Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
45877 open access dissertations and theses found for:
if(Malware analysis)  »   Refine Search
91.
92.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
94.
Honeypot with Honeypot Management System for web applications
by Karia, Rutu, M.S.  California State University, Long Beach. 2011: 85 pages; 1504488.
96.
Securing Operating Systems Through Utility Virtual Machines
by Denz, Robert, Ph.D.  Dartmouth College. 2016: 222 pages; 10190644.
97.
Cyber War in a Small War Environment
by Hermann, Rory Michael, Jr., M.S.  Utica College. 2017: 56 pages; 10271200.
99.
Behavior-based admission and access control for network security
by Frias-Martinez, Vanessa, Ph.D.  Columbia University. 2008: 167 pages; 3333480.
102.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
by Osei-Amanfi, Michael, D.B.A.  Grand Canyon University. 2018: 359 pages; 13423232.
103.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
104.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
105.
Strengthening System Security on the ARMv7 Processor Architecture with Hypervisor-Based Security Mechanisms
by Vetter, Julian, Ph.D.  Technische Universitaet Berlin (Germany). 2017: 115 pages; 27610268.
106.
Software signature derivation from sequential digital forensic analysis
by Nelson, Alexander J., Ph.D.  University of California, Santa Cruz. 2016: 177 pages; 10140317.
108.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
109.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
110.
Internet Protocol version Six (IPv6) at UC Davis: Traffic Analysis with a Security Perspective
by Ard, Julia Boxwell, M.S.  University of California, Davis. 2012: 115 pages; 1519649.
111.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
113.
114.
Introspective pushdown analysis and Nebo
by Earl, Christopher, Ph.D.  The University of Utah. 2014: 154 pages; 3621541.
117.
Defeating Insider Attacks via Autonomic Self-Protective Networks
by Sibai, Faisal M., Ph.D.  George Mason University. 2012: 139 pages; 3503962.
118.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
119.
Detection and Prevention of Misuse of Software Components
by Ting, Dai, Ph.D.  National University of Singapore (Singapore). 2015: 141 pages; 10005992.
120.
A framework for enforcing information flow policies
by Mital, Bhuvan, M.S.  State University of New York at Stony Brook. 2010: 70 pages; 1477837.
91 - 120 of 45877 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest