Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
25322 open access dissertations and theses found for:
if(Network defenses)  »   Refine Search
1.
Evaluation and Design of Robust Neural Network Defenses
by Carlini, Nicholas, Ph.D.  University of California, Berkeley. 2018: 138 pages; 10931076.
2.
A general cause based methodology for analysis of dependent failures in system risk and reliability assessments
by O'Connor, Andrew N., Ph.D.  University of Maryland, College Park. 2013: 402 pages; 3587283.
3.
Emergent Network Defense
by Crane, Earl Newell, Ph.D.  The George Washington University. 2013: 167 pages; 3548491.
4.
A multi-channel defense against communication denial -of -service attacks in wireless networks
by Alnifie, Ghada Matooq, Ph.D.  George Mason University. 2008: 165 pages; 3338544.
6.
Contemporary defenses against intellectual property theft
by Hale, D. J., M.A.  California State University, Long Beach. 2013: 83 pages; 1523085.
7.
The unconscious Everest
by Meendering, Joshua, Psy.D.  Saint Mary's University of Minnesota. 2016: 65 pages; 10244701.
8.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
9.
System Threats and Gender Differences in Sexism and Gender Stereotypes
by Kuchynka, Sophie, M.A.  University of South Florida. 2015: 80 pages; 1597535.
10.
Evolutionary constraints on plasticity in the anti-herbivore defenses of Solanum carolinense
by McNutt, David William, Ph.D.  The Florida State University. 2013: 115 pages; 3612462.
12.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
13.
The impacts of removing wildfire on Pinus ponderosa resistance against Dendroctonus ponderosae
by Hood, Sharon Metzger, Ph.D.  University of Montana. 2014: 114 pages; 3702805.
14.
Charleston's forgotten general: Roswell Sabine Ripley
by Zoebelein, Jennifer Madeline, M.A.  College of Charleston. 2008: 92 pages; 1450539.
15.
The Exceptionalist's Approach to Private Sector Cybersecurity: A Marque and Reprisal Model
by Hopkins, Michael Todd, LL.M.  The George Washington University. 2011: 88 pages; 1505935.
16.
Comparative Ecophysiology and Evolutionary Biology of Island and Mainland Chaparral Communities
by Ramirez, Aaron Robert, Ph.D.  University of California, Berkeley. 2015: 71 pages; 3720783.
17.
Malware Vectors: A Technique for Discovering Defense Logics
by Stocco, Gabriel Fortunato, Ph.D.  Dartmouth College. 2014: 121 pages; 3685144.
18.
19.
Localizing the effects of link flooding attacks in the Internet
by Lee, Soo Bum, Ph.D.  University of Maryland, College Park. 2009: 142 pages; 3397793.
20.
22.
Catalyzing Collective Action: A Grounded Theory of Network Leadership
by Stiver, Dustin Cory, Ph.D.  Eastern University. 2017: 274 pages; 10603631.
23.
Use of double-loop learning to combat advanced persistent threat: Multiple case studies
by Lamb, Christopher J., Ph.D.  Capella University. 2013: 151 pages; 3607034.
25.
Transportation Network Analysis for Reliability Based on Path Failure Strategies
by Tadikamalla, Veera Venkata Gopi Sai Krishna, M.S.  California State University, Long Beach. 2017: 48 pages; 10639442.
26.
Bridging the Gap: Finding the Language of Soul
by Baker, Naomi S., M.A.  Pacifica Graduate Institute. 2012: 70 pages; 1509811.
27.
Epistemology and networked governance: An actor-network approach to network governance
by O'Brien, Mariana G., Ph.D.  Florida Atlantic University. 2015: 184 pages; 3730734.
29.
Architecture and protocols for a high-performance, secure IEEE 802.11-based wireless mesh network
by Raniwala, Ashish, Ph.D.  State University of New York at Stony Brook. 2009: 215 pages; 3401726.
30.
ROVER: A DNS-based method to detect and prevent IP hijacks
by Gersch, Joseph E., Ph.D.  Colorado State University. 2013: 179 pages; 3608195.
1 - 30 of 25322 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest