Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
45813 open access dissertations and theses found for:
if(Malware analysis)  »   Refine Search
32.
Nation State Threat Actions Against Critical Energy Infrastructures
by Garner, Michael Wilson, Jr., M.S.  Utica College. 2017: 43 pages; 10686214.
33.
Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
by Herr, Trey, Ph.D.  The George Washington University. 2016: 317 pages; 10076294.
34.
Software Reverse Engineering education
by Cipresso, Teodoro, M.S.  San Jose State University. 2009: 112 pages; 1478574.
35.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
37.
Functional element analysis of Bronze Age Aegean sword types using Finite Element Analysis
by Miller, Jason Andrew, M.A.  California State University, Long Beach. 2017: 63 pages; 10260776.
38.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
39.
Critical infrastructure protection
by Shwani, Hazim G., M.S.  Utica College. 2014: 55 pages; 1555605.
40.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
41.
Multivariate analysis of proteomic data: Functional group analysis using a global test
by Fitzgerald-DeHoog, Lindsay M., M.S.  California State University, Long Beach. 2015: 135 pages; 1602759.
43.
44.
Localizing the effects of link flooding attacks in the Internet
by Lee, Soo Bum, Ph.D.  University of Maryland, College Park. 2009: 142 pages; 3397793.
45.
An Automated System for Rapid and Secure Device Sanitization
by LaBarge, Ralph S., Ph.D.  The George Washington University. 2014: 113 pages; 3620600.
46.
A structured methodology for unifying functional analysis with systems analysis to enhance system behavior knowledge
by Clendening, Randall James, D.Sc.  The George Washington University. 2009: 148 pages; 3341357.
47.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
48.
Real-time qPCR analysis of putative chloroplast protease genes shown to be up-regulated by microarray analysis
by Hoiness, Robert, M.S.  California State University, Long Beach. 2013: 74 pages; 1523029.
50.
GPT-Free Sensitivity Analysis for Reactor Depletion and Analysis
by Kennedy, Christopher Brandon, Ph.D.  North Carolina State University. 2015: 233 pages; 3710730.
51.
A Recharge Analysis of the Indian Wells Basin, California Using Geochemical Analysis of Tritium and Radiocarbon
by Faulkner, Kirsten E., M.S.  California State University, Long Beach. 2018: 68 pages; 10840166.
52.
Leveraging Internet Background Radiation for Opportunistic Network Analysis
by Benson, Karyn, Ph.D.  University of California, San Diego. 2016: 278 pages; 10161733.
54.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
57.
Validating Petri Net Models of Cyberattacks
by Christensen, Nicholas M., M.S.  The University of Alabama in Huntsville. 2017: 102 pages; 10608103.
58.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
31 - 60 of 45813 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest