity Risk Management Solution for Communities of Trust
by Fulford, James E., Jr., D.B.A.  University of South Florida. 2018: 180 pages; 10979126.
69.
Reimagined: How the U.S. Defense Department Responds to Triggers and Organizes to Balance against Threats
by Roman, Javier Alexsandro, M.A.  The University of Texas at San Antonio. 2019: 100 pages; 13881251.
71.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
72.
Cybersecurity testing and intrusion detection for cyber-physical power systems
by Pan, Shengyi, Ph.D.  Mississippi State University. 2014: 161 pages; 3665497.
73.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
74.
Examining the relationship between organization systems and information security awareness
by Tintamusik, Yanarong, D.B.A.  Northcentral University. 2010: 183 pages; 3411167.
75.
Industrie 4.0 – gestaltung cyber-physischer logistiksysteme zur unterstützung des logistikmanagements in der smart factory
by Roy, Daniel Thomas, Ph.D.  Technische Universitaet Berlin (Germany). 2017: 13815733.
76.
Nation State Threat Actions Against Critical Energy Infrastructures
by Garner, Michael Wilson, Jr., M.S.  Utica College. 2017: 43 pages; 10686214.
77.
Classification of prevention through drama cyber-bullying programs in Nassau County
by Lenz, Valerie Robin, M.F.A.  State University of New York at Stony Brook. 2012: 50 pages; 1529628.
79.
Place and caste identification: Distanciation and spatial imaginaries on a caste-based social network
by Sam, Jillet Sarah, Ph.D.  University of Maryland, College Park. 2014: 376 pages; 3627672.
81.
The Impact of Three Strikes Laws on Crime Rates in the United States: A Panel Data Analysis
by Anadi, Ngozi Obeta, Ph.D.  Southern University and Agricultural and Mechanical College. 2011: 114 pages; 3487395.
82.
Building a Base for Cyber-autonomy
by Shoshitaishvili, Yan, Ph.D.  University of California, Santa Barbara. 2017: 178 pages; 10620012.
83.
Streaming Temporal Graphs
by Goodman, Eric L., Ph.D.  University of Colorado at Boulder. 2019: 155 pages; 13856468.
84.
Relationship between substance use and teen dating violence among urban Hispanic and African American youth
by Hernandez, Mayra Alejandra, M.S.W.  California State University, Long Beach. 2015: 76 pages; 1587903.
85.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
87.
The Effects of Inhibitory Control and Perceptual Attention on Cyber Security
by Pearson, Ed, III, Ph.D.  Mississippi State University. 2019: 144 pages; 13423953.
89.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
90.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
61 - 90 of 2574 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest