Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
14159 open access dissertations and theses found for:
if(Intrusion detection)  »   Refine Search
31.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
32.
Behavior-based admission and access control for network security
by Frias-Martinez, Vanessa, Ph.D.  Columbia University. 2008: 167 pages; 3333480.
33.
The effect of nonideal sorption on contaminant transport in groundwater and vapor: Statistical and modeling tools
by Singh, Anshuman, Ph.D.  State University of New York at Buffalo. 2013: 118 pages; 3554502.
34.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
35.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
36.
37.
Thwarting malicious and selfish behavior in commodity Wi -Fi networks
by Ma, Liran, D.Sc.  The George Washington University. 2008: 123 pages; 3320933.
38.
Defeating Insider Attacks via Autonomic Self-Protective Networks
by Sibai, Faisal M., Ph.D.  George Mason University. 2012: 139 pages; 3503962.
40.
Building cognitive radio for physical layer intrusion detection
by Khairatkar, Mukul Anil, M.S.  California State University, Long Beach. 2009: 66 pages; 1472393.
41.
Cyber Physical Security Analysis for Synchrophasor Applications
by Liu, Ren, Ph.D.  Washington State University. 2017: 148 pages; 10639030.
42.
The Effects of Intermittent Drinking Water Supply in Arraij√°n, Panama
by Erickson, John Joseph, Ph.D.  University of California, Berkeley. 2016: 101 pages; 10192492.
43.
Botnet Detection Using Graph Based Feature Clustering
by Akula, Ravi Kiran, M.S.  Mississippi State University. 2018: 69 pages; 10751733.
44.
Cyber Agility for Attack Deterrence and Deception
by Jafarian, Jafar Haadi, Ph.D.  The University of North Carolina at Charlotte. 2017: 200 pages; 10686943.
45.
Acceleration of streaming applications on FPGAs from high level constructs
by Mitra, Abhishek, Ph.D.  University of California, Riverside. 2008: 192 pages; 3341851.
46.
Leadership styles and information security in small businesses: An empirical investigation
by Bhattacharya, Debasis, D.B.A.  University of Phoenix. 2008: 252 pages; 3324059.
47.
Barrier coverage: Deploying robot guards to prevent intrusion
by Kloder, Stephen, Ph.D.  University of Illinois at Urbana-Champaign. 2008: 139 pages; 3314962.
48.
An attack-resistant and rapid recovery desktop system
by Deshane, Todd, Ph.D.  Clarkson University. 2010: 149 pages; 3428987.
50.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
55.
Malware Vectors: A Technique for Discovering Defense Logics
by Stocco, Gabriel Fortunato, Ph.D.  Dartmouth College. 2014: 121 pages; 3685144.
56.
Dynamic content generation for the evaluation of network applications
by Valgenti, Victor Craig, Ph.D.  Washington State University. 2012: 146 pages; 3517443.
57.
A Coherent Classifier/Prediction/Diagnostic Problem Framework and Relevant Summary Statistics
by Eiland, E. Earl, Ph.D.  New Mexico Institute of Mining and Technology. 2017: 173 pages; 10617960.
58.
Inertia effect of the heart as a contributing factor in aortic injuries in near-side impacts
by Echemendia Fuentes, Cristina G., M.S.  The George Washington University. 2008: 164 pages; 1478895.
59.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
60.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
31 - 60 of 14159 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest