Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
30876 open access dissertations and theses found for:
if(Network security)  »   Refine Search
151.
Defense Institutional Building - Integrating the Work
by McIlwain, Carol J., Ph.D.  University of Maryland, College Park. 2017: 525 pages; 10269397.
152.
Antikernel: A decentralized secure hardware-software operating system architecture
by Zonenberg, Andrew D., Ph.D.  Rensselaer Polytechnic Institute. 2015: 148 pages; 3705663.
153.
Battling Spam and Sybils on the Social Web
by Wilson, Christo, Ph.D.  University of California, Santa Barbara. 2012: 329 pages; 3545102.
154.
From FLOWCORE to JITFLOW: Improving the speed of Information Flow in JavaScript
by Hennigan, Eric, Ph.D.  University of California, Irvine. 2015: 193 pages; 3688532.
155.
Catalyzing Collective Action: A Grounded Theory of Network Leadership
by Stiver, Dustin Cory, Ph.D.  Eastern University. 2017: 274 pages; 10603631.
156.
Statistical Analysis of Complex Network Structures and Node Removal Impacts on Their Performance
by Jahanpour, Ehsan, M.S.  Southern Illinois University at Edwardsville. 2013: 98 pages; 1546324.
157.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
158.
Design and Implementation of Privacy-Preserving Surveillance
by Segal, Aaron, Ph.D.  Yale University. 2016: 162 pages; 10584958.
160.
Mitigating Privilege Escalation
by Brookes, Scott, Ph.D.  Dartmouth College. 2018: 215 pages; 10822683.
161.
Malware Vectors: A Technique for Discovering Defense Logics
by Stocco, Gabriel Fortunato, Ph.D.  Dartmouth College. 2014: 121 pages; 3685144.
162.
Redefining Insteon home control networking protocol
by Abdul Azeez Khan, Mohamed Shoaib Khan, M.S.  California State University, Long Beach. 2015: 106 pages; 1583654.
163.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
164.
A method for automatically generating rules for a requires-provides security model of a system
by Orvis, William Snow, M.S.  University of California, Davis. 2009: 109 pages; 1470280.
165.
166.
Wading Tiger Swimming Dragon: A Study on Comparative Indo-Sino Naval Development
by Weisko, Paul, M.A.  The George Washington University. 2017: 81 pages; 10252946.
167.
Performance analysis of software and hardware based firewalls against DDoS attacks
by Agus, Ruben, M.S.  California State University, Long Beach. 2014: 66 pages; 1568899.
168.
Modeling and analyzing service-oriented enterprise architectural styles
by Tang, Longji, Ph.D.  The University of Texas at Dallas. 2011: 269 pages; 3494567.
170.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
171.
Localizing the effects of link flooding attacks in the Internet
by Lee, Soo Bum, Ph.D.  University of Maryland, College Park. 2009: 142 pages; 3397793.
172.
Epistemology and networked governance: An actor-network approach to network governance
by O'Brien, Mariana G., Ph.D.  Florida Atlantic University. 2015: 184 pages; 3730734.
173.
Coordinate repair and medial axis detection in virtual coordinate based sensor networks
by Mahindre, Gunjan S., M.S.  Colorado State University. 2014: 109 pages; 1573078.
174.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
175.
Efficient Actor Recovery Paradigm for Wireless Sensor and Actor Networks
by Mahjoub, Reem Khalid, Ph.D.  University of Bridgeport. 2017: 141 pages; 10745143.
176.
Applying Random Forest to Mitigate Cybersecurity Data Breaches in Small Businesses
by Liguori, Patricia Ann, D.Engr.  The George Washington University. 2018: 177 pages; 10928320.
177.
Digital currency wallet for mobile devices
by Jose, Mamitha, M.S.  California State University, Long Beach. 2011: 102 pages; 1504486.
178.
Protecting mobile ad hoc networks by cooperative defense and energy-oriented approach
by Kuthumbaka, Ajith Madhav, M.S.  California State University, Long Beach. 2016: 36 pages; 1606703.
179.
Botnet Detection Using Graph Based Feature Clustering
by Akula, Ravi Kiran, M.S.  Mississippi State University. 2018: 69 pages; 10751733.
180.
Dynamic content generation for the evaluation of network applications
by Valgenti, Victor Craig, Ph.D.  Washington State University. 2012: 146 pages; 3517443.
151 - 180 of 30876 displayed.
« First < Previous |   3    4    5    6    7    8    9    10    11    12    13   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest