Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
5152 open access dissertations and theses found for:
if(Malicious URL)  »   Refine Search
151.
Counteracting traffic congestion using intelligent driver feedback
by Drum, David K., M.S.  University of Missouri - Columbia. 2014: 133 pages; 10180875.
152.
An attack-resistant and rapid recovery desktop system
by Deshane, Todd, Ph.D.  Clarkson University. 2010: 149 pages; 3428987.
153.
Detection of communication over DNSSEC covert channels
by Hands, Nicole M., M.S.  Purdue University. 2016: 82 pages; 10181541.
154.
Regime shifts in ecology and evolution
by Boettiger, Carl, Ph.D.  University of California, Davis. 2012: 87 pages; 3555268.
155.
One-Electron Theories From the Generalized Pauli Exclusion Principle
by Chakraborty, Romit, Ph.D.  The University of Chicago. 2017: 83 pages; 10602042.
156.
Deep Dynamic Analysis of Android Applications
by Gustafson, Eric David, M.S.  University of California, Davis. 2014: 48 pages; 1565669.
157.
Automatic verification of string manipulating programs
by Yu, Fang, Ph.D.  University of California, Santa Barbara. 2010: 239 pages; 3422651.
159.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
160.
Intelligent Collaborative Gantry Crane
by Guo, Fangzheng, M.S.  Tufts University. 2017: 84 pages; 10253797.
161.
Improving Multiple Sequence Alignments by Revising Sequence Families with Alignment Scoring Approaches
by Levchuk, Aleksandr Olegovich, M.S.  University of California, Riverside. 2011: 72 pages; 1505602.
162.
WebSig: A digital signature framework for the web
by McCusker, James P., Ph.D.  Rensselaer Polytechnic Institute. 2015: 126 pages; 3727015.
163.
An Investigation of Anomaly-based Ensemble Models for Multi-domain Intrusion Detection
by Mikhail, Joseph W., D.Engr.  The George Washington University. 2019: 117 pages; 10977908.
164.
A Descriptive Analysis of Ethnicity, Personality, Gender in Relation to Leadership Frameworks
by Leviticus, James Andrew, XII, Ed.D.  Trevecca Nazarene University. 2018: 95 pages; 10831400.
165.
The Exceptionalist's Approach to Private Sector Cybersecurity: A Marque and Reprisal Model
by Hopkins, Michael Todd, LL.M.  The George Washington University. 2011: 88 pages; 1505935.
166.
Scalable Web Service Development with Amazon Web Services
by McElhiney, Patrick R., M.S.  University of New Hampshire. 2018: 83 pages; 10931435.
169.
Privilege Leakage in Practical Systems
by Grace, Michael C., Ph.D.  North Carolina State University. 2017: 114 pages; 10969800.
170.
Cybersecurity testing and intrusion detection for cyber-physical power systems
by Pan, Shengyi, Ph.D.  Mississippi State University. 2014: 161 pages; 3665497.
171.
Investigations of Standard Model and Exotic Monophoton Signatures at Center of Mass Energy = 7 TeV
by Miceli, Tia Marie, Ph.D.  University of California, Davis. 2013: 120 pages; 3596924.
173.
174.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
177.
Sentiment analysis based on appraisal theory and functional local grammars
by Bloom, Kenneth, Ph.D.  Illinois Institute of Technology. 2011: 265 pages; 3504518.
178.
On the Dynamics of Glassy Systems
by Yan, Le, Ph.D.  New York University. 2015: 222 pages; 3740916.
179.
180.
Distributed intelligent spectrum management in cognitive radio ad hoc networks
by Song, Yi, Ph.D.  The University of North Carolina at Charlotte. 2013: 265 pages; 3589813.
151 - 180 of 5152 displayed.
« First < Previous |   3    4    5    6    7    8    9    10    11    12    13   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest