COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
10011 open access dissertations and theses found for:
if(DoS attacks)  »   Refine Search
31.
Application of a Hidden Bayes Naïve Multiclass Classifier in Network Intrusion Detection
by Koc, Levent, Ph.D.  The George Washington University. 2013: 146 pages; 3546303.
33.
Dynamics and characteristics of dissolved organic carbon, nitrogen, and sulfur in the Arbutus Lake Watershed in the Adirondack Mountains of New York State
by Kang, Phil-Goo, Ph.D.  State University of New York College of Environmental Science and Forestry. 2016: 215 pages; 10117985.
35.
Background and Occlusion Defenses Against Adversarial Examples and Adversarial Patches
by McCoyd, Michael J., Ph.D.  University of California, Berkeley. 2020: 75 pages; 28090541.
36.
Causation or Coincidence: The Relationship Between EU Border Policies and Islamic State Attacks
by Hardy, Margaret, M.A.  The George Washington University. 2019: 85 pages; 22618018.
37.
Evolving Ransomware Attacks on Healthcare Providers
by Al Qartah, Ayed, M.S.  Utica College. 2020: 70 pages; 28093945.
38.
Cybersecurity testing and intrusion detection for cyber-physical power systems
by Pan, Shengyi, Ph.D.  Mississippi State University. 2014: 161 pages; 3665497.
39.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
40.
Sensitization Characterization of 5083 and 5456 Aluminum Alloys using Ultrasound
by Chukwunonye, Chukwunonye U., M.S.  University of Louisiana at Lafayette. 2014: 63 pages; 1557540.
41.
Automatic Program State Exploration Techniques for Security Analysis of Android Apps
by Johnson, Ryan, Ph.D.  George Mason University. 2019: 211 pages; 27667472.
42.
Towards the Exploration and Improvement of Generative Adversarial Attacks
by Leone, Stephen, M.E.  The Cooper Union for the Advancement of Science and Art. 2020: 130 pages; 27994576.
43.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
44.
Statistical analysis and information leakage attacks on encrypted network traffic
by Wright, Charles V., III, Ph.D.  The Johns Hopkins University. 2008: 210 pages; 3309817.
46.
Electric Power Grid Resilience against Electromagnetic Pulse (EMP) Disturbances
by Wang, Dingwei, M.S.  The George Washington University. 2020: 93 pages; 27956165.
47.
Attacks on difficult instances of graph isomorphism: Sequential and parallel algorithms
by Tener, Greg Daniel, Ph.D.  University of Central Florida. 2009: 153 pages; 3401107.
48.
Securing multi-channel wireless networks against malicious behavior
by Zheng, Chaodong, Ph.D.  National University of Singapore (Singapore). 2015: 136 pages; 10006123.
49.
Septation: An Eye-Witness (Re)Composition of the September 11 Attacks
by Weinstein, Joshua Irving, M.A.  University of California, San Diego. 2011: 36 pages; 1496662.
50.
Secure Distributed Inference
by Chen, Yuan, Ph.D.  Carnegie Mellon University. 2019: 169 pages; 13883829.
51.
Examining Predation Risk as a Guide for Mitigating Large Carnivore Attacks on Livestock
by Miller, Jennifer Rose Bunnell, Ph.D.  Yale University. 2015: 208 pages; 3663650.
52.
Framing Of The Mumbai Terror Attacks By The Indian and The Pakistani Print Media
by Raina, Pamposh, M.A.  The George Washington University. 2011: 80 pages; 1489046.
55.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
56.
Exploiting Human Factors in User Authentication
by Gupta, Payas, Ph.D.  Singapore Management University (Singapore). 2013: 170 pages; 3601349.
59.
Performance evaluation of SIP authentication and TLS
by Maguluri, Swapna, M.S.C.E.  California State University, Long Beach. 2012: 121 pages; 1520910.
60.
Security and Privacy Challenges in Content-Centric Networks
by Wood, Christopher A., Ph.D.  University of California, Irvine. 2017: 337 pages; 10684217.
31 - 60 of 10011 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest