Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
43433 open access dissertations and theses found for:
if(Data exfiltration)  »   Refine Search
1.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
2.
Iranian Cyber Espionage
by Spataro, Jason G., M.S.  Utica College. 2019: 72 pages; 13877649.
3.
Investigating energy consumption of coastal vacation rental homes
by Myers, Sam, M.S.  East Carolina University. 2014: 50 pages; 1583707.
4.
A multi-channel defense against communication denial -of -service attacks in wireless networks
by Alnifie, Ghada Matooq, Ph.D.  George Mason University. 2008: 165 pages; 3338544.
5.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
6.
A Methodology for Making Early Comparative Architecture Performance Evaluations
by Doyle, Gerald S., Ph.D.  George Mason University. 2010: 269 pages; 3437816.
9.
Streaming Temporal Graphs
by Goodman, Eric L., Ph.D.  University of Colorado at Boulder. 2019: 155 pages; 13856468.
10.
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
by Lombardo, Gary, Ph.D.  Capella University. 2018: 121 pages; 10751570.
11.
Effects of urban development on groundwater flow systems and streamflow generation
by Bhaskar, Aditi Seth, Ph.D.  University of Maryland, Baltimore County. 2013: 196 pages; 3609831.
12.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
13.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
15.
16.
Determinants of insurgency activity in Afghanistan: A cross-provincial analysis
by Counihan, Michael Alan, M.A.  Georgetown University. 2011: 54 pages; 1491322.
20.
Internet Protocol version Six (IPv6) at UC Davis: Traffic Analysis with a Security Perspective
by Ard, Julia Boxwell, M.S.  University of California, Davis. 2012: 115 pages; 1519649.
21.
Data sharing across research and public communities
by He, Yurong, Ph.D.  University of Maryland, College Park. 2016: 345 pages; 10242315.
22.
Over-the-Counter Data's Impact on Educators' Data Analysis Accuracy
by Rankin, Jenny Grant, Ph.D.  Northcentral University. 2013: 485 pages; 3575082.
23.
Data governance: The missing approach to improving data quality
by Barker, James M., DM/IST  University of Phoenix. 2016: 293 pages; 10248424.
24.
Clustering transient data streams by example and by variable
by Chaovalit, Pimwadee, Ph.D.  University of Maryland, Baltimore County. 2009: 224 pages; 3359104.
25.
Interpolation with prediction -error filters and training data
by Curry, William, Ph.D.  Stanford University. 2008: 190 pages; 3313828.
26.
An investigation of data privacy and utility using machine learning as a gauge
by Mivule, Kato, D.Sc.  Bowie State University. 2014: 262 pages; 3619387.
27.
A Location-Aware Architecture Supporting Intelligent Real-Time Mobile Applications
by Barbeau, Sean J., Ph.D.  University of South Florida. 2012: 245 pages; 3518695.
28.
Improving Enterprise Data Governance Through Ontology and Linked Data
by DeStefano, R.J., D.P.S.  Pace University. 2016: 150 pages; 10097925.
29.
Data Use: Administrators' Perspectives
by Gonz├ílez-Cauley, Wendy L., Ed.D.  The George Washington University. 2018: 196 pages; 10689772.
30.
Randomization based privacy preserving categorical data analysis
by Guo, Ling, Ph.D.  The University of North Carolina at Charlotte. 2010: 127 pages; 3439261.
1 - 30 of 43433 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest