COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
10425 open access dissertations and theses found for:
if(Generative Attacks)  »   Refine Search
331.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
333.
Terror in Plainview: Terrorist-Gang Threats of Biological Weapons Usage
by Dones, D. Darell, Ph.D.  George Mason University. 2012: 242 pages; 3515298.
334.
Deep Learning for Digital Histopathology across Multiple Scales
by Hou, Le, Ph.D.  State University of New York at Stony Brook. 2019: 177 pages; 27670274.
336.
ROVER: A DNS-based method to detect and prevent IP hijacks
by Gersch, Joseph E., Ph.D.  Colorado State University. 2013: 179 pages; 3608195.
337.
The Emerging Threat of Domestic Terrorism and White Supremacist Groups: A Systematic-Review
by Campos, Jose, M.C.J.  University of Colorado Colorado Springs. 2020: 86 pages; 28260994.
339.
Time bending: Temporal malleability and organizational response in crisis situations
by Carson, Gary W., Ph.D.  University of South Florida. 2008: 238 pages; 3326031.
340.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
341.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
342.
A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems
by Jeddi, Zahra, Ph.D.  University of Louisiana at Lafayette. 2014: 178 pages; 3687692.
343.
344.
Positive emotions: An informational workshop
by Kessler, Rebecca M., M.S.  Pepperdine University. 2011: 62 pages; 1502555.
345.
Battling Spam and Sybils on the Social Web
by Wilson, Christo, Ph.D.  University of California, Santa Barbara. 2012: 329 pages; 3545102.
349.
Application of a Hidden Bayes Naïve Multiclass Classifier in Network Intrusion Detection
by Koc, Levent, Ph.D.  The George Washington University. 2013: 146 pages; 3546303.
350.
3x3: An exploration of systems and rules set forth on mechanical lettering devices based on a 3x3 grid structure
by Fitriani, Vivi A., M.F.A.  California State University, Long Beach. 2011: 10 pages; 1507653.
351.
352.
Architectures for cryptography accelerators
by Cohen, Aaron Ethan, Ph.D.  University of Minnesota. 2007: 199 pages; 3277590.
355.
Topic modeling for Wikipedia link disambiguation
by Skaggs, Bradley Alan, M.S.  University of Maryland, College Park. 2011: 58 pages; 1506659.
356.
Supervised and Unsupervised Learning for Semantics Distillation in Multimedia Processing
by Liu, Yu, Ph.D.  State University of New York at Buffalo. 2018: 150 pages; 10932367.
358.
Dynamic decomposition: A creative rearrangement of "waste"
by Pfeifer, Patrick F., M.A.  Northern Arizona University. 2013: 194 pages; 1537801.
359.
Side channel attack resistance: Migrating towards high level methods
by Borowczak, Mike, Ph.D.  University of Cincinnati. 2013: 183 pages; 3601397.
331 - 360 of 10425 displayed.
« First < Previous |   9    10    11    12    13    14    15    16    17    18    19   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest