Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
5288 open access dissertations and theses found for:
if(Malicious URL)  »   Refine Search
2.
Detecting and characterizing malicious websites
by Xu, Li, Ph.D.  The University of Texas at San Antonio. 2014: 93 pages; 3637094.
3.
Proactive cyberfraud detection through infrastructure analysis
by Kalafut, Andrew J., Ph.D.  Indiana University. 2010: 153 pages; 3423688.
4.
Honeypot with Honeypot Management System for web applications
by Karia, Rutu, M.S.  California State University, Long Beach. 2011: 85 pages; 1504488.
5.
Battling Spam and Sybils on the Social Web
by Wilson, Christo, Ph.D.  University of California, Santa Barbara. 2012: 329 pages; 3545102.
6.
Unbiased Phishing Detection Using Domain Name Based Features
by Shirazi, Hossein, M.S.  Colorado State University. 2018: 72 pages; 10826588.
7.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
8.
Study of W32/NetSky.Q worm and malicious website detection using packed malware string search
by Dongre, Ankush, M.S.  California State University, Long Beach. 2011: 94 pages; 1504450.
9.
From FLOWCORE to JITFLOW: Improving the speed of Information Flow in JavaScript
by Hennigan, Eric, Ph.D.  University of California, Irvine. 2015: 193 pages; 3688532.
10.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
11.
Polymorphic attacks and network topology: Application of concepts from natural systems
by Rangan, Prahalad, Ph.D.  State University of New York at Albany. 2010: 102 pages; 3402465.
12.
Awareness of malicious social engineering among facebook users
by Slonka, Kevin J., D.Sc.  Robert Morris University. 2014: 140 pages; 3620246.
13.
Techniques for detecting zero day phishing websites
by Blasi, Michael, M.S.  Iowa State University. 2009: 89 pages; 1465719.
14.
Leveraging Internet Background Radiation for Opportunistic Network Analysis
by Benson, Karyn, Ph.D.  University of California, San Diego. 2016: 278 pages; 10161733.
15.
Navigating the Malweb: Authentication Schemes for Mobile Devices
by Niu, Yuan, Ph.D.  University of California, Davis. 2011: 116 pages; 3474442.
16.
Protecting mobile ad hoc networks by cooperative defense and energy-oriented approach
by Kuthumbaka, Ajith Madhav, M.S.  California State University, Long Beach. 2016: 36 pages; 1606703.
17.
Web browsers as operating systems: Supporting robust and secure web programs
by Reis, Charles, Ph.D.  University of Washington. 2009: 173 pages; 3370601.
18.
19.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
by Osei-Amanfi, Michael, D.B.A.  Grand Canyon University. 2018: 359 pages; 13423232.
20.
Three research essays on human behaviors in Social Media
by Wu, Jiao Aimee, Ph.D.  The University of Wisconsin - Milwaukee. 2015: 151 pages; 3732607.
21.
Relationship between User Privacy and Application Permissions in Smartphone Platforms
by Caushaj, Eralda, Ph.D.  Oakland University. 2017: 159 pages; 10639215.
22.
The effects of conformity and training in a phishing context: Conforming to the school of phish
by Jones, Matt, M.A.  The University of Alabama in Huntsville. 2015: 43 pages; 10182209.
23.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
24.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
26.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
28.
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
by LeDoux, Charles, Ph.D.  University of Louisiana at Lafayette. 2016: 179 pages; 10245924.
29.
Exploring the effect of cognitive load on the propensity for query reformulation behavior
by Na, Kyoungsik, Ph.D.  The Florida State University. 2012: 178 pages; 3539828.
30.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
1 - 30 of 5288 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest