Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
250 open access dissertations and theses found for:
if(Cybersecurity)  »   Refine Search
1.
Understanding Federal Cybersecurity Culture: An Expert Perspective on Current and Ideal State
by Sousane, Richard, Ed.D.  The George Washington University. 2018: 198 pages; 10785377.
2.
Exploring cybersecurity requirements in the defense acquisition process
by Zeng, Kui, D.Sc.  Capitol Technology University. 2016: 292 pages; 10165487.
3.
Applying Random Forest to Mitigate Cybersecurity Data Breaches in Small Businesses
by Liguori, Patricia Ann, D.Engr.  The George Washington University. 2018: 177 pages; 10928320.
4.
Enhancing the Design of a Cybersecurity Risk Management Solution for Communities of Trust
by Fulford, James E., Jr., D.B.A.  University of South Florida. 2018: 180 pages; 10979126.
5.
An Event Management Framework to Aid Solution Providers in Cybersecurity
by Leon, Ryan James, D.Engr.  The George Washington University. 2018: 114 pages; 10745141.
6.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
8.
Cybersecurity Workforce Alert: Women's Perspectives on Factors Influencing Female Interest
by Pifer, Carrie L., Ed.D.  Frostburg State University. 2017: 172 pages; 10744000.
9.
Critical infrastructure protection
by Shwani, Hazim G., M.S.  Utica College. 2014: 55 pages; 1555605.
11.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
12.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
14.
Critical Infrastructure: Legislative Factors for Preventing a "Cyber-Pearl Harbor"
by Palmer, Robert Kenneth, LL.M.  The George Washington University. 2013: 75 pages; 1545831.
15.
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
by Lombardo, Gary, Ph.D.  Capella University. 2018: 121 pages; 10751570.
16.
17.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
18.
Cybersecurity of wireless implantable medical devices
by Ash, Sarah L., M.S.  Utica College. 2016: 51 pages; 10109631.
19.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
20.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
21.
Cybersecurity of unmanned aircraft systems (UAS)
by Gomez, Cesar A., M.S.  Utica College. 2015: 70 pages; 1605296.
22.
U.S. and NATO Cyber Defense: Bridging the Resource Gap with a Centralized Market Structure
by Lipke, Alexa, M.A.  The George Washington University. 2016: 71 pages; 10189713.
23.
The Exceptionalist's Approach to Private Sector Cybersecurity: A Marque and Reprisal Model
by Hopkins, Michael Todd, LL.M.  The George Washington University. 2011: 88 pages; 1505935.
24.
Cybersecurity IR: A Thematic-analysis of Practitioner Plans, Policies, and Guidelines
by Fox, Michael B., Ph.D.  Trident University International. 2019: 192 pages; 13904714.
25.
Electronic discovery
by Keck, Andrew G., M.S.  Utica College. 2016: 58 pages; 10101099.
26.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
27.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
29.
Iranian Cyber Espionage
by Spataro, Jason G., M.S.  Utica College. 2019: 72 pages; 13877649.
1 - 30 of 250 displayed.
  1    2    3    4    5    6    7    8    9   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest