Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16108 open access dissertations and theses found for:
if(Prevented attacks)  »   Refine Search
211.
Counterterrorism Policy towards Boko Haram in Nigeria during 2009-2015
by Ojelade, Steve Olufemi, Ph.D.  Walden University. 2018: 230 pages; 10982497.
212.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
213.
U.S. and NATO Cyber Defense: Bridging the Resource Gap with a Centralized Market Structure
by Lipke, Alexa, M.A.  The George Washington University. 2016: 71 pages; 10189713.
214.
Global scale identity management
by Tambasco, Michael J., M.S.  Utica College. 2015: 60 pages; 1600350.
215.
Architecture and protocols for a high-performance, secure IEEE 802.11-based wireless mesh network
by Raniwala, Ashish, Ph.D.  State University of New York at Stony Brook. 2009: 215 pages; 3401726.
216.
Waging war across the ocean
by Warburton, Seth C., M.A.  East Carolina University. 2011: 197 pages; 1497920.
217.
Perceived Security and Usage of a Mobile Payment Application
by Sieger, Hanul, Eng.D.  Technische Universitaet Berlin (Germany). 2015: 132 pages; 10703767.
219.
How U.S. political and socio-economic trends promotes hacktivist activity
by Aviles, Grisselle, M.S.  Utica College. 2015: 85 pages; 1590361.
220.
Cybersecurity of wireless implantable medical devices
by Ash, Sarah L., M.S.  Utica College. 2016: 51 pages; 10109631.
221.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
222.
Relationship between User Privacy and Application Permissions in Smartphone Platforms
by Caushaj, Eralda, Ph.D.  Oakland University. 2017: 159 pages; 10639215.
223.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
225.
IDnet Mesh: Towards user accountability for the Internet
by Deng, Leiwen, Ph.D.  Northwestern University. 2010: 134 pages; 3402413.
227.
Mechanisms underlying distortions in flashbulb memories for September 11, 2001
by Winkel, Rebecca, Ph.D.  New School University. 2009: 77 pages; 3359052.
228.
A reversible data hiding technique in encrypted images by creating space before encryption
by Pakala, Vinay Kumar Reddy, M.S.  California State University, Long Beach. 2016: 37 pages; 10141524.
229.
Detection problems in watermarking, steganography, and camera identification
by Yu, Jun Eugene, Ph.D.  State University of New York at Binghamton. 2011: 113 pages; 3474057.
230.
232.
Detection and Prevention of Misuse of Software Components
by Ting, Dai, Ph.D.  National University of Singapore (Singapore). 2015: 141 pages; 10005992.
233.
Trust-to-trust design of a new Internet
by Ali, Muneeb, Ph.D.  Princeton University. 2017: 95 pages; 10284026.
234.
State Responsibility under International Law the 2003 U.S. Invasion of Iraq
by Issa, Carla Maria, M.A.  The American University of Paris (France). 2016: 56 pages; 13871616.
235.
Competing fenianisms: British, Irish, and American responses to a transatlantic movement
by McLean, John, Ph.D.  State University of New York at Buffalo. 2010: 271 pages; 3423581.
236.
The diffusion of military power: Causes and consequences for international politics
by Horowitz, Michael, Ph.D.  Harvard University. 2007: 430 pages; 3265175.
237.
Localization of spoofing attackers by using spatial correlation of received signal strength
by Madithati, Roopesh Kumar Reddy, M.S.  California State University, Long Beach. 2016: 40 pages; 10004165.
238.
Determinants of insurgency activity in Afghanistan: A cross-provincial analysis
by Counihan, Michael Alan, M.A.  Georgetown University. 2011: 54 pages; 1491322.
240.
A model of forensic analysis using goal-oriented logging
by Peisert, Sean Philip, Ph.D.  University of California, San Diego. 2007: 182 pages; 3246091.
211 - 240 of 16108 displayed.
« First < Previous |   5    6    7    8    9    10    11    12    13    14    15   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest