Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
747 open access dissertations and theses found for:
if(IoT forensics)  »   Refine Search
4.
Effects of clipping distortion on an Automatic Speaker Recognition system
by Ramirez, Jose Luis, M.S.  University of Colorado at Denver. 2016: 51 pages; 10112619.
5.
6.
Photo forensics from partial constraints
by Kee, Eric, Ph.D.  Dartmouth College. 2013: 124 pages; 3613660.
7.
Microsoft 365 and Exchange Server Hybrid Forensics
by Carlson, Alex, M.S.  Utica College. 2019: 71 pages; 27670117.
8.
Defending Forensics as a Tool for Assessment
by Hall, Douglas A., M.A.  Southern Illinois University at Edwardsville. 2013: 64 pages; 1543923.
9.
Progression and Edge Intelligence Framework for IoT Systems
by Huang, Zhenqiu, Ph.D.  University of California, Irvine. 2016: 152 pages; 10168486.
10.
Enhancing the Internet of Things Architecture with Flow Semantics
by DeSerranno, Allen Ronald, D.B.A.  University of South Florida. 2017: 152 pages; 10636797.
11.
Windows hibernation and memory forensics
by Ayers, Amy L., M.S.  Utica College. 2015: 67 pages; 1586690.
12.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
13.
Behavior modeling and forensics for multimedia social networks
by Lin, Wan-Yi, Ph.D.  University of Maryland, College Park. 2009: 253 pages; 3372974.
15.
Solid State Disk forensics: Is there a path forward?
by Fulton, John William, M.S.  Utica College. 2014: 47 pages; 1555597.
16.
Digital and multimedia forensics justified: An appraisal on professional policy and legislation
by Popejoy, Amy Lynnette, M.S.  University of Colorado at Denver. 2015: 56 pages; 1598313.
17.
A Review of Closed Canine Forensics DNA Case Reports from the University of California, Davis
by Scharnhorst, Gunther Konrad, M.S.  University of California, Davis. 2010: 36 pages; 1489390.
18.
Protecting Privacy of Data in the Internet of Things with Policy Enforcement Fog Module
by Al-Hasnawi, Abduljaleel, Ph.D.  Western Michigan University. 2018: 130 pages; 13877008.
20.
Distributed Security Paradigm for Resource-constrained Wireless Sensors in the Context of Internet of Things (IoT)
by Iqbal, Muhammad Aamir, Ph.D.  University of Louisiana at Lafayette. 2017: 130 pages; 10254391.
21.
Multi-sensor-based occupancy monitoring for energy efficient smart buildings based on internet of things
by Pradeep Kumar, Harshvardhan, M.S.  California State University, Long Beach. 2016: 28 pages; 10096079.
23.
Business Process Management in the Digital Age: Advancements in Data, Networks, and Opportunities
by Seyfried, Johannes, D.Econ.  Universitaet Bayreuth (Germany). 2019: 64 pages; 27628203.
24.
Secure system simulation - Internet of Things
by Verma, Yukti, M.S.  California State University, Long Beach. 2016: 48 pages; 10116148.
25.
Misinterpretation of Digital Evidence: Recommendations to Improve Data Integrity
by Bednar-Schadle, Teresa, M.S.  Utica College. 2018: 73 pages; 13423713.
28.
Toward a model rule Statutory imprecision and surrogate decision-making for pregnant women
by Appel, Jacob M., M.P.H.  Icahn School of Medicine at Mount Sinai. 2013: 103 pages; 1535747.
29.
The Google Chrome operating system forensic artifacts
by Corbin, George, M.S.  Utica College. 2014: 68 pages; 1571599.
1 - 30 of 747 displayed.
  1    2    3    4    5    6    7    8    9    10   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest