Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16109 open access dissertations and theses found for:
if(Prevented attacks)  »   Refine Search
151.
Signaling to the Nucleus in Excitatory and Inhibitory Neurons
by Cohen, Samuel Max, Ph.D.  New York University. 2016: 200 pages; 10139606.
153.
Choice and Consequence
by Jensen, Nathan, M.M.  California State University, Long Beach. 2009: 48 pages; 1481619.
154.
Online learning: Perceptions of school board members in California
by Albert, John M., Ed.D.  California State University, Fullerton. 2013: 106 pages; 3570186.
157.
Toujours Le Choix: The Role of Entertainment Education in Radicalization Prevention
by Payne, Melissa Alyece, M.A.  The American University of Paris (France). 2017: 69 pages; 13871602.
159.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
160.
Impact of gender inequality and religion on how states experience terrorism
by Salman, Aneela, D.A.  State University of New York at Albany. 2013: 191 pages; 3611897.
164.
Metric Experiments in Benjamin Britten's Vocal Music: 1943-1945
by Duncan, Stuart Paul, Ph.D.  Yale University. 2017: 198 pages; 10633242.
165.
Comparing the Effectiveness of Resilience Measures
by Matta, John, M.S.  Southern Illinois University at Edwardsville. 2014: 59 pages; 1566215.
166.
Detecting and characterizing malicious websites
by Xu, Li, Ph.D.  The University of Texas at San Antonio. 2014: 93 pages; 3637094.
167.
Application of a Hidden Bayes Naïve Multiclass Classifier in Network Intrusion Detection
by Koc, Levent, Ph.D.  The George Washington University. 2013: 146 pages; 3546303.
168.
A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems
by Jeddi, Zahra, Ph.D.  University of Louisiana at Lafayette. 2014: 178 pages; 3687692.
171.
An Investigation of Anomaly-based Ensemble Models for Multi-domain Intrusion Detection
by Mikhail, Joseph W., D.Engr.  The George Washington University. 2019: 117 pages; 10977908.
174.
Comparison of ad-hoc on demand distance vector and enhanced-ad-hoc on demand distance vector on vehicular ad-hoc networks
by Chandwasker, Tanmay, M.S.  California State University, Long Beach. 2016: 51 pages; 10011277.
175.
Apollo: End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
by Wu, Hua, Ph.D.  The George Washington University. 2020: 248 pages; 27666292.
176.
Bound by paper: Nineteenth-century southern editors and their northern connections
by Sparks, Summar C., Ph.D.  The University of North Carolina at Greensboro. 2015: 188 pages; 3745558.
177.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
179.
Performance evaluation of SIP authentication and TLS
by Maguluri, Swapna, M.S.C.E.  California State University, Long Beach. 2012: 121 pages; 1520910.
180.
Battling Spam and Sybils on the Social Web
by Wilson, Christo, Ph.D.  University of California, Santa Barbara. 2012: 329 pages; 3545102.
151 - 180 of 16109 displayed.
« First < Previous |   3    4    5    6    7    8    9    10    11    12    13   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest