Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
30876 open access dissertations and theses found for:
if(Network security)  »   Refine Search
63.
Performance evaluation of SIP authentication and TLS
by Maguluri, Swapna, M.S.C.E.  California State University, Long Beach. 2012: 121 pages; 1520910.
65.
An exploratory investigation of organizational security climate in a highly regulated environment
by Bitzer, Edward George, III, Ph.D.  Colorado State University. 2010: 125 pages; 3433677.
66.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
67.
Defeating Insider Attacks via Autonomic Self-Protective Networks
by Sibai, Faisal M., Ph.D.  George Mason University. 2012: 139 pages; 3503962.
68.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
69.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
70.
A Prudent Access Control Behavioral Intention Model for the Healthcare Domain
by Mussa, Constance C., Ph.D.  Nova Southeastern University. 2011: 247 pages; 3474092.
71.
72.
Reliable and Efficient Routing for Wireless Sensor Networks
by Sinha, Saket, M.S.  California State University, Long Beach. 2017: 55 pages; 10263570.
73.
Secure NFC enabled mobile phone payments using elliptic curve cryptography (SNFCMP)
by Byambajav, Dolgorsuren, M.S.  California State University, Long Beach. 2011: 76 pages; 1504435.
74.
Synergistic network operations
by Raza, Saqib, Ph.D.  University of California, Davis. 2010: 173 pages; 3427427.
75.
Internet Protocol version Six (IPv6) at UC Davis: Traffic Analysis with a Security Perspective
by Ard, Julia Boxwell, M.S.  University of California, Davis. 2012: 115 pages; 1519649.
77.
Secure building automation system using Tesla protocol
by Wadhwa, Preeti H., M.S.  California State University, Long Beach. 2015: 60 pages; 1601311.
78.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
79.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
81.
Correlating factors of the manager's decision to use Virtual Private Networks
by McEady, Erasmus W., Ph.D.  Capella University. 2009: 93 pages; 3366093.
82.
The Implications of the Internet's Topological Structure for Its Efficiency, Security, and Reliability
by Nur, Abdullah Yasin, Ph.D.  University of Louisiana at Lafayette. 2018: 170 pages; 10980025.
83.
Connectivity Between Two Distant Sites with Automatic Failover to IPsec
by Singh, Mankaran, M.S.  California State University, Long Beach. 2017: 39 pages; 10262849.
84.
Cyber Physical Security Analysis for Synchrophasor Applications
by Liu, Ren, Ph.D.  Washington State University. 2017: 148 pages; 10639030.
86.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
87.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
88.
Relationship between User Privacy and Application Permissions in Smartphone Platforms
by Caushaj, Eralda, Ph.D.  Oakland University. 2017: 159 pages; 10639215.
89.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
90.
Cybersecurity testing and intrusion detection for cyber-physical power systems
by Pan, Shengyi, Ph.D.  Mississippi State University. 2014: 161 pages; 3665497.
61 - 90 of 30876 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest