Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
5293 open access dissertations and theses found for:
if(Malicious URL)  »   Refine Search
91.
Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
by Herr, Trey, Ph.D.  The George Washington University. 2016: 317 pages; 10076294.
92.
Use of double-loop learning to combat advanced persistent threat: Multiple case studies
by Lamb, Christopher J., Ph.D.  Capella University. 2013: 151 pages; 3607034.
93.
Comparison of ad-hoc on demand distance vector and enhanced-ad-hoc on demand distance vector on vehicular ad-hoc networks
by Chandwasker, Tanmay, M.S.  California State University, Long Beach. 2016: 51 pages; 10011277.
94.
Validating Petri Net Models of Cyberattacks
by Christensen, Nicholas M., M.S.  The University of Alabama in Huntsville. 2017: 102 pages; 10608103.
95.
Exploring Web Simplification for People with Cognitive Disabilities
by Hoehl, Jeffery Arthur, Ph.D.  University of Colorado at Boulder. 2016: 120 pages; 10108753.
96.
Applying Random Forest to Mitigate Cybersecurity Data Breaches in Small Businesses
by Liguori, Patricia Ann, D.Engr.  The George Washington University. 2018: 177 pages; 10928320.
97.
98.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
99.
Dynamic content generation for the evaluation of network applications
by Valgenti, Victor Craig, Ph.D.  Washington State University. 2012: 146 pages; 3517443.
100.
Authenticating executions for trusted systems
by Aktas, Erdem, Ph.D.  State University of New York at Binghamton. 2013: 215 pages; 3596989.
101.
Streaming Temporal Graphs
by Goodman, Eric L., Ph.D.  University of Colorado at Boulder. 2019: 155 pages; 13856468.
102.
A framework for cost-sensitive automated selection of intrusion response
by Strasburg, Christopher Roy, M.S.  Iowa State University. 2009: 76 pages; 1468160.
104.
Evaluation and Design of Robust Neural Network Defenses
by Carlini, Nicholas, Ph.D.  University of California, Berkeley. 2018: 138 pages; 10931076.
106.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
107.
Diagnosis-based Intrusion Detection
by Jackson, Conner Patrick Stearns, M.S.  University of California, Davis. 2016: 97 pages; 10124452.
108.
S4h: A Peer-to-Peer Search Engine with Explicit Trust
by Cowan, Greg, M.S.  Rensselaer Polytechnic Institute. 2019: 49 pages; 13813168.
109.
Types for the Chain of Trust: No (Loader) Write Left Behind
by Shapiro, Rebecca, Ph.D.  Dartmouth College. 2018: 221 pages; 10811531.
110.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
111.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
112.
Acceleration of streaming applications on FPGAs from high level constructs
by Mitra, Abhishek, Ph.D.  University of California, Riverside. 2008: 192 pages; 3341851.
113.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
114.
Creation of a covert communications network for evasion of surveillance
by Nish, Rose, M.S.  University of the Pacific. 2016: 65 pages; 10117064.
115.
Beneath the Attack Surface
by Mowery, Keaton, Ph.D.  University of California, San Diego. 2015: 200 pages; 3712726.
116.
Scraper—a program to instantly convert a static website to a dynamic website
by Sheth, Hemil M., M.S.  California State University, Long Beach. 2010: 71 pages; 1481772.
117.
Security Concept for VPN IPsec Site-to-Site Connections to Third Parties
by Schmalen, Daniel, M.S.  California State University, Long Beach. 2018: 74 pages; 10688606.
118.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
119.
Reliable and Efficient Routing for Wireless Sensor Networks
by Sinha, Saket, M.S.  California State University, Long Beach. 2017: 55 pages; 10263570.
120.
Quantifying and improving wireless privacy
by McCoy, Damon Liwanu, Ph.D.  University of Colorado at Boulder. 2009: 206 pages; 3387545.
91 - 120 of 5293 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest