COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
10015 open access dissertations and theses found for:
if(DoS attacks)  »   Refine Search
241.
The Exceptionalist's Approach to Private Sector Cybersecurity: A Marque and Reprisal Model
by Hopkins, Michael Todd, LL.M.  The George Washington University. 2011: 88 pages; 1505935.
244.
Analysis and Applications of the Locally Competitive Algorithm
by Paiton, Dylan M., Ph.D.  University of California, Berkeley. 2019: 99 pages; 13885693.
245.
A moral evaluation of terrorism
by Thurmond, Angela, Ph.D.  The University of Oklahoma. 2010: 140 pages; 3412126.
246.
Racism, Islamophobia and Nationalism in France; A Case Study of the Role of History, Islam in French Society, and Recent Events
by Galludec, Laure-Anne Julia Alice , M.A.  The American University of Paris (France). 2018: 59 pages; 27605881.
250.
An Event Management Framework to Aid Solution Providers in Cybersecurity
by Leon, Ryan James, D.Engr.  The George Washington University. 2018: 114 pages; 10745141.
251.
A Maximin Optimization Method for Improved System Performance
by Liaghati, Hassan Robert, Ph.D.  The George Washington University. 2021: 124 pages; 28410744.
252.
Design Automation for Carbon Nanotube Circuits Considering Performance and Security Optimization
by Liu, Lin, Ph.D.  Michigan Technological University. 2017: 169 pages; 10267186.
253.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
254.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
255.
Mechanisms underlying distortions in flashbulb memories for September 11, 2001
by Winkel, Rebecca, Ph.D.  New School University. 2009: 77 pages; 3359052.
256.
M-AdaBoost-A Based Ensemble System for Network Intrusion Detection
by Zhou, Ying, Ph.D.  The George Washington University. 2021: 128 pages; 28256014.
257.
Extensible Performance-aware Runtime Integrity Measurement
by Delgado, Brian G., Ph.D.  Portland State University. 2020: 234 pages; 27741720.
258.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
260.
Statutory Response to Court Security Concerns
by Weller, Charles E., Ph.D.  University of Nevada, Reno. 2013: 169 pages; 3608800.
261.
The Onion Name System: Tor-powered distributed DNS for tor hidden services
by Victors, Jesse, M.C.S.  Utah State University. 2015: 72 pages; 1598486.
262.
Architecture and protocols for a high-performance, secure IEEE 802.11-based wireless mesh network
by Raniwala, Ashish, Ph.D.  State University of New York at Stony Brook. 2009: 215 pages; 3401726.
263.
Imperial excess: Corruption and decadence in Portuguese India (1660–1706)
by Chaturvedula, Nandini, Ph.D.  Columbia University. 2010: 309 pages; 3400632.
265.
The politics and implementation of U.S. refugee resettlement policy: A street-level analysis
by Darrow, Jessica Hutchison, Ph.D.  The University of Chicago. 2015: 236 pages; 3687143.
268.
269.
La pregunta de la bestia: el hombre-lobo en bestiarios como catalizador del cyborg
by Salas Pitre, Denise Joan, M.A.  University of Puerto Rico, Rio Piedras (Puerto Rico). 2020: 60 pages; 28001598.
241 - 270 of 10015 displayed.
« First < Previous |   6    7    8    9    10    11    12    13    14    15    16   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest