Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
49477 open access dissertations and theses found for:
if(Malware analysis)  »   Refine Search
31.
A Deep Learning Approach to Detecting Covert Channels in the Domain Name System
by Peña, Tomás Antonio, T.D.  Capitol Technology University. 2020: 206 pages; 27735496.
32.
Relationship between User Privacy and Application Permissions in Smartphone Platforms
by Caushaj, Eralda, Ph.D.  Oakland University. 2017: 159 pages; 10639215.
34.
Iranian Cyber Espionage
by Spataro, Jason G., M.S.  Utica College. 2019: 72 pages; 13877649.
35.
Navigating the Malweb: Authentication Schemes for Mobile Devices
by Niu, Yuan, Ph.D.  University of California, Davis. 2011: 116 pages; 3474442.
36.
Detecting and characterizing malicious websites
by Xu, Li, Ph.D.  The University of Texas at San Antonio. 2014: 93 pages; 3637094.
37.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
38.
Methodologies and Tools to Study Malicious Ecosystems
by miramirkhani, najmehalsadat, Ph.D.  State University of New York at Stony Brook. 2020: 147 pages; 27738172.
39.
Software Reverse Engineering education
by Cipresso, Teodoro, M.S.  San Jose State University. 2009: 112 pages; 1478574.
40.
Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
by Herr, Trey, Ph.D.  The George Washington University. 2016: 317 pages; 10076294.
41.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
42.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
43.
Forensic Accountants' Strategies and Cybercrime Mitigation
by Okechukwu, Joseph Chukwudi, D.B.A.  Northcentral University. 2020: 201 pages; 27830687.
44.
Nation State Threat Actions Against Critical Energy Infrastructures
by Garner, Michael Wilson, Jr., M.S.  Utica College. 2017: 43 pages; 10686214.
45.
Localizing the effects of link flooding attacks in the Internet
by Lee, Soo Bum, Ph.D.  University of Maryland, College Park. 2009: 142 pages; 3397793.
47.
Practical Inference-Time Attacks against Machine-Learning Systems and a Defense against Them
by Sharif, Mahmood, Ph.D.  Carnegie Mellon University. 2019: 137 pages; 27662625.
49.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
50.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
51.
An Automated System for Rapid and Secure Device Sanitization
by LaBarge, Ralph S., Ph.D.  The George Washington University. 2014: 113 pages; 3620600.
52.
Analysis of Time Activity Data Characteristics and Data Degradation in Digital Forensics
by Smallman, Andrew C., Ph.D.  George Mason University. 2020: 150 pages; 28088941.
53.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
54.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
55.
56.
Critical infrastructure protection
by Shwani, Hazim G., M.S.  Utica College. 2014: 55 pages; 1555605.
57.
Rethinking Existing Cybersecurity Frameworks: How to Incentivise Companies to Better Defend against Cyber Threats
by Wang, BaoFa, M.S.  University of London, Royal Holloway, University of London (United Kingdom). 2020: 106 pages; 28087173.
58.
Leveraging Internet Background Radiation for Opportunistic Network Analysis
by Benson, Karyn, Ph.D.  University of California, San Diego. 2016: 278 pages; 10161733.
59.
GPT-Free Sensitivity Analysis for Reactor Depletion and Analysis
by Kennedy, Christopher Brandon, Ph.D.  North Carolina State University. 2015: 233 pages; 3710730.
31 - 60 of 49477 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest