Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
50337 open access dissertations and theses found for:
if(Malware analysis)  »   Refine Search
181.
Network traffic analysis through statistical signal processing methods
by AsSadhan, Basil Abdullah, Ph.D.  Carnegie Mellon University. 2009: 104 pages; 3394005.
183.
Healthcare Optimizing Patient Education Smartcard (H.O.P.E.S.)
by Vu, Hung V., M.S.  California State University, Long Beach. 2018: 62 pages; 10752237.
184.
Designing Privacy Notices: Supporting User Understanding and Control
by Kelley, Patrick Gage, Ph.D.  Carnegie Mellon University. 2013: 177 pages; 3573455.
185.
The Senior Saver
by Fischer, Carissa, M.S.  California State University, Long Beach. 2017: 48 pages; 10690783.
186.
Exploring internet users' vulnerability to online dating fraud: Analysis of routine activities theory factors
by Garrett, Elena Victorovna, M.S.  The University of Texas at Dallas. 2014: 124 pages; 1583633.
187.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
188.
Cybersecurity of wireless implantable medical devices
by Ash, Sarah L., M.S.  Utica College. 2016: 51 pages; 10109631.
189.
Behavioral Integration LLC a Business Plan
by Lam, Kristopher, M.S.  California State University, Long Beach. 2018: 50 pages; 10751116.
190.
An Investigation of Anomaly-based Ensemble Models for Multi-domain Intrusion Detection
by Mikhail, Joseph W., D.Engr.  The George Washington University. 2019: 117 pages; 10977908.
191.
Authenticating executions for trusted systems
by Aktas, Erdem, Ph.D.  State University of New York at Binghamton. 2013: 215 pages; 3596989.
192.
Formal analysis of web service composition
by Manman, Chen, Ph.D.  National University of Singapore (Singapore). 2015: 240 pages; 10005980.
193.
Analyzing and Securing Firmware for IoT Devices
by Redini, Nilo, Ph.D.  University of California, Santa Barbara. 2020: 260 pages; 28260067.
196.
Security Concept for VPN IPsec Site-to-Site Connections to Third Parties
by Schmalen, Daniel, M.S.  California State University, Long Beach. 2018: 74 pages; 10688606.
198.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
199.
Flexible Architectures for Enhanced Security
by Chang, Jed Kao-Tung, Ph.D.  University of California, Irvine. 2012: 149 pages; 3518799.
200.
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
by LeDoux, Charles, Ph.D.  University of Louisiana at Lafayette. 2016: 179 pages; 10245924.
201.
An exploration of online spam prevention through geolocational filters
by Boukes, John, M.S.  California State University, Long Beach. 2012: 90 pages; 1522208.
202.
Foundations for Provenance-Aware Systems
by Muniswamy-Reddy, Kiran-Kumar, Ph.D.  Harvard University. 2010: 181 pages; 3435575.
203.
A framework for secure mixnet-based electronic voting
by Popoveniuc, Stefan, Ph.D.  The George Washington University. 2009: 211 pages; 3344934.
204.
Web browsers as operating systems: Supporting robust and secure web programs
by Reis, Charles, Ph.D.  University of Washington. 2009: 173 pages; 3370601.
208.
Social Network Analysis in an Extended Structural Equation Modeling Framework
by Liu, Haiyan, Ph.D.  University of Notre Dame. 2018: 168 pages; 13836262.
209.
P-16 Initiatives A Policy Discourse Analysis Approach to State Level Education Reform
by Durand, Francesca T., Ph.D.  State University of New York at Albany. 2011: 251 pages; 3488276.
210.
Analysis of environmental sounds
by Lee, Keansub, Ph.D.  Columbia University. 2009: 116 pages; 3388467.
181 - 210 of 50337 displayed.
« First < Previous |   4    5    6    7    8    9    10    11    12    13    14   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest