Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
5142 open access dissertations and theses found for:
if(Malicious URL)  »   Refine Search
61.
A Web-Based Security Framework in .NET Environment
by Melnikov, Arthur, M.S.  California State University, Long Beach. 2010: 107 pages; 1493039.
62.
Secure building automation system using Tesla protocol
by Wadhwa, Preeti H., M.S.  California State University, Long Beach. 2015: 60 pages; 1601311.
63.
The Effects of Inhibitory Control and Perceptual Attention on Cyber Security
by Pearson, Ed, III, Ph.D.  Mississippi State University. 2019: 144 pages; 13423953.
64.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
65.
Mechanisms for database intrusion detection and response
by Kamra, Ashish, Ph.D.  Purdue University. 2010: 144 pages; 3444799.
68.
Systemic effects of human factors in information security
by Kelley, Timothy D., Ph.D.  Indiana University. 2014: 153 pages; 3665483.
69.
Computational REST: A new model for decentralized, Internet-scale applications
by Erenkrantz, Justin Ryan, Ph.D.  University of California, Irvine. 2009: 208 pages; 3372349.
70.
Design and Implementation of Privacy-Preserving Surveillance
by Segal, Aaron, Ph.D.  Yale University. 2016: 162 pages; 10584958.
71.
Behavioral modeling of botnet populations viewed through internet protocol address space
by Weaver, Rhiannon Lisa, Ph.D.  Carnegie Mellon University. 2012: 204 pages; 3528576.
72.
A multi-dimensional trust-based reliable and secure protocol for mobile wireless networks
by Jonnalagadda Krishna Naidu, Prithvi Tej, M.S.  California State University, Long Beach. 2016: 53 pages; 10141521.
73.
Cyber-based behavioral modeling
by Robinson, David John, Ph.D.  Dartmouth College. 2010: 225 pages; 3426407.
74.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
75.
Evaluation of security methods for the prevention of malware on mobile devices
by Giacalone, Anthony S., M.S.  California State University, Long Beach. 2014: 87 pages; 1527936.
76.
Architecture and protocols for a high-performance, secure IEEE 802.11-based wireless mesh network
by Raniwala, Ashish, Ph.D.  State University of New York at Stony Brook. 2009: 215 pages; 3401726.
78.
Security and Performance Analysis for RFID Protocols
by Liang, Bing, M.Sc.  Singapore Management University (Singapore). 2011: 93 pages; 1489343.
79.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
80.
Performance analysis of software and hardware based firewalls against DDoS attacks
by Agus, Ruben, M.S.  California State University, Long Beach. 2014: 66 pages; 1568899.
81.
Enabling User Space Secure Hardware
by Coughlin, Aimee, Ph.D.  University of Colorado at Boulder. 2018: 137 pages; 10791863.
82.
Botnet Detection Using Graph Based Feature Clustering
by Akula, Ravi Kiran, M.S.  Mississippi State University. 2018: 69 pages; 10751733.
83.
Improving anonymity networks via end-to-end design
by Viecco, Camilo Hernan, Ph.D.  Indiana University. 2011: 140 pages; 3509948.
85.
Comparison of ad-hoc on demand distance vector and enhanced-ad-hoc on demand distance vector on vehicular ad-hoc networks
by Chandwasker, Tanmay, M.S.  California State University, Long Beach. 2016: 51 pages; 10011277.
86.
Architectures for secure cloud computing servers
by Szefer, Jakub M., Ph.D.  Princeton University. 2013: 355 pages; 3597568.
87.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
88.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
89.
Exploring Web Simplification for People with Cognitive Disabilities
by Hoehl, Jeffery Arthur, Ph.D.  University of Colorado at Boulder. 2016: 120 pages; 10108753.
90.
61 - 90 of 5142 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest