COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
10011 open access dissertations and theses found for:
if(DoS attacks)  »   Refine Search
62.
Schemes for Surviving Advanced Persistent Threats
by Mehresh, Ruchika, Ph.D.  State University of New York at Buffalo. 2013: 159 pages; 3598713.
64.
The impact of data breaches on market value of firms in the E-Commerce marketplace
by Washington, Kevin D., D.B.A.  Capella University. 2016: 84 pages; 10102712.
66.
Intrusion Detection in Controller Area Network Bus Using Deep Neural Network
by Sami, Muhammad, M.S.E.E.  California State University, Long Beach. 2020: 62 pages; 27833202.
67.
Leveraging Internet Background Radiation for Opportunistic Network Analysis
by Benson, Karyn, Ph.D.  University of California, San Diego. 2016: 278 pages; 10161733.
68.
Cyber Agility for Attack Deterrence and Deception
by Jafarian, Jafar Haadi, Ph.D.  The University of North Carolina at Charlotte. 2017: 200 pages; 10686943.
69.
An Investigation of Anomaly-based Ensemble Models for Multi-domain Intrusion Detection
by Mikhail, Joseph W., D.Engr.  The George Washington University. 2019: 117 pages; 10977908.
70.
Malware Vectors: A Technique for Discovering Defense Logics
by Stocco, Gabriel Fortunato, Ph.D.  Dartmouth College. 2014: 121 pages; 3685144.
71.
Distributed Security Paradigm for Resource-constrained Wireless Sensors in the Context of Internet of Things (IoT)
by Iqbal, Muhammad Aamir, Ph.D.  University of Louisiana at Lafayette. 2017: 130 pages; 10254391.
72.
73.
Byzantine survivable routing for mobile ad hoc networks
by Holmer, David, Ph.D.  The Johns Hopkins University. 2007: 101 pages; 3267877.
75.
PSON: Predictable service overlay networks
by Shamsi, Jawwad, Ph.D.  Wayne State University. 2009: 193 pages; 3366199.
76.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
77.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
78.
Defensive Strategies for the Internet of Things Sensors Using Bluetooth Low Energy
by Hamby, Mark Francis, D.Sc.  Capitol Technology University. 2020: 123 pages; 28319970.
79.
The effect of password management procedures on the entropy of user selected passwords
by Enamait, John D., Ph.D.  Indiana State University. 2012: 153 pages; 3507494.
80.
Benchmarks for Evaluating Anomaly-Based Intrusion Detection Solutions
by Miller, Nicholas J., M.S.  California State University, Long Beach. 2018: 30 pages; 10752128.
81.
DataVenom: A Genetic Algorithm Based Poisoning Attack Technique against Numeric Datasets
by Sloan, Joshua James, M.S.  University of Wyoming. 2020: 93 pages; 28257614.
82.
Security and Performance Analysis for RFID Protocols
by Liang, Bing, M.Sc.  Singapore Management University (Singapore). 2011: 93 pages; 1489343.
83.
Cyber Physical Security Analysis for Synchrophasor Applications
by Liu, Ren, Ph.D.  Washington State University. 2017: 148 pages; 10639030.
85.
Facilitating Frame Injection Exploits through SiK Radio Firmware Modification
by WIss, Victor Gordon, M.S.  Christopher Newport University. 2020: 72 pages; 27956517.
87.
Hardware-Assisted Protection and Isolation
by Wang, Jiang, Ph.D.  George Mason University. 2011: 126 pages; 3471624.
88.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
89.
Attack Space Reduction through Software Hardening and Specialization Using Compiler and Binary Analysis
by Quach, Anh, Ph.D.  State University of New York at Binghamton. 2020: 151 pages; 27958904.
61 - 90 of 10011 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest