Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
30877 open access dissertations and theses found for:
if(Network security)  »   Refine Search
91.
Enhancing the Design of a Cybersecurity Risk Management Solution for Communities of Trust
by Fulford, James E., Jr., D.B.A.  University of South Florida. 2018: 180 pages; 10979126.
92.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
93.
Byzantine survivable routing for mobile ad hoc networks
by Holmer, David, Ph.D.  The Johns Hopkins University. 2007: 101 pages; 3267877.
94.
Efficient Gain-Driven Routing-Assisted Mechanisms for Network-wide Traffic Monitoring
by Chang, Chia-Wei, Ph.D.  University of California, San Diego. 2011: 143 pages; 3487322.
95.
Integrated hardware/software approaches to software security for embedded systems
by Gelbart, Olga, D.Sc.  The George Washington University. 2008: 137 pages; 3297440.
96.
Quantitative analyses of software vulnerabilities
by Joh, HyunChul, Ph.D.  Colorado State University. 2011: 224 pages; 3489881.
97.
Performance and security in VOIP
by Patel, Malkesh M., M.S.  California State University, Long Beach. 2016: 38 pages; 10141531.
98.
Secure system simulation - Internet of Things
by Verma, Yukti, M.S.  California State University, Long Beach. 2016: 48 pages; 10116148.
99.
A Load Balancing Algorithm for Flow Management in Hybrid-SDN Networks
by Wang, Xuan, M.S.  University of South Dakota. 2018: 77 pages; 10937380.
100.
Quantifying and improving wireless privacy
by McCoy, Damon Liwanu, Ph.D.  University of Colorado at Boulder. 2009: 206 pages; 3387545.
101.
Trust-to-trust design of a new Internet
by Ali, Muneeb, Ph.D.  Princeton University. 2017: 95 pages; 10284026.
102.
Critical infrastructure protection
by Shwani, Hazim G., M.S.  Utica College. 2014: 55 pages; 1555605.
103.
Business continuity planning: Identifying gaps, patterns and justifications
by Bethany, Michael P., M.S.  California State University, Long Beach. 2014: 169 pages; 1526894.
105.
Secure storage via information dispersal across network overlays
by Johnston, Reece G., M.S.  The University of Alabama in Huntsville. 2016: 78 pages; 10157562.
106.
Design of a routing protocol for wireless sensor networks
by Thodupunuri, Akarsh, M.S.  California State University, Long Beach. 2016: 76 pages; 10134006.
107.
Accommodative mandatory access control
by Thomas, Jacques D., Ph.D.  Purdue University. 2011: 236 pages; 3506071.
108.
Nation State Threat Actions Against Critical Energy Infrastructures
by Garner, Michael Wilson, Jr., M.S.  Utica College. 2017: 43 pages; 10686214.
110.
Application of a Hidden Bayes Naïve Multiclass Classifier in Network Intrusion Detection
by Koc, Levent, Ph.D.  The George Washington University. 2013: 146 pages; 3546303.
112.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
113.
A model of forensic analysis using goal-oriented logging
by Peisert, Sean Philip, Ph.D.  University of California, San Diego. 2007: 182 pages; 3246091.
114.
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
by LeDoux, Charles, Ph.D.  University of Louisiana at Lafayette. 2016: 179 pages; 10245924.
116.
Use of double-loop learning to combat advanced persistent threat: Multiple case studies
by Lamb, Christopher J., Ph.D.  Capella University. 2013: 151 pages; 3607034.
117.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
118.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
119.
120.
An Empirical Study of Privacy Risk Assessment Methodologies in Cloud Computing Environments
by Pauley, Wayne A., Jr., Ph.D.  Nova Southeastern University. 2012: 222 pages; 3499794.
91 - 120 of 30877 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest