Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16112 open access dissertations and theses found for:
if(Prevented attacks)  »   Refine Search
241.
A model of forensic analysis using goal-oriented logging
by Peisert, Sean Philip, Ph.D.  University of California, San Diego. 2007: 182 pages; 3246091.
246.
The Responsibility to Prevent: Neocolonialism, Poverty and Mass Atrocity Crimes in Africa
by Brino, Eileen, Ph.D.  State University of New York at Albany. 2018: 320 pages; 10812518.
247.
The geography of insurgency: An urban network insurgency model of the Viet Nam War
by Lohman, Andrew Davies, Ph.D.  University of Illinois at Urbana-Champaign. 2009: 302 pages; 3395574.
248.
Iranian Cyber Espionage
by Spataro, Jason G., M.S.  Utica College. 2019: 72 pages; 13877649.
251.
The impact of data breaches on market value of firms in the E-Commerce marketplace
by Washington, Kevin D., D.B.A.  Capella University. 2016: 84 pages; 10102712.
252.
Leveraging Internet Background Radiation for Opportunistic Network Analysis
by Benson, Karyn, Ph.D.  University of California, San Diego. 2016: 278 pages; 10161733.
253.
Protecting mobile ad hoc networks by cooperative defense and energy-oriented approach
by Kuthumbaka, Ajith Madhav, M.S.  California State University, Long Beach. 2016: 36 pages; 1606703.
254.
256.
Competition in the market for political violence: Northern Irish Republicanism, 1969–1998
by Sawyer, John Paul, Ph.D.  Georgetown University. 2010: 506 pages; 3433504.
258.
Duty-Cycle Based Physical Unclonable Functions (PUFs) for Hardware Security Applications
by Azhar, Mahmood Javed, Ph.D.  University of South Florida. 2018: 100 pages; 10980455.
259.
An examination of how American business must eliminate perceived bias towards Muslims and Arab Americans
by Horowitz, Jeffrey, M.A.  State University of New York Empire State College. 2010: 99 pages; 1484335.
260.
Addressing production run failures dynamically
by Tucek, Joseph A., Ph.D.  University of Illinois at Urbana-Champaign. 2011: 163 pages; 3503707.
261.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
262.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
263.
264.
Threat, military culture, and strategy: The United States in Afghanistan and Iraq
by Nishi, Takayuki, Ph.D.  The University of Chicago. 2009: 222 pages; 3369458.
266.
Taming the territory: Women and gender on the Florida frontier
by Clark, Laurel A., Ph.D.  The George Washington University. 2007: 281 pages; 3297145.
267.
Use of double-loop learning to combat advanced persistent threat: Multiple case studies
by Lamb, Christopher J., Ph.D.  Capella University. 2013: 151 pages; 3607034.
268.
An exploration of online spam prevention through geolocational filters
by Boukes, John, M.S.  California State University, Long Beach. 2012: 90 pages; 1522208.
269.
270.
Analytical optimized approach for peer-to-peer systems based on self-organizing trust model
by Manda, Akshay Reddy, M.S.  California State University, Long Beach. 2016: 54 pages; 10108180.
241 - 270 of 16112 displayed.
« First < Previous |   6    7    8    9    10    11    12    13    14    15    16   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest