COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
10009 open access dissertations and theses found for:
if(DoS attacks)  »   Refine Search
121.
Secure NFC enabled mobile phone payments using elliptic curve cryptography (SNFCMP)
by Byambajav, Dolgorsuren, M.S.  California State University, Long Beach. 2011: 76 pages; 1504435.
122.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
123.
Proactive cyberfraud detection through infrastructure analysis
by Kalafut, Andrew J., Ph.D.  Indiana University. 2010: 153 pages; 3423688.
124.
Analyzing Red and Gray Stages of Bark Beetle Attack in the San Bernardino National Forest Using Remote Sensing
by Morgan, Andy J., M.A.  California State University, Long Beach. 2017: 87 pages; 10263607.
126.
127.
ROVER: A DNS-based method to detect and prevent IP hijacks
by Gersch, Joseph E., Ph.D.  Colorado State University. 2013: 179 pages; 3608195.
128.
Repairable file and storage systems
by Zhu, Ningning, Ph.D.  State University of New York at Stony Brook. 2008: 239 pages; 3358208.
129.
Intercultural Preparedness of Health Professionals Working in Low Socio-Economic Communities in São Paulo, Brazil
by Ortega, Renee, Ph.D.  The Chicago School of Professional Psychology. 2021: 137 pages; 28315514.
130.
A Comparative Study of Lattice Based Algorithms for Post Quantum Computing
by Easttom, William Charles, II, D.B.A.  Capitol Technology University. 2018: 141 pages; 13901281.
131.
Striking a Balance The Evolution of Today's Private Military and Security Industry in the United States
by Hagengruber, Dana, M.A.  The George Washington University. 2009: 119 pages; 1531253.
132.
Gaza: A case study of urban destruction through military involvement
by Ahmad, Nadiah N., M.A.  Temple University. 2011: 121 pages; 1494435.
133.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
134.
Digital currency wallet for mobile devices
by Jose, Mamitha, M.S.  California State University, Long Beach. 2011: 102 pages; 1504486.
135.
A Theoretical Analysis of Integral Theory and the Participatory Paradigm through the Lens of Otherness
by Fernandez-Borsot, Gabriel, Ph.D.  California Institute of Integral Studies. 2017: 463 pages; 10618494.
136.
Holocene hunter-gatherer plant use and foraging choice: a test from Minas Gerais, Brazil
by Shock, Myrtle Pearl, Ph.D.  University of California, Santa Barbara. 2010: 588 pages; 3428018.
137.
In-toto: Practical Software Supply Chain Security
by Torres-Arias, Santiago, Ph.D.  New York University Tandon School of Engineering. 2020: 128 pages; 27963570.
138.
Defensive Model for Protecting Sensitive Information
by Johnson, Dana R., D.I.T.  Capella University. 2020: 135 pages; 28263420.
139.
Comparison of ad-hoc on demand distance vector and enhanced-ad-hoc on demand distance vector on vehicular ad-hoc networks
by Chandwasker, Tanmay, M.S.  California State University, Long Beach. 2016: 51 pages; 10011277.
140.
Techniques for Enhancing the Security of Future Smart Grids
by Saed, Mustafa, Ph.D.  University of Detroit Mercy. 2018: 444 pages; 10793626.
142.
Network traffic analysis through statistical signal processing methods
by AsSadhan, Basil Abdullah, Ph.D.  Carnegie Mellon University. 2009: 104 pages; 3394005.
143.
Zero-Day Defense: Discovering and Removing Vulnerabilities throughProgram Customization and Fuzzing
by Chen, Yurong, D.Engr.  The George Washington University. 2020: 102 pages; 27740940.
144.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
145.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
146.
At a sword's length: Theatrical dueling in early modern Spanish drama
by Long, Hugh K., Ph.D.  Tufts University. 2010: 193 pages; 3403440.
147.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
148.
Hacia una genealogía de la transculturación narrativa de Ángel Rama
by Duplat, Alfredo, Ph.D.  The University of Iowa. 2013: 190 pages; 3566634.
149.
S4h: A Peer-to-Peer Search Engine with Explicit Trust
by Cowan, Greg, M.S.  Rensselaer Polytechnic Institute. 2019: 49 pages; 13813168.
150.
Structuring Disincentives for Online Criminals
by Leontiadis, Nektarios, Ph.D.  Carnegie Mellon University. 2014: 370 pages; 3691274.
121 - 150 of 10009 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest