Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
2302 open access dissertations and theses found for:
if(Cyber forensics)  »   Refine Search
2.
Cyber terrorrism threats
by Gobran, Ashraf, M.S.  Utica College. 2015: 48 pages; 1588500.
3.
6.
Electronic discovery
by Keck, Andrew G., M.S.  Utica College. 2016: 58 pages; 10101099.
7.
Microsoft 365 and Exchange Server Hybrid Forensics
by Carlson, Alex, M.S.  Utica College. 2019: 71 pages; 27670117.
8.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
10.
How U.S. political and socio-economic trends promotes hacktivist activity
by Aviles, Grisselle, M.S.  Utica College. 2015: 85 pages; 1590361.
11.
Cyber Agility for Attack Deterrence and Deception
by Jafarian, Jafar Haadi, Ph.D.  The University of North Carolina at Charlotte. 2017: 200 pages; 10686943.
12.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
13.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
14.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
15.
Digital and multimedia forensics justified: An appraisal on professional policy and legislation
by Popejoy, Amy Lynnette, M.S.  University of Colorado at Denver. 2015: 56 pages; 1598313.
16.
The Role and Impact of Cyber Security Mentoring
by Ellithorpe, James O., Ph.D.  Walden University. 2016: 467 pages; 10126660.
18.
Windows hibernation and memory forensics
by Ayers, Amy L., M.S.  Utica College. 2015: 67 pages; 1586690.
20.
Photo forensics from partial constraints
by Kee, Eric, Ph.D.  Dartmouth College. 2013: 124 pages; 3613660.
21.
Effects of clipping distortion on an Automatic Speaker Recognition system
by Ramirez, Jose Luis, M.S.  University of Colorado at Denver. 2016: 51 pages; 10112619.
22.
The Role of Diverse Skill Sets in Incident Response
by Moore, Sandra, T.D.  Capitol Technology University. 2019: 128 pages; 27662834.
23.
Industrie 4.0 – gestaltung cyber-physischer logistiksysteme zur unterstützung des logistikmanagements in der smart factory
by Roy, Daniel Thomas, Ph.D.  Technische Universitaet Berlin (Germany). 2017: 13815733.
24.
Cyber Mobs: A Model for Improving Protections for Internet Users
by Lazarus, Seth A., M.S.  Utica College. 2017: 79 pages; 10271260.
25.
Defending Forensics as a Tool for Assessment
by Hall, Douglas A., M.A.  Southern Illinois University at Edwardsville. 2013: 64 pages; 1543923.
26.
Misinterpretation of Digital Evidence: Recommendations to Improve Data Integrity
by Bednar-Schadle, Teresa, M.S.  Utica College. 2018: 73 pages; 13423713.
27.
Solid State Disk forensics: Is there a path forward?
by Fulton, John William, M.S.  Utica College. 2014: 47 pages; 1555597.
28.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
29.
30.
Scalable software control of million-element cyber-physical systems using a graphics processing unit
by Krunic, Veljko, Ph.D.  University of Colorado at Boulder. 2010: 260 pages; 3433308.
1 - 30 of 2302 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest