Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
46417 open access dissertations and theses found for:
if(East Asia security)  »   Refine Search
331.
The Integration of China's Dual-track Social Security System and Its Impact
by Lingxiao, Luo, M.S.  National University of Singapore (Singapore). 2015: 44 pages; 10006057.
332.
Human Trafficking: Flying under the Radar
by Hulsey, Amber Lee, Ph.D.  The University of Southern Mississippi. 2018: 239 pages; 10752077.
333.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
334.
Security and Performance Analysis for RFID Protocols
by Liang, Bing, M.Sc.  Singapore Management University (Singapore). 2011: 93 pages; 1489343.
336.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
337.
Unconventional warfare in U.S. foreign policy: U.S. support of insurgencies in Afghanistan, Nicaragua, and Iraq from 1979-2001
by Linnington, Abigail T., Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2013: 367 pages; 3559052.
341.
Formal End-to-End Verification of Information-Flow Security for Complex Systems
by Costanzo, David, Ph.D.  Yale University. 2016: 165 pages; 10584941.
342.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
343.
Techniques for detecting zero day phishing websites
by Blasi, Michael, M.S.  Iowa State University. 2009: 89 pages; 1465719.
344.
Geopolitics in the Caucasus: Nagorno-Karabakh
by Austin, Elizabeth, M.A.  The American University of Paris (France). 2012: 50 pages; 10305806.
345.
Cyber Physical Security Analysis for Synchrophasor Applications
by Liu, Ren, Ph.D.  Washington State University. 2017: 148 pages; 10639030.
346.
An exploratory study of contracted security officers' retention
by de los Santos Lozano, Gerardo, Ed.D.  Pepperdine University. 2012: 162 pages; 3503832.
347.
A framework for the governance of information security
by Edwards, Charles K., Ph.D.  Nova Southeastern University. 2013: 228 pages; 3607548.
348.
Moving East of Eden: A Depth Psychological Perspective on Love and Heartbreak
by Messer, Julie K., M.A.  Pacifica Graduate Institute. 2012: 61 pages; 1511320.
349.
Policy Analysis of the Homeland Security Act of 2002
by Huchim, Jennifer, M.S.W.  California State University, Long Beach. 2018: 62 pages; 10751639.
350.
Divorced women, poverty, and the Social Security Act: A policy analysis
by Schellenberg, Diana Lynne, M.S.W.  California State University, Long Beach. 2010: 56 pages; 1486525.
351.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
352.
353.
Evaluation of security methods for the prevention of malware on mobile devices
by Giacalone, Anthony S., M.S.  California State University, Long Beach. 2014: 87 pages; 1527936.
354.
355.
Assessing the Influence of Building Geometry on Active Shooter Event Outcomes
by Dane, Kristopher R., D.Engr.  The George Washington University. 2018: 115 pages; 10841977.
356.
An analysis of the formation and evolution of the 1989 Western North Pacific subtropical gyre
by Crandall, Brian A., M.S.  State University of New York at Albany. 2012: 91 pages; 1515491.
357.
Quantitative analyses of software vulnerabilities
by Joh, HyunChul, Ph.D.  Colorado State University. 2011: 224 pages; 3489881.
358.
A human-centered approach to improving the user experience of software updates
by Mathur, Arunesh, M.S.  University of Maryland, College Park. 2016: 111 pages; 10161060.
331 - 360 of 46417 displayed.
« First < Previous |   9    10    11    12    13    14    15    16    17    18    19   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest