Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
9272 open access dissertations and theses found for:
if(DoS attacks)  »   Refine Search
1.
The Implications of the Internet's Topological Structure for Its Efficiency, Security, and Reliability
by Nur, Abdullah Yasin, Ph.D.  University of Louisiana at Lafayette. 2018: 170 pages; 10980025.
2.
Coping in post-myocardial infarction patients and spouses/companions at risk for sudden cardiac death
by Rockelli, Laurie Ann, Ph.D.  University of Maryland, Baltimore. 2008: 241 pages; 3340407.
3.
Performance analysis of software and hardware based firewalls against DDoS attacks
by Agus, Ruben, M.S.  California State University, Long Beach. 2014: 66 pages; 1568899.
4.
A multi-channel defense against communication denial -of -service attacks in wireless networks
by Alnifie, Ghada Matooq, Ph.D.  George Mason University. 2008: 165 pages; 3338544.
5.
Localizing the effects of link flooding attacks in the Internet
by Lee, Soo Bum, Ph.D.  University of Maryland, College Park. 2009: 142 pages; 3397793.
6.
Diagnosis-based Intrusion Detection
by Jackson, Conner Patrick Stearns, M.S.  University of California, Davis. 2016: 97 pages; 10124452.
7.
8.
Honeypot with Honeypot Management System for web applications
by Karia, Rutu, M.S.  California State University, Long Beach. 2011: 85 pages; 1504488.
9.
Cyber terrorrism threats
by Gobran, Ashraf, M.S.  Utica College. 2015: 48 pages; 1588500.
10.
A new distributed framework for cyber attack detection and classification
by Gutta, Sandeep, M.S.  Oklahoma State University. 2011: 86 pages; 1506488.
12.
On the feasibility of intrusion detection system in wireless sensor network
by Murarka, Kishore Ramkisan, M.S.  California State University, Long Beach. 2012: 86 pages; 1517746.
13.
Detecting attacks in building automation system
by Nama, Sumanth, M.S.  California State University, Long Beach. 2015: 45 pages; 1597784.
14.
The Moderating Effect of Negative Childhood Experiences on the Development of Differentiation of Self
by Swanberg-Hjelm, Julie Christina, Ph.D.  Northcentral University. 2020: 209 pages; 27742227.
15.
Case Study of a Prevented School Rampage Attack at a Rural-Suburban High School
by Morell, Nicholas, III, Ed.D.  Wilkes University. 2013: 185 pages; 3560131.
16.
Polymorphic attacks and network topology: Application of concepts from natural systems
by Rangan, Prahalad, Ph.D.  State University of New York at Albany. 2010: 102 pages; 3402465.
17.
Enhanced adaptive acknowledgment intrusion detection for mobile ad-hoc network
by Benede Umapathy, Rakesh, M.S.  California State University, Long Beach. 2017: 49 pages; 10253596.
18.
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
by LeDoux, Charles, Ph.D.  University of Louisiana at Lafayette. 2016: 179 pages; 10245924.
19.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
20.
Application of a Hidden Bayes Naïve Multiclass Classifier in Network Intrusion Detection
by Koc, Levent, Ph.D.  The George Washington University. 2013: 146 pages; 3546303.
21.
Dynamics and characteristics of dissolved organic carbon, nitrogen, and sulfur in the Arbutus Lake Watershed in the Adirondack Mountains of New York State
by Kang, Phil-Goo, Ph.D.  State University of New York College of Environmental Science and Forestry. 2016: 215 pages; 10117985.
23.
Defeating Insider Attacks via Autonomic Self-Protective Networks
by Sibai, Faisal M., Ph.D.  George Mason University. 2012: 139 pages; 3503962.
24.
Practical Inference-Time Attacks against Machine-Learning Systems and a Defense against Them
by Sharif, Mahmood, Ph.D.  Carnegie Mellon University. 2019: 137 pages; 27662625.
26.
An Examination of User Detection of Business eMail Compromise amongst Corporate Professionals
by Aviv, Shahar Sean, Ph.D.  Nova Southeastern University. 2019: 141 pages; 27667282.
27.
Sensitization Characterization of 5083 and 5456 Aluminum Alloys using Ultrasound
by Chukwunonye, Chukwunonye U., M.S.  University of Louisiana at Lafayette. 2014: 63 pages; 1557540.
28.
Causation or Coincidence: The Relationship Between EU Border Policies and Islamic State Attacks
by Hardy, Margaret, M.A.  The George Washington University. 2019: 85 pages; 22618018.
29.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
30.
Statistical analysis and information leakage attacks on encrypted network traffic
by Wright, Charles V., III, Ph.D.  The Johns Hopkins University. 2008: 210 pages; 3309817.
1 - 30 of 9272 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest