Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
7586 open access dissertations and theses found for:
if(Malicious attacks)  »   Refine Search
1.
Polymorphic attacks and network topology: Application of concepts from natural systems
by Rangan, Prahalad, Ph.D.  State University of New York at Albany. 2010: 102 pages; 3402465.
2.
Honeypot with Honeypot Management System for web applications
by Karia, Rutu, M.S.  California State University, Long Beach. 2011: 85 pages; 1504488.
4.
Detecting and characterizing malicious websites
by Xu, Li, Ph.D.  The University of Texas at San Antonio. 2014: 93 pages; 3637094.
5.
Proactive cyberfraud detection through infrastructure analysis
by Kalafut, Andrew J., Ph.D.  Indiana University. 2010: 153 pages; 3423688.
6.
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
by LeDoux, Charles, Ph.D.  University of Louisiana at Lafayette. 2016: 179 pages; 10245924.
7.
Awareness of malicious social engineering among facebook users
by Slonka, Kevin J., D.Sc.  Robert Morris University. 2014: 140 pages; 3620246.
8.
Securing multi-channel wireless networks against malicious behavior
by Zheng, Chaodong, Ph.D.  National University of Singapore (Singapore). 2015: 136 pages; 10006123.
9.
Protecting mobile ad hoc networks by cooperative defense and energy-oriented approach
by Kuthumbaka, Ajith Madhav, M.S.  California State University, Long Beach. 2016: 36 pages; 1606703.
10.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
11.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
12.
Detecting attacks in building automation system
by Nama, Sumanth, M.S.  California State University, Long Beach. 2015: 45 pages; 1597784.
13.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
16.
Enhanced adaptive acknowledgment intrusion detection for mobile ad-hoc network
by Benede Umapathy, Rakesh, M.S.  California State University, Long Beach. 2017: 49 pages; 10253596.
17.
Relationship between User Privacy and Application Permissions in Smartphone Platforms
by Caushaj, Eralda, Ph.D.  Oakland University. 2017: 159 pages; 10639215.
18.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
19.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
20.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
21.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
22.
Cybersecurity of wireless implantable medical devices
by Ash, Sarah L., M.S.  Utica College. 2016: 51 pages; 10109631.
23.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
24.
Battling Spam and Sybils on the Social Web
by Wilson, Christo, Ph.D.  University of California, Santa Barbara. 2012: 329 pages; 3545102.
25.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
27.
Iranian Cyber Espionage
by Spataro, Jason G., M.S.  Utica College. 2019: 72 pages; 13877649.
28.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
29.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
30.
Performance analysis of software and hardware based firewalls against DDoS attacks
by Agus, Ruben, M.S.  California State University, Long Beach. 2014: 66 pages; 1568899.
1 - 30 of 7586 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest