Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16112 open access dissertations and theses found for:
if(Prevented attacks)  »   Refine Search
122.
Unbiased Phishing Detection Using Domain Name Based Features
by Shirazi, Hossein, M.S.  Colorado State University. 2018: 72 pages; 10826588.
123.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
124.
Peripheral Receptor Mechanisms Underlying Orofacial Muscle Pain and Hyperalgesia
by Saloman, Jami L., Ph.D.  University of Maryland, Baltimore. 2012: 212 pages; 3550848.
126.
Time bending: Temporal malleability and organizational response in crisis situations
by Carson, Gary W., Ph.D.  University of South Florida. 2008: 238 pages; 3326031.
127.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
130.
Behavioral Assessment Teams Using Threat Assessment at Flagship Universities in New England
by Graney, Daniel D., Ed.D.  Johnson & Wales University. 2011: 166 pages; 3457223.
131.
Cannabinoid Regulation of Serotonin 2A (5-HT2A) Receptor Signaling
by Franklin, Jade M., Ph.D.  University of Kansas. 2013: 257 pages; 3589526.
132.
Architectures for cryptography accelerators
by Cohen, Aaron Ethan, Ph.D.  University of Minnesota. 2007: 199 pages; 3277590.
133.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
134.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
135.
Causes of domestic terrorism: 1970–2010
by Berkebile, Richard E., Ph.D.  University of Missouri - Columbia. 2012: 192 pages; 3537871.
136.
S4h: A Peer-to-Peer Search Engine with Explicit Trust
by Cowan, Greg, M.S.  Rensselaer Polytechnic Institute. 2019: 49 pages; 13813168.
137.
138.
Terror in Plainview: Terrorist-Gang Threats of Biological Weapons Usage
by Dones, D. Darell, Ph.D.  George Mason University. 2012: 242 pages; 3515298.
139.
Techniques for Enhancing the Security of Future Smart Grids
by Saed, Mustafa, Ph.D.  University of Detroit Mercy. 2018: 444 pages; 10793626.
140.
Authenticating executions for trusted systems
by Aktas, Erdem, Ph.D.  State University of New York at Binghamton. 2013: 215 pages; 3596989.
141.
Thwarting malicious and selfish behavior in commodity Wi -Fi networks
by Ma, Liran, D.Sc.  The George Washington University. 2008: 123 pages; 3320933.
142.
Quantifying and improving wireless privacy
by McCoy, Damon Liwanu, Ph.D.  University of Colorado at Boulder. 2009: 206 pages; 3387545.
143.
Multimedia protection using content and embedded fingerprints
by Varna, Avinash Laxmisha, Ph.D.  University of Maryland, College Park. 2011: 208 pages; 3461319.
144.
Assessing City Preparedness for a Biological Attack
by Moore, Joseph T., Ph.D.  Walden University. 2011: 113 pages; 3457361.
145.
Therapeutic landscapes for birth: A research synthesis
by Havill, Nancy L., Ph.D.  The University of North Carolina at Chapel Hill. 2012: 160 pages; 3509270.
147.
Terrorized into compliance: Why countries submit to financial counterterrorism
by Lula, Karolina, Ph.D.  Rutgers The State University of New Jersey - Newark. 2014: 162 pages; 3613909.
148.
Side channel attack resistance: Migrating towards high level methods
by Borowczak, Mike, Ph.D.  University of Cincinnati. 2013: 183 pages; 3601397.
149.
Benchmarks for Evaluating Anomaly-Based Intrusion Detection Solutions
by Miller, Nicholas J., M.S.  California State University, Long Beach. 2018: 30 pages; 10752128.
150.
Signaling to the Nucleus in Excitatory and Inhibitory Neurons
by Cohen, Samuel Max, Ph.D.  New York University. 2016: 200 pages; 10139606.
121 - 150 of 16112 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest