Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
49926 open access dissertations and theses found for:
if(Malware analysis)  »   Refine Search
1.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
2.
Calculating malware severity rating using threat tree analysis
by Malhotra, Asheer, M.S.  Mississippi State University. 2015: 338 pages; 1586986.
3.
5.
Dynamic Malware Analysis of GPU-Assisted Cryptoviruses Using Contained AES Side-Channels
by Espinoza, Jesus Pastor, D.Sc.  Capitol Technology University. 2018: 503 pages; 13853787.
6.
An Exploration of Countermeasures to Defend Against Weaponized AI Malware Exploiting Facial Recognition
by Jalaluddin, Arooj Zafar, D.Sc.  Capitol Technology University. 2020: 197 pages; 28094887.
7.
Systemic effects of human factors in information security
by Kelley, Timothy D., Ph.D.  Indiana University. 2014: 153 pages; 3665483.
8.
Detection of malware via side channel information
by Quinn, Rian, Ph.D.  State University of New York at Binghamton. 2012: 169 pages; 3522519.
9.
Study of W32/NetSky.Q worm and malicious website detection using packed malware string search
by Dongre, Ankush, M.S.  California State University, Long Beach. 2011: 94 pages; 1504450.
10.
Malware Vectors: A Technique for Discovering Defense Logics
by Stocco, Gabriel Fortunato, Ph.D.  Dartmouth College. 2014: 121 pages; 3685144.
11.
Proactive cyberfraud detection through infrastructure analysis
by Kalafut, Andrew J., Ph.D.  Indiana University. 2010: 153 pages; 3423688.
12.
Evaluation of security methods for the prevention of malware on mobile devices
by Giacalone, Anthony S., M.S.  California State University, Long Beach. 2014: 87 pages; 1527936.
13.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
14.
A policy analysis of phishing countermeasures
by Sheng, Xinguang (Steve), Ph.D.  Carnegie Mellon University. 2009: 181 pages; 3383412.
15.
Deep Dynamic Analysis of Android Applications
by Gustafson, Eric David, M.S.  University of California, Davis. 2014: 48 pages; 1565669.
16.
Detection of communication over DNSSEC covert channels
by Hands, Nicole M., M.S.  Purdue University. 2016: 82 pages; 10181541.
17.
Automatic Program State Exploration Techniques for Security Analysis of Android Apps
by Johnson, Ryan, Ph.D.  George Mason University. 2019: 211 pages; 27667472.
18.
Elicitation of a Program's Behaviors
by Miles, Craig S., Ph.D.  University of Louisiana at Lafayette. 2015: 134 pages; 10002454.
20.
Analyzing and Securing Embedded Systems
by Spensky, Chad Samuel, Ph.D.  University of California, Santa Barbara. 2020: 168 pages; 28090001.
21.
An attack-resistant and rapid recovery desktop system
by Deshane, Todd, Ph.D.  Clarkson University. 2010: 149 pages; 3428987.
22.
Windows hibernation and memory forensics
by Ayers, Amy L., M.S.  Utica College. 2015: 67 pages; 1586690.
24.
Structuring Disincentives for Online Criminals
by Leontiadis, Nektarios, Ph.D.  Carnegie Mellon University. 2014: 370 pages; 3691274.
25.
An Examination of User Detection of Business eMail Compromise amongst Corporate Professionals
by Aviv, Shahar Sean, Ph.D.  Nova Southeastern University. 2019: 141 pages; 27667282.
26.
Detecting Fine-Grained Similarity in Binaries
by Saebjornsen, Andreas, Ph.D.  University of California, Davis. 2014: 107 pages; 3646391.
27.
28.
Evaluation and Design of Robust Neural Network Defenses
by Carlini, Nicholas, Ph.D.  University of California, Berkeley. 2018: 138 pages; 10931076.
30.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
1 - 30 of 49926 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest