Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
184 open access dissertations and theses found for:
if(Phishing)  »   Refine Search
1.
A policy analysis of phishing countermeasures
by Sheng, Xinguang (Steve), Ph.D.  Carnegie Mellon University. 2009: 181 pages; 3383412.
2.
Techniques for detecting zero day phishing websites
by Blasi, Michael, M.S.  Iowa State University. 2009: 89 pages; 1465719.
3.
Unbiased Phishing Detection Using Domain Name Based Features
by Shirazi, Hossein, M.S.  Colorado State University. 2018: 72 pages; 10826588.
4.
The effects of conformity and training in a phishing context: Conforming to the school of phish
by Jones, Matt, M.A.  The University of Alabama in Huntsville. 2015: 43 pages; 10182209.
5.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
6.
The Effects of Inhibitory Control and Perceptual Attention on Cyber Security
by Pearson, Ed, III, Ph.D.  Mississippi State University. 2019: 144 pages; 13423953.
7.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
8.
Proactive cyberfraud detection through infrastructure analysis
by Kalafut, Andrew J., Ph.D.  Indiana University. 2010: 153 pages; 3423688.
9.
A structure based technique for spam detection and email classification
by Desai, Varun, M.S.  California State University, Long Beach. 2016: 56 pages; 10017844.
10.
Exploring internet users' vulnerability to online dating fraud: Analysis of routine activities theory factors
by Garrett, Elena Victorovna, M.S.  The University of Texas at Dallas. 2014: 124 pages; 1583633.
11.
Iranian Cyber Espionage
by Spataro, Jason G., M.S.  Utica College. 2019: 72 pages; 13877649.
12.
13.
Navigating the Malweb: Authentication Schemes for Mobile Devices
by Niu, Yuan, Ph.D.  University of California, Davis. 2011: 116 pages; 3474442.
14.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
16.
Systemic effects of human factors in information security
by Kelley, Timothy D., Ph.D.  Indiana University. 2014: 153 pages; 3665483.
17.
Awareness of malicious social engineering among facebook users
by Slonka, Kevin J., D.Sc.  Robert Morris University. 2014: 140 pages; 3620246.
19.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
20.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
21.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
by Osei-Amanfi, Michael, D.B.A.  Grand Canyon University. 2018: 359 pages; 13423232.
22.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
23.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
24.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
25.
Reasons for non-compliance with mandatory information assurance policies by a trained population
by Shelton, D. Cragin, D.Sc.  Capitol Technology University. 2014: 243 pages; 3741052.
26.
27.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
28.
Nation State Threat Actions Against Critical Energy Infrastructures
by Garner, Michael Wilson, Jr., M.S.  Utica College. 2017: 43 pages; 10686214.
29.
Use of double-loop learning to combat advanced persistent threat: Multiple case studies
by Lamb, Christopher J., Ph.D.  Capella University. 2013: 151 pages; 3607034.
30.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
1 - 30 of 184 displayed.
  1    2    3    4    5    6    7   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest