COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
10026 open access dissertations and theses found for:
if(DoS attacks)  »   Refine Search
151.
Behavior-based admission and access control for network security
by Frias-Martinez, Vanessa, Ph.D.  Columbia University. 2008: 167 pages; 3333480.
152.
Hacia una genealogía de la transculturación narrativa de Ángel Rama
by Duplat, Alfredo, Ph.D.  The University of Iowa. 2013: 190 pages; 3566634.
153.
An Exploration of Countermeasures to Defend Against Weaponized AI Malware Exploiting Facial Recognition
by Jalaluddin, Arooj Zafar, D.Sc.  Capitol Technology University. 2020: 197 pages; 28094887.
154.
Web browsers as operating systems: Supporting robust and secure web programs
by Reis, Charles, Ph.D.  University of Washington. 2009: 173 pages; 3370601.
155.
A Community-Driven Musical Syntax: Collaboration and Momentum in Guinean Malinke Dance Drumming
by Nicely, Tiffany M., Ph.D.  State University of New York at Buffalo. 2021: 242 pages; 28315212.
157.
Rape as a Tool of Recruitment and Retention in Terrorist Organizations
by Brownridge-Edwards, Rena', M.A.  The American University of Paris (France). 2014: 54 pages; 10305843.
158.
IDnet Mesh: Towards user accountability for the Internet
by Deng, Leiwen, Ph.D.  Northwestern University. 2010: 134 pages; 3402413.
159.
Discovering heap anomalies in the wild
by Jump, Maria Eva, Ph.D.  The University of Texas at Austin. 2009: 144 pages; 3373283.
160.
Images in the Rhetoric of the Far-Right in France and Germany
by Moreno, Brandon Alexander, M.A.  Northern Arizona University. 2018: 68 pages; 13421845.
161.
Detection of communication over DNSSEC covert channels
by Hands, Nicole M., M.S.  Purdue University. 2016: 82 pages; 10181541.
162.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
163.
A framework for enforcing information flow policies
by Mital, Bhuvan, M.S.  State University of New York at Stony Brook. 2010: 70 pages; 1477837.
164.
Transnational, Trans-Sectarian Engagement: A Revised Approach to U.S. Public Diplomacy toward Lebanon
by Trent, Deborah Lee, Ph.D.  The George Washington University. 2012: 379 pages; 3524305.
165.
166.
Defense Institutional Building - Integrating the Work
by McIlwain, Carol J., Ph.D.  University of Maryland, College Park. 2017: 525 pages; 10269397.
167.
Conspiracy Theory and 9/11
by de Benveniste, Isabelle Villon, M.A.  The American University of Paris (France). 2013: 52 pages; 10305840.
168.
169.
Evaluation and Design of Robust Neural Network Defenses
by Carlini, Nicholas, Ph.D.  University of California, Berkeley. 2018: 138 pages; 10931076.
170.
Allocation of Resources to Defend Spatially Distributed Networks Using Game Theoretic Allocations
by Kroshl, William M., Ph.D.  The George Washington University. 2015: 146 pages; 3669710.
171.
Strategies of violence and restraint in civil war
by Stanton, Jessica, Ph.D.  Columbia University. 2009: 494 pages; 3373719.
172.
An attack-resistant and rapid recovery desktop system
by Deshane, Todd, Ph.D.  Clarkson University. 2010: 149 pages; 3428987.
173.
Critical infrastructure protection
by Shwani, Hazim G., M.S.  Utica College. 2014: 55 pages; 1555605.
174.
An analysis of the use of nano silica to alkali-silica reaction in concrete
by Belkowitz, Jon, Ph.D.  Stevens Institute of Technology. 2015: 274 pages; 3715911.
175.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
176.
Detecting and characterizing malicious websites
by Xu, Li, Ph.D.  The University of Texas at San Antonio. 2014: 93 pages; 3637094.
177.
Defeating memory error exploits using automated software diversity
by Bhatkar, Sandeep, Ph.D.  State University of New York at Stony Brook. 2007: 123 pages; 3337612.
178.
A model of forensic analysis using goal-oriented logging
by Peisert, Sean Philip, Ph.D.  University of California, San Diego. 2007: 182 pages; 3246091.
179.
Cross-Layer Design for Secure and Resilient Control of Cyber-Physical Systems in Smart Cities
by Xu, Zhiheng, Ph.D.  New York University Tandon School of Engineering. 2018: 225 pages; 10840627.
180.
Statistical Analysis of Complex Network Structures and Node Removal Impacts on Their Performance
by Jahanpour, Ehsan, M.S.  Southern Illinois University at Edwardsville. 2013: 98 pages; 1546324.
151 - 180 of 10026 displayed.
« First < Previous |   3    4    5    6    7    8    9    10    11    12    13   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest