Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16094 open access dissertations and theses found for:
if(Prevented attacks)  »   Refine Search
91.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
92.
Learning from the Uighurs: Correcting Inadequate Due Process in Terrorist Financing Sanction Regimes
by Pulsifer, Jessica Elizabeth, LL.M.  The George Washington University. 2012: 72 pages; 1515271.
93.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
95.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
96.
The legal-military dilemma in the response to international terrorism
by Allan, Matthew Wesley, Ph.D.  Texas A&M University. 2009: 253 pages; 3400678.
97.
Critical Infrastructure: Legislative Factors for Preventing a "Cyber-Pearl Harbor"
by Palmer, Robert Kenneth, LL.M.  The George Washington University. 2013: 75 pages; 1545831.
99.
Web browsers as operating systems: Supporting robust and secure web programs
by Reis, Charles, Ph.D.  University of Washington. 2009: 173 pages; 3370601.
100.
101.
Security, Computation and Data Issues in Clouds
by Li, Lifeng, M.S.  Arkansas State University. 2017: 112 pages; 10288061.
102.
A policy analysis of phishing countermeasures
by Sheng, Xinguang (Steve), Ph.D.  Carnegie Mellon University. 2009: 181 pages; 3383412.
103.
Conspiracy Theory and 9/11
by de Benveniste, Isabelle Villon, M.A.  The American University of Paris (France). 2013: 52 pages; 10305840.
104.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
105.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
108.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
109.
Secure NFC enabled mobile phone payments using elliptic curve cryptography (SNFCMP)
by Byambajav, Dolgorsuren, M.S.  California State University, Long Beach. 2011: 76 pages; 1504435.
110.
A covert war at sea: Piracy and political economy in Malaya, 1824-1874
by Abel, Scott C., Ph.D.  Northern Illinois University. 2016: 281 pages; 10195027.
111.
Support group for military widows mending hearts and living life: A grant proposal
by Leyva, Angelica, M.S.W.  California State University, Long Beach. 2011: 62 pages; 1511361.
112.
Improving anonymity networks via end-to-end design
by Viecco, Camilo Hernan, Ph.D.  Indiana University. 2011: 140 pages; 3509948.
113.
Images in the Rhetoric of the Far-Right in France and Germany
by Moreno, Brandon Alexander, M.A.  Northern Arizona University. 2018: 68 pages; 13421845.
114.
A framework for cost-sensitive automated selection of intrusion response
by Strasburg, Christopher Roy, M.S.  Iowa State University. 2009: 76 pages; 1468160.
116.
Defeating memory error exploits using automated software diversity
by Bhatkar, Sandeep, Ph.D.  State University of New York at Stony Brook. 2007: 123 pages; 3337612.
117.
Evaluating the “New York Times'” framing of Islam and Muslims pre- and post-9/11
by Ahmed, Sara J., M.A.  University of Houston. 2007: 87 pages; 1443827.
119.
Beneath the Attack Surface
by Mowery, Keaton, Ph.D.  University of California, San Diego. 2015: 200 pages; 3712726.
120.
Evaluation and Design of Robust Neural Network Defenses
by Carlini, Nicholas, Ph.D.  University of California, Berkeley. 2018: 138 pages; 10931076.
91 - 120 of 16094 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest