Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
2578 open access dissertations and theses found for:
if(Cyber deterrence)  »   Refine Search
91.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
92.
Exploring internet users' vulnerability to online dating fraud: Analysis of routine activities theory factors
by Garrett, Elena Victorovna, M.S.  The University of Texas at Dallas. 2014: 124 pages; 1583633.
95.
Uncertainty Aggregation in System Performance Assessment
by Nannapanemi, Saideep, Ph.D.  Vanderbilt University. 2017: 188 pages; 13835161.
96.
Botnet Detection Using Graph Based Feature Clustering
by Akula, Ravi Kiran, M.S.  Mississippi State University. 2018: 69 pages; 10751733.
97.
Fusia: Future situation and impact awareness
by Holsopple, Jared, Ph.D.  State University of New York at Buffalo. 2016: 193 pages; 10127757.
99.
Malware Vectors: A Technique for Discovering Defense Logics
by Stocco, Gabriel Fortunato, Ph.D.  Dartmouth College. 2014: 121 pages; 3685144.
101.
Hardware-in-the-Loop Modeling and Simulation Methods for Daylight Systems in Buildings
by Mead, Alex Robert, Ph.D.  University of California, Berkeley. 2017: 378 pages; 10283149.
102.
Information Security Risk Analysis and Advanced Persistent Threat: A Multiple Case Study
by Zuhdi, Barham, D.B.A.  Northcentral University. 2018: 178 pages; 10837747.
104.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
105.
SRAM reliability improvement using ECC and circuit techniques
by McCartney, Mark P., Ph.D.  Carnegie Mellon University. 2014: 131 pages; 3733956.
106.
Private Packet Filtering Searching for Sensitive Indicators without Revealing the Indicators in Collaborative Environments
by Oehler, Michael John, Ph.D.  University of Maryland, Baltimore County. 2013: 207 pages; 3609975.
108.
Cybersecurity IR: A Thematic-analysis of Practitioner Plans, Policies, and Guidelines
by Fox, Michael B., Ph.D.  Trident University International. 2019: 192 pages; 13904714.
109.
Internet usage, self-efficacy, and proactive coping skills
by Zurawski, Janina, M.S.W.  California State University, Long Beach. 2015: 62 pages; 1585527.
111.
112.
In the Shadows: The Illicit Tobacco Trade and Cryptomarkets
by Barrera, Viviana, M.S.  California State University, Long Beach. 2018: 61 pages; 10977616.
113.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
115.
Probabilistic Clustering Ensemble Evaluation for Intrusion Detection
by McElwee, Steven M., Ph.D.  Nova Southeastern University. 2018: 166 pages; 10844875.
116.
An Examination of Catholic School Teachers' Perceptions and Legal Understanding of Cyberbullying
by Boyer, Mary Beth, Ed.D.  Loyola Marymount University. 2015: 145 pages; 3739705.
117.
119.
Agricultural nutrient management in the Neuse River Basin: Exploring the links between mandates, motivations, and behavior
by Wittenborn, Alyssa, Ph.D.  The University of North Carolina at Chapel Hill. 2012: 238 pages; 3509348.
120.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
91 - 120 of 2578 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest