Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
5149 open access dissertations and theses found for:
if(Malicious URL)  »   Refine Search
31.
Enhanced adaptive acknowledgment intrusion detection for mobile ad-hoc network
by Benede Umapathy, Rakesh, M.S.  California State University, Long Beach. 2017: 49 pages; 10253596.
32.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
33.
Securing multi-channel wireless networks against malicious behavior
by Zheng, Chaodong, Ph.D.  National University of Singapore (Singapore). 2015: 136 pages; 10006123.
34.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
35.
Detecting attacks in building automation system
by Nama, Sumanth, M.S.  California State University, Long Beach. 2015: 45 pages; 1597784.
36.
Detection and Prevention of Misuse of Software Components
by Ting, Dai, Ph.D.  National University of Singapore (Singapore). 2015: 141 pages; 10005992.
37.
Exploring the effect of cognitive load on the propensity for query reformulation behavior
by Na, Kyoungsik, Ph.D.  The Florida State University. 2012: 178 pages; 3539828.
39.
Iranian Cyber Espionage
by Spataro, Jason G., M.S.  Utica College. 2019: 72 pages; 13877649.
40.
Cybersecurity of wireless implantable medical devices
by Ash, Sarah L., M.S.  Utica College. 2016: 51 pages; 10109631.
41.
Behavior modeling and forensics for multimedia social networks
by Lin, Wan-Yi, Ph.D.  University of Maryland, College Park. 2009: 253 pages; 3372974.
42.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
43.
Securing mobile ad hoc networks
by Gudapati, Supriya, M.S.  California State University, Long Beach. 2015: 31 pages; 1604882.
44.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
45.
Routing in the dark: Pitch black
by Evans, Nathan S., M.S.  University of Denver. 2009: 84 pages; 1465595.
46.
Frequency based advertisement blocking on Android mobile devices using a local VPN server
by Ozsoy, Metehan, M.S.  California State University, Long Beach. 2016: 36 pages; 10182135.
47.
Toward Automated Worldwide Monitoring of Network-Level Censorship
by Weinberg, Zachary, Ph.D.  Carnegie Mellon University. 2018: 112 pages; 13425933.
48.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
49.
Using Spammers' Computing Resources for Volunteer Computing
by Bui, Thai Le Quy, M.S.  Portland State University. 2014: 90 pages; 1553892.
50.
Analytical optimized approach for peer-to-peer systems based on self-organizing trust model
by Manda, Akshay Reddy, M.S.  California State University, Long Beach. 2016: 54 pages; 10108180.
51.
Structuring Disincentives for Online Criminals
by Leontiadis, Nektarios, Ph.D.  Carnegie Mellon University. 2014: 370 pages; 3691274.
52.
Fully countering trusting trust through Diverse Double-Compiling
by Wheeler, David A., Ph.D.  George Mason University. 2010: 199 pages; 3393623.
53.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
54.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
55.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
56.
Ensuring security and authentication using zero knowledge protocol in wireless sensor network applications
by Matta Veera Venkata, Sudheer, M.S.  California State University, Long Beach. 2015: 55 pages; 1604873.
57.
Thwarting malicious and selfish behavior in commodity Wi -Fi networks
by Ma, Liran, D.Sc.  The George Washington University. 2008: 123 pages; 3320933.
60.
Rethinking information privacy for the web
by Tierney, Matthew Ryan, Ph.D.  New York University. 2013: 161 pages; 3602740.
31 - 60 of 5149 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest