Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
34035 open access dissertations and theses found for:
if(Network security)  »   Refine Search
4.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
5.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
6.
Behavior-based admission and access control for network security
by Frias-Martinez, Vanessa, Ph.D.  Columbia University. 2008: 167 pages; 3333480.
8.
A three tier security system with mobile sinks in wireless sensor networks
by Pebbeti, Mounika, M.S.  California State University, Long Beach. 2016: 51 pages; 10007409.
9.
Enforcing role-based access control on a social network
by Anderson, James Carold, M.S.  East Carolina University. 2012: 240 pages; 1518475.
10.
Ensuring security and authentication using zero knowledge protocol in wireless sensor network applications
by Matta Veera Venkata, Sudheer, M.S.  California State University, Long Beach. 2015: 55 pages; 1604873.
11.
Intrusion Detection in Controller Area Network Bus Using Deep Neural Network
by Sami, Muhammad, M.S.E.E.  California State University, Long Beach. 2020: 62 pages; 27833202.
12.
Traffic management between two locations across multiprotocol label switching backbone cloud with enhanced network security
by Rao, Ashish Rao Janardhan, M.S.  California State University, Long Beach. 2015: 86 pages; 1605182.
13.
14.
Social Network Analysis and Terrorism: An Analysis of Noordin Mohammad Top's Terrorist Network
by Moghadam, Ramin , M.S.  California State University, Long Beach. 2020: 63 pages; 27744138.
16.
Multi-Network Access: How It Can Benefit Network Operators and Consumers Alike
by Zhang, Nandi, Ph.D.  Carnegie Mellon University. 2019: 169 pages; 27671423.
17.
Emergent Network Defense
by Crane, Earl Newell, Ph.D.  The George Washington University. 2013: 167 pages; 3548491.
18.
Energy and security aspects of wireless networks: Performance and tradeoffs
by Abuzainab, Nof, Ph.D.  University of Maryland, College Park. 2013: 207 pages; 3599933.
19.
Detecting attacks in building automation system
by Nama, Sumanth, M.S.  California State University, Long Beach. 2015: 45 pages; 1597784.
20.
Practical Black-Box Analysis for Network Functions and Services
by Moon, Soo-Jin, Ph.D.  Carnegie Mellon University. 2020: 202 pages; 28148170.
21.
Architecture and protocols for a high-performance, secure IEEE 802.11-based wireless mesh network
by Raniwala, Ashish, Ph.D.  State University of New York at Stony Brook. 2009: 215 pages; 3401726.
22.
IT Security Managers' Strategies for Mitigating Data Breaches in Texas School Districts
by Nwankwo, Mercy Ikhuoria, D.I.T.  Walden University. 2020: 273 pages; 28150989.
23.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
24.
Thwarting malicious and selfish behavior in commodity Wi -Fi networks
by Ma, Liran, D.Sc.  The George Washington University. 2008: 123 pages; 3320933.
25.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
26.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
29.
Defeating Insider Attacks via Autonomic Self-Protective Networks
by Sibai, Faisal M., Ph.D.  George Mason University. 2012: 139 pages; 3503962.
1 - 30 of 34035 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest