Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
49943 open access dissertations and theses found for:
if(Malware analysis)  »   Refine Search
91.
Internet of Things and Sustainable Communities: Using Technology for Ecological Sustainability
by Love, Michael D., D.Sc.  Robert Morris University. 2020: 141 pages; 28000598.
92.
In-toto: Practical Software Supply Chain Security
by Torres-Arias, Santiago, Ph.D.  New York University Tandon School of Engineering. 2020: 128 pages; 27963570.
93.
Towards Secure and Usable Leakage-Resilient Password Entry
by Yan, Qiang, Ph.D.  Singapore Management University (Singapore). 2013: 138 pages; 3601350.
94.
Use of double-loop learning to combat advanced persistent threat: Multiple case studies
by Lamb, Christopher J., Ph.D.  Capella University. 2013: 151 pages; 3607034.
95.
Botnet Detection Using Graph Based Feature Clustering
by Akula, Ravi Kiran, M.S.  Mississippi State University. 2018: 69 pages; 10751733.
96.
A General Purpose Neural Processor
by Mountain, David Jerome, Ph.D.  University of Maryland, Baltimore County. 2017: 171 pages; 10268058.
97.
A Multivariate Bayesian Approach to Modeling Vulnerability Discovery in the Software Security Lifecycle
by Johnston, Reuben Aaron, Ph.D.  The George Washington University. 2018: 205 pages; 10828524.
98.
Modeling Intention to Use Deep Packet Inspection Technology in the United Arab Emirates
by Miller, Alfred Howard, Ph.D.  Northcentral University. 2012: 325 pages; 3492475.
99.
Building a Base for Cyber-autonomy
by Shoshitaishvili, Yan, Ph.D.  University of California, Santa Barbara. 2017: 178 pages; 10620012.
101.
Internet of Things Device Cybersecurity and National Security
by England, Suzanne K., M.S.  Utica College. 2020: 62 pages; 28094260.
102.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
104.
Hardware-Assisted Protection and Isolation
by Wang, Jiang, Ph.D.  George Mason University. 2011: 126 pages; 3471624.
105.
Wailaki Grammar
by Begay, Kayla Rae, Ph.D.  University of California, Berkeley. 2017: 287 pages; 10745621.
106.
Critical Infrastructure: Legislative Factors for Preventing a "Cyber-Pearl Harbor"
by Palmer, Robert Kenneth, LL.M.  The George Washington University. 2013: 75 pages; 1545831.
107.
Windesi Wamesa Morphophonology
by Gasser, Emily Anne, Ph.D.  Yale University. 2014: 334 pages; 3582286.
108.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
114.
Cybersecurity of unmanned aircraft systems (UAS)
by Gomez, Cesar A., M.S.  Utica College. 2015: 70 pages; 1605296.
116.
117.
IT Security Managers' Strategies for Mitigating Data Breaches in Texas School Districts
by Nwankwo, Mercy Ikhuoria, D.I.T.  Walden University. 2020: 273 pages; 28150989.
118.
119.
Attack Space Reduction through Software Hardening and Specialization Using Compiler and Binary Analysis
by Quach, Anh, Ph.D.  State University of New York at Binghamton. 2020: 151 pages; 27958904.
120.
Maintaining Small Retail Business Profitability by Reducing Cyberattacks
by Phillips, Ira J., Jr., D.B.A.  Walden University. 2020: 141 pages; 28024279.
91 - 120 of 49943 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest