Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16108 open access dissertations and theses found for:
if(Prevented attacks)  »   Refine Search
302.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
303.
304.
305.
Never forgetting: Bereavement associated with September 11th
by Latino, Rose, Ph.D.  Smith College School for Social Work. 2011: 156 pages; 10035660.
306.
Cybersecurity of unmanned aircraft systems (UAS)
by Gomez, Cesar A., M.S.  Utica College. 2015: 70 pages; 1605296.
307.
Assessing the Influence of Building Geometry on Active Shooter Event Outcomes
by Dane, Kristopher R., D.Engr.  The George Washington University. 2018: 115 pages; 10841977.
308.
Stratagem in asymmetry: Nonstate armed groups' use of deception
by Jessee, Devin Duke, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2011: 378 pages; 3475330.
310.
Mitigating Privilege Escalation
by Brookes, Scott, Ph.D.  Dartmouth College. 2018: 215 pages; 10822683.
313.
Reliable and Efficient Routing for Wireless Sensor Networks
by Sinha, Saket, M.S.  California State University, Long Beach. 2017: 55 pages; 10263570.
314.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
316.
The Utility of Islamic State’s Internet Media Campaign 
by Spring, Curtis Peter, M.Litt.  University of St. Andrews (United Kingdom). 2018: 66 pages; 27724582.
317.
Validating Petri Net Models of Cyberattacks
by Christensen, Nicholas M., M.S.  The University of Alabama in Huntsville. 2017: 102 pages; 10608103.
318.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
319.
Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
by Herr, Trey, Ph.D.  The George Washington University. 2016: 317 pages; 10076294.
320.
Network traffic analysis through statistical signal processing methods
by AsSadhan, Basil Abdullah, Ph.D.  Carnegie Mellon University. 2009: 104 pages; 3394005.
321.
Examining Implicit Associations for Community Support Stimuli Following Community Trauma
by Connell, Nicholas J., M.S.  University of Louisiana at Lafayette. 2017: 66 pages; 10615596.
322.
"Don't Strip-Tease for Anopheles": A history of malaria protocols during World War II*
by Wacks, Rachel Elise, M.A.  The Florida State University. 2013: 77 pages; 1539280.
323.
Micro-simulation of large scale evacuations utilizing metrorail transit
by VanLandegen, Luke David, M.S.  Northern Illinois University. 2010: 82 pages; 1477116.
324.
Structuring Disincentives for Online Criminals
by Leontiadis, Nektarios, Ph.D.  Carnegie Mellon University. 2014: 370 pages; 3691274.
326.
Countering violent extremism: A whole community approach to prevention and intervention
by Golan, Guy D., M.S.  California State University, Long Beach. 2016: 218 pages; 10065201.
327.
The Effects of Inhibitory Control and Perceptual Attention on Cyber Security
by Pearson, Ed, III, Ph.D.  Mississippi State University. 2019: 144 pages; 13423953.
328.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
329.
The impacts of removing wildfire on Pinus ponderosa resistance against Dendroctonus ponderosae
by Hood, Sharon Metzger, Ph.D.  University of Montana. 2014: 114 pages; 3702805.
330.
Intuitive decisions as a means of preventing medical errors
by Savage, Lynette M., Ph.D.  Walden University. 2009: 170 pages; 3342446.
301 - 330 of 16108 displayed.
« First < Previous |   8    9    10    11    12    13    14    15    16    17    18   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest