Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
7610 open access dissertations and theses found for:
if(Polymorphic attacks)  »   Refine Search
1.
Polymorphic attacks and network topology: Application of concepts from natural systems
by Rangan, Prahalad, Ph.D.  State University of New York at Albany. 2010: 102 pages; 3402465.
2.
Privacy on Online Social Networks
by Gao, Yunpeng, D.Engr.  The George Washington University. 2019: 67 pages; 22615441.
3.
Impacts and Implications of Polytypism on the Evolution of Aposematic Coloration
by Lawrence, Justin Philip, Ph.D.  The University of Mississippi. 2018: 116 pages; 10812811.
4.
Template induced polymorphic selectivity in pharmaceutical crystallisation
by Parambil, Jose Varghese, Ph.D.  National University of Singapore (Singapore). 2015: 187 pages; 10006030.
5.
Ecology and genetics of color vision in Callicebus brunneus, a neotropical monkey
by Bunce, John Andrew, Ph.D.  University of California, Davis. 2009: 175 pages; 3375520.
6.
Modular Understanding: A Taxonomy and Toolkit for Designing Modularity in Audio Software and Hardware
by Hetrick, Michael Lynn Saverio, Ph.D.  University of California, Santa Barbara. 2017: 365 pages; 10253730.
7.
Honeypot with Honeypot Management System for web applications
by Karia, Rutu, M.S.  California State University, Long Beach. 2011: 85 pages; 1504488.
9.
Molecular evolution in embiotocid surfperches
by Longo, Gary Charles, Ph.D.  University of California, Santa Cruz. 2016: 74 pages; 10246624.
10.
11.
Addressing production run failures dynamically
by Tucek, Joseph A., Ph.D.  University of Illinois at Urbana-Champaign. 2011: 163 pages; 3503707.
12.
On the feasibility of intrusion detection system in wireless sensor network
by Murarka, Kishore Ramkisan, M.S.  California State University, Long Beach. 2012: 86 pages; 1517746.
14.
Relationship between triplet repeat polymorphisms and HapMap tagSNPs
by Keddache, Mehdi, Ph.D.  University of Cincinnati. 2011: 123 pages; 3452890.
15.
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
by LeDoux, Charles, Ph.D.  University of Louisiana at Lafayette. 2016: 179 pages; 10245924.
17.
Contributions of Genetic Data to the Conservation and Management of the Threatened American Hart's-Tongue Fern (Asplenium Scolopendrium var. Americanum)
by Weber-Townsend, Joshua R., M.S.  State University of New York College of Environmental Science and Forestry. 2017: 115 pages; 10274085.
18.
19.
Genomic insights into bacterial adaptation during infection
by Lieberman, Tami Danielle, Ph.D.  Harvard University. 2014: 129 pages; 3626834.
22.
Polymorphic chip multiprocessor architecture
by Solomatnikov, Alexandre, Ph.D.  Stanford University. 2009: 167 pages; 3343960.
23.
Genetic mechanisms of resistance to Fusarium root rot in pea (Pisum sativum L.)
by Bodah, Eliane Thaines, Ph.D.  Washington State University. 2014: 140 pages; 3684750.
24.
Causation or Coincidence: The Relationship Between EU Border Policies and Islamic State Attacks
by Hardy, Margaret, M.A.  The George Washington University. 2019: 85 pages; 22618018.
25.
Clustering algorithms for next-generation sequencing data from heterogenous populations
by Prabhakara, Shruthi, Ph.D.  The Pennsylvania State University. 2012: 126 pages; 3737327.
29.
Secure Distributed Inference
by Chen, Yuan, Ph.D.  Carnegie Mellon University. 2019: 169 pages; 13883829.
30.
Diagnosis-based Intrusion Detection
by Jackson, Conner Patrick Stearns, M.S.  University of California, Davis. 2016: 97 pages; 10124452.
1 - 30 of 7610 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest