Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
5963 open access dissertations and theses found for:
if(Malicious URL)  »   Refine Search
62.
The Effects of Inhibitory Control and Perceptual Attention on Cyber Security
by Pearson, Ed, III, Ph.D.  Mississippi State University. 2019: 144 pages; 13423953.
63.
Cybersecurity of wireless implantable medical devices
by Ash, Sarah L., M.S.  Utica College. 2016: 51 pages; 10109631.
64.
A Deep Learning Approach to Detecting Covert Channels in the Domain Name System
by Peña, Tomás Antonio, T.D.  Capitol Technology University. 2020: 206 pages; 27735496.
65.
Frequency based advertisement blocking on Android mobile devices using a local VPN server
by Ozsoy, Metehan, M.S.  California State University, Long Beach. 2016: 36 pages; 10182135.
66.
Routing in the dark: Pitch black
by Evans, Nathan S., M.S.  University of Denver. 2009: 84 pages; 1465595.
67.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
68.
Performance analysis of software and hardware based firewalls against DDoS attacks
by Agus, Ruben, M.S.  California State University, Long Beach. 2014: 66 pages; 1568899.
69.
Systemic effects of human factors in information security
by Kelley, Timothy D., Ph.D.  Indiana University. 2014: 153 pages; 3665483.
70.
A policy analysis of phishing countermeasures
by Sheng, Xinguang (Steve), Ph.D.  Carnegie Mellon University. 2009: 181 pages; 3383412.
71.
Securing mobile ad hoc networks
by Gudapati, Supriya, M.S.  California State University, Long Beach. 2015: 31 pages; 1604882.
72.
An Educational Operating System Supporting Computer Security
by McGee, Patrick J., M.S.  Marquette University. 2020: 52 pages; 27838086.
73.
Fully countering trusting trust through Diverse Double-Compiling
by Wheeler, David A., Ph.D.  George Mason University. 2010: 199 pages; 3393623.
74.
Attack Space Reduction through Software Hardening and Specialization Using Compiler and Binary Analysis
by Quach, Anh, Ph.D.  State University of New York at Binghamton. 2020: 151 pages; 27958904.
75.
Rethinking information privacy for the web
by Tierney, Matthew Ryan, Ph.D.  New York University. 2013: 161 pages; 3602740.
77.
Practical Inference-Time Attacks against Machine-Learning Systems and a Defense against Them
by Sharif, Mahmood, Ph.D.  Carnegie Mellon University. 2019: 137 pages; 27662625.
78.
Computational REST: A new model for decentralized, Internet-scale applications
by Erenkrantz, Justin Ryan, Ph.D.  University of California, Irvine. 2009: 208 pages; 3372349.
79.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
80.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
82.
Ensuring security and authentication using zero knowledge protocol in wireless sensor network applications
by Matta Veera Venkata, Sudheer, M.S.  California State University, Long Beach. 2015: 55 pages; 1604873.
83.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
84.
Mechanisms for database intrusion detection and response
by Kamra, Ashish, Ph.D.  Purdue University. 2010: 144 pages; 3444799.
85.
Forensic Accountants' Strategies and Cybercrime Mitigation
by Okechukwu, Joseph Chukwudi, D.B.A.  Northcentral University. 2020: 201 pages; 27830687.
86.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
87.
Secure Distributed Inference
by Chen, Yuan, Ph.D.  Carnegie Mellon University. 2019: 169 pages; 13883829.
88.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
61 - 90 of 5963 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest