Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
30856 open access dissertations and theses found for:
if(Network security)  »   Refine Search
303.
Seeking Social Capital and Expertise in a Newly-Formed Research Community: A Co-Author Analysis
by Forte, Christine E., Ed.D.  Pepperdine University. 2017: 161 pages; 10636476.
304.
Automated Detection of Semagram-Laden Images
by Cerkez, Paul S., Ph.D.  Nova Southeastern University. 2012: 238 pages; 3505651.
305.
Adapting Swarm Applications: A Systematic and Quantitative Approach
by Zhang, Ben, Ph.D.  University of California, Berkeley. 2018: 100 pages; 10931111.
306.
Bitcoin regulations and investigations: A proposal for U.S. policies
by Fawcett, Jay Palmer, M.S.  Utica College. 2017: 71 pages; 10244196.
308.
Core Flight System Cryptography Library
by Lucas, John Patrick, M.S.  West Virginia University. 2017: 115 pages; 10268719.
309.
An Event Management Framework to Aid Solution Providers in Cybersecurity
by Leon, Ryan James, D.Engr.  The George Washington University. 2018: 114 pages; 10745141.
310.
The effects of experimentally induced attachment security on children's fear reactions
by Stupica, Brandi Shawn, Ph.D.  University of Maryland, College Park. 2012: 242 pages; 3543490.
311.
A multi-dimensional trust-based reliable and secure protocol for mobile wireless networks
by Jonnalagadda Krishna Naidu, Prithvi Tej, M.S.  California State University, Long Beach. 2016: 53 pages; 10141521.
312.
Diagnosis-based Intrusion Detection
by Jackson, Conner Patrick Stearns, M.S.  University of California, Davis. 2016: 97 pages; 10124452.
313.
Location privacy in wireless sensor network using reciprocal protocol
by Mohan, Rakshitha, M.S.  California State University, Long Beach. 2016: 58 pages; 10118890.
314.
An American Response to International Chinese Predatory Economic Practices in the Geopolitical Contest of the 21st Century
by Rajpurohit, Krishna, M.A.  The William Paterson University of New Jersey. 2018: 157 pages; 10839174.
315.
Continuum: An architecture for user evolvable collaborative virtual environments
by Bierbaum, Allen, Ph.D.  Iowa State University. 2007: 160 pages; 3289395.
316.
The impact of visual aesthetics on the utility, affordance, and readability of network graphs
by Dudas, Patrick M., Ph.D.  University of Pittsburgh. 2016: 188 pages; 10075901.
318.
Creation of a covert communications network for evasion of surveillance
by Nish, Rose, M.S.  University of the Pacific. 2016: 65 pages; 10117064.
319.
The need for adaptive network application architectures
by Nasiriamini, Sourena, M.S.  California State University, Long Beach. 2010: 70 pages; 1490321.
320.
Listening Intently: Towards a Critical Media Theory of Ethical Listening
by Feldman, Jessica, Ph.D.  New York University. 2017: 333 pages; 10623952.
321.
322.
Hybrid cloud: Joining the grid and cloud computing networks
by Reddy, Jyothi Kiran, M.S.  California State University, Long Beach. 2011: 59 pages; 1504527.
323.
325.
326.
Enhanced adaptive acknowledgment intrusion detection for mobile ad-hoc network
by Benede Umapathy, Rakesh, M.S.  California State University, Long Beach. 2017: 49 pages; 10253596.
327.
Social network analysis: Determining betweenness centrality of a network using Ant Colony Optimization
by Rubano, Vincent, M.S.  Southern Connecticut State University. 2016: 117 pages; 10108549.
330.
301 - 330 of 30856 displayed.
« First < Previous |   8    9    10    11    12    13    14    15    16    17    18   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest