Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
1584 open access dissertations and theses found for:
if(Malicious cryptomining)  »   Refine Search
1.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
3.
Proactive cyberfraud detection through infrastructure analysis
by Kalafut, Andrew J., Ph.D.  Indiana University. 2010: 153 pages; 3423688.
4.
Detecting and characterizing malicious websites
by Xu, Li, Ph.D.  The University of Texas at San Antonio. 2014: 93 pages; 3637094.
5.
Awareness of malicious social engineering among facebook users
by Slonka, Kevin J., D.Sc.  Robert Morris University. 2014: 140 pages; 3620246.
6.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
7.
Securing multi-channel wireless networks against malicious behavior
by Zheng, Chaodong, Ph.D.  National University of Singapore (Singapore). 2015: 136 pages; 10006123.
8.
Thwarting malicious and selfish behavior in commodity Wi -Fi networks
by Ma, Liran, D.Sc.  The George Washington University. 2008: 123 pages; 3320933.
9.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
10.
Polymorphic attacks and network topology: Application of concepts from natural systems
by Rangan, Prahalad, Ph.D.  State University of New York at Albany. 2010: 102 pages; 3402465.
12.
Study of W32/NetSky.Q worm and malicious website detection using packed malware string search
by Dongre, Ankush, M.S.  California State University, Long Beach. 2011: 94 pages; 1504450.
13.
Protecting mobile ad hoc networks by cooperative defense and energy-oriented approach
by Kuthumbaka, Ajith Madhav, M.S.  California State University, Long Beach. 2016: 36 pages; 1606703.
15.
Enhanced adaptive acknowledgment intrusion detection for mobile ad-hoc network
by Benede Umapathy, Rakesh, M.S.  California State University, Long Beach. 2017: 49 pages; 10253596.
16.
Analytical optimized approach for peer-to-peer systems based on self-organizing trust model
by Manda, Akshay Reddy, M.S.  California State University, Long Beach. 2016: 54 pages; 10108180.
17.
Behavioral modeling of botnet populations viewed through internet protocol address space
by Weaver, Rhiannon Lisa, Ph.D.  Carnegie Mellon University. 2012: 204 pages; 3528576.
18.
Three research essays on human behaviors in Social Media
by Wu, Jiao Aimee, Ph.D.  The University of Wisconsin - Milwaukee. 2015: 151 pages; 3732607.
19.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
21.
Relationship between User Privacy and Application Permissions in Smartphone Platforms
by Caushaj, Eralda, Ph.D.  Oakland University. 2017: 159 pages; 10639215.
22.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
23.
Battling Spam and Sybils on the Social Web
by Wilson, Christo, Ph.D.  University of California, Santa Barbara. 2012: 329 pages; 3545102.
24.
Honeypot with Honeypot Management System for web applications
by Karia, Rutu, M.S.  California State University, Long Beach. 2011: 85 pages; 1504488.
25.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
26.
Detecting attacks in building automation system
by Nama, Sumanth, M.S.  California State University, Long Beach. 2015: 45 pages; 1597784.
27.
Behavior modeling and forensics for multimedia social networks
by Lin, Wan-Yi, Ph.D.  University of Maryland, College Park. 2009: 253 pages; 3372974.
29.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
30.
Cybersecurity of wireless implantable medical devices
by Ash, Sarah L., M.S.  Utica College. 2016: 51 pages; 10109631.
1 - 30 of 1584 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest