Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
30877 open access dissertations and theses found for:
if(Network security)  »   Refine Search
241.
An Analysis of Remote Biometric Authentication with Windows
by Eyers, Brandy Marie, M.S.C.S.  University of South Florida. 2011: 42 pages; 1490509.
242.
Affect of handover on the performance of routing protocols in WiMax
by Valivety, Suneel, M.S.  California State University, Long Beach. 2009: 79 pages; 1481804.
243.
Constructing a Community Response Grid (CRG): The Dublin, Ohio Case Study
by Freund, John F., III, Ph.D.  Nova Southeastern University. 2012: 127 pages; 3506032.
244.
U.S. and NATO Cyber Defense: Bridging the Resource Gap with a Centralized Market Structure
by Lipke, Alexa, M.A.  The George Washington University. 2016: 71 pages; 10189713.
245.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
246.
Improving the performance of peer -to -peer systems
by Sun, Qixiang, Ph.D.  Stanford University. 2010: 185 pages; 3395873.
248.
Evaluation of security methods for the prevention of malware on mobile devices
by Giacalone, Anthony S., M.S.  California State University, Long Beach. 2014: 87 pages; 1527936.
249.
ROVER: A DNS-based method to detect and prevent IP hijacks
by Gersch, Joseph E., Ph.D.  Colorado State University. 2013: 179 pages; 3608195.
251.
Cybersecurity IR: A Thematic-analysis of Practitioner Plans, Policies, and Guidelines
by Fox, Michael B., Ph.D.  Trident University International. 2019: 192 pages; 13904714.
252.
Learning from the grassroots: Emergent peacebuilding design in pastoralist Kenya
by Ervin, Gail Mandell, Ph.D.  Saybrook University. 2015: 306 pages; 10009094.
254.
Critical Infrastructure: Legislative Factors for Preventing a "Cyber-Pearl Harbor"
by Palmer, Robert Kenneth, LL.M.  The George Washington University. 2013: 75 pages; 1545831.
255.
Users' privacy and security behaviors on mobile devices
by Blount, Charles Lenward, M.S.  University of Maryland, Baltimore County. 2014: 106 pages; 1571723.
257.
Allocation of Resources to Defend Spatially Distributed Networks Using Game Theoretic Allocations
by Kroshl, William M., Ph.D.  The George Washington University. 2015: 146 pages; 3669710.
258.
Formal reasoning in software-defined networks
by Reitblatt, Mark, Ph.D.  Cornell University. 2017: 179 pages; 10254203.
259.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
260.
Software vulnerabilities: Lifespans, metrics, and case study
by Wright, Jason L., M.S.  University of Idaho. 2014: 117 pages; 1556964.
261.
Key exchange protocol for satellite multicast systems using Elliptic Curve Cryptography primitives
by Osuji, Obioma, M.S.  California State University, Long Beach. 2016: 64 pages; 10007416.
263.
Detecting and characterizing malicious websites
by Xu, Li, Ph.D.  The University of Texas at San Antonio. 2014: 93 pages; 3637094.
264.
Building cognitive radio for physical layer intrusion detection
by Khairatkar, Mukul Anil, M.S.  California State University, Long Beach. 2009: 66 pages; 1472393.
265.
Global scale identity management
by Tambasco, Michael J., M.S.  Utica College. 2015: 60 pages; 1600350.
266.
Examining Critical Material Supply Chains Through a Bayesian Network Model
by Kling, Joseph A., D.Engr.  The George Washington University. 2018: 110 pages; 10928265.
268.
Performance analysis and inference of communication networks
by Ni, Jian, Ph.D.  Yale University. 2008: 178 pages; 3342752.
269.
An exploratory study of contracted security officers' retention
by de los Santos Lozano, Gerardo, Ed.D.  Pepperdine University. 2012: 162 pages; 3503832.
270.
The effect of password management procedures on the entropy of user selected passwords
by Enamait, John D., Ph.D.  Indiana State University. 2012: 153 pages; 3507494.
241 - 270 of 30877 displayed.
« First < Previous |   6    7    8    9    10    11    12    13    14    15    16   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest