Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
30876 open access dissertations and theses found for:
if(Network security)  »   Refine Search
181.
Realizing the potential of the network edge
by Rath, Ayaskant, Ph.D.  Polytechnic Institute of New York University. 2014: 102 pages; 3629121.
182.
Protecting mobile ad hoc networks by cooperative defense and energy-oriented approach
by Kuthumbaka, Ajith Madhav, M.S.  California State University, Long Beach. 2016: 36 pages; 1606703.
183.
Interorganizational network merger syndrome and its implications for acquiring companies
by La Point, Jeffrey Jon, D.B.A.  Baker College (Michigan). 2012: 273 pages; 3494887.
184.
Real-Time Adaptive Data-Driven Perception for Anomaly Priority Scoring at Scale
by Miraftabzadeh, Seyed Ali, Ph.D.  The University of Texas at San Antonio. 2017: 142 pages; 10686275.
186.
Graph theoretic approaches to understand resilience of complex systems
by Chopra, Shauhrat S., Ph.D.  University of Pittsburgh. 2015: 204 pages; 3735255.
187.
Leveraging Internet Background Radiation for Opportunistic Network Analysis
by Benson, Karyn, Ph.D.  University of California, San Diego. 2016: 278 pages; 10161733.
188.
High Performance Cryptography for Electronic Product Code for Internet of Things Applications
by Shah, Niyati, M.S.  University of Louisiana at Lafayette. 2017: 67 pages; 10682396.
189.
National Security and Wind Farms: Can They Co-Exist?
by Jameson, Sharoiha Pualani Kanehailua, LL.M.  The George Washington University. 2013: 77 pages; 1545818.
190.
Rethinking information privacy for the web
by Tierney, Matthew Ryan, Ph.D.  New York University. 2013: 161 pages; 3602740.
191.
Hardware-Assisted Protection and Isolation
by Wang, Jiang, Ph.D.  George Mason University. 2011: 126 pages; 3471624.
192.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
193.
Performance evaluation of routing protocols in finding stable paths in vanet
by Ibrahim, Mohamed Elsaid Awad, M.S.Cp.  California State University, Los Angeles. 2015: 98 pages; 1586615.
194.
The Impact of Emergent Information and Communication Technology on Peacebuilding
by Templeton, Travis H., M.A.  The George Washington University. 2017: 110 pages; 10282455.
195.
Web browsers as operating systems: Supporting robust and secure web programs
by Reis, Charles, Ph.D.  University of Washington. 2009: 173 pages; 3370601.
196.
An Investigation of Anomaly-based Ensemble Models for Multi-domain Intrusion Detection
by Mikhail, Joseph W., D.Engr.  The George Washington University. 2019: 117 pages; 10977908.
198.
Securing Operating Systems Through Utility Virtual Machines
by Denz, Robert, Ph.D.  Dartmouth College. 2016: 222 pages; 10190644.
199.
Algorithms and techniques for transitioning to software defined networks
by Patil, Prithviraj, Ph.D.  Vanderbilt University. 2016: 86 pages; 10295642.
200.
The geography of insurgency: An urban network insurgency model of the Viet Nam War
by Lohman, Andrew Davies, Ph.D.  University of Illinois at Urbana-Champaign. 2009: 302 pages; 3395574.
201.
Evaluation and Design of Robust Neural Network Defenses
by Carlini, Nicholas, Ph.D.  University of California, Berkeley. 2018: 138 pages; 10931076.
205.
Cyber terrorrism threats
by Gobran, Ashraf, M.S.  Utica College. 2015: 48 pages; 1588500.
206.
Routing in the dark: Pitch black
by Evans, Nathan S., M.S.  University of Denver. 2009: 84 pages; 1465595.
207.
An Automated Engineering Process to Verify the Correct Coordination of Multilayer Recovery
by Kroculick, Joseph, Ph.D.  Illinois Institute of Technology. 2017: 200 pages; 10273104.
209.
Defining the International Accounting Standard Board's governance network
by Rossman, Patricia A., Ph.D.  Walden University. 2009: 176 pages; 3366983.
210.
Cross-Layer Design for Secure and Resilient Control of Cyber-Physical Systems in Smart Cities
by Xu, Zhiheng, Ph.D.  New York University Tandon School of Engineering. 2018: 225 pages; 10840627.
181 - 210 of 30876 displayed.
« First < Previous |   4    5    6    7    8    9    10    11    12    13    14   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest