Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
5293 open access dissertations and theses found for:
if(Malicious URL)  »   Refine Search
211.
Using Code Inspection, Code Modification, and Machine Learning to prevent SQL Injection
by Trumble, Brandon, M.S.  Kutztown University of Pennsylvania. 2015: 50 pages; 1590429.
212.
Multimedia protection using content and embedded fingerprints
by Varna, Avinash Laxmisha, Ph.D.  University of Maryland, College Park. 2011: 208 pages; 3461319.
213.
Factors Predicting Teacher Attitudes toward Inclusive Education
by McCarthy, Michael, Ph.D.  Indiana State University. 2019: 82 pages; 13856628.
214.
Design and Analysis of Arduino, Raspberry Pi, and Xbee Based Wireless Sensor Networks
by Cassero, Sean Alexander, M.S.  University of California, Santa Barbara. 2016: 82 pages; 10191719.
215.
Cognitive factors in perspective-based reading (PBR): A protocol analysis study
by Robbins, Bryan Thomas, III, M.S.  Mississippi State University. 2009: 113 pages; 1462656.
216.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
217.
Understanding the Value and Motivation of an Undergraduate Degree: An Analysis From Business Degree Alumni
by Bozeman, Pamela Lydia, Ed.D.  Northern Arizona University. 2019: 217 pages; 13880328.
218.
A hybrid approach for ontology-based information extraction
by Gutierrez, Fernando, Ph.D.  University of Oregon. 2015: 132 pages; 10006380.
221.
Hobbes on drugs: Understanding drug violence in Mexico
by Osorio, Javier, Ph.D.  University of Notre Dame. 2013: 485 pages; 3738644.
222.
224.
225.
The Role of Self-efficacy in Self-regulation Learning in Online College Courses
by Glenn, Ivonne, Ph.D.  Northcentral University. 2018: 195 pages; 10810134.
226.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
227.
Search and ranking in semantically rich applications
by Stoyanovich, Julia, Ph.D.  Columbia University. 2010: 220 pages; 3400637.
228.
Attitudes Toward Tetun Dili, a Language of East Timor
by Ross, Melody Ann, Ph.D.  University of Hawai'i at Manoa. 2017: 360 pages; 10805640.
229.
Elicitation of a Program's Behaviors
by Miles, Craig S., Ph.D.  University of Louisiana at Lafayette. 2015: 134 pages; 10002454.
230.
Cattle ranching on the western Great Plains: A study of adaptive decision-making
by Wilmer, Hailey, Ph.D.  Colorado State University. 2016: 169 pages; 10195482.
231.
Context Dependent Activity in Rat Hippocampus during Performance of a Three Arm Delayed Sequence Task
by Lustig, Brian R., Ph.D.  The University of Chicago. 2018: 98 pages; 10979254.
232.
Byzantine survivable routing for mobile ad hoc networks
by Holmer, David, Ph.D.  The Johns Hopkins University. 2007: 101 pages; 3267877.
234.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
236.
Semantically Enhanced Traceability across Software and System-Related Natural Language Artifacts
by Guo, Jin L. C., Ph.D.  University of Notre Dame. 2017: 181 pages; 13836191.
237.
Behavior-based admission and access control for network security
by Frias-Martinez, Vanessa, Ph.D.  Columbia University. 2008: 167 pages; 3333480.
238.
Adapting Swarm Applications: A Systematic and Quantitative Approach
by Zhang, Ben, Ph.D.  University of California, Berkeley. 2018: 100 pages; 10931111.
240.
Leadership styles and information security in small businesses: An empirical investigation
by Bhattacharya, Debasis, D.B.A.  University of Phoenix. 2008: 252 pages; 3324059.
211 - 240 of 5293 displayed.
« First < Previous |   5    6    7    8    9    10    11    12    13    14    15   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest