Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
52 open access dissertations and theses found for:
if(Ransomware)  »   Refine Search
1.
Dynamic Malware Analysis of GPU-Assisted Cryptoviruses Using Contained AES Side-Channels
by Espinoza, Jesus Pastor, D.Sc.  Capitol Technology University. 2018: 503 pages; 13853787.
2.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
4.
Forensic Accountants' Strategies and Cybercrime Mitigation
by Okechukwu, Joseph Chukwudi, D.B.A.  Northcentral University. 2020: 201 pages; 27830687.
5.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
6.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
8.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
9.
Benchmarks for Evaluating Anomaly-Based Intrusion Detection Solutions
by Miller, Nicholas J., M.S.  California State University, Long Beach. 2018: 30 pages; 10752128.
10.
Extensible Performance-aware Runtime Integrity Measurement
by Delgado, Brian G., Ph.D.  Portland State University. 2020: 234 pages; 27741720.
12.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
13.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
by Osei-Amanfi, Michael, D.B.A.  Grand Canyon University. 2018: 359 pages; 13423232.
14.
Relationship of Organizational Structures in Higher Education to Risk Management
by Asante, Robert, Ed.D.  University of Pennsylvania. 2019: 230 pages; 27664719.
15.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
16.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
18.
Bitcoin regulations and investigations: A proposal for U.S. policies
by Fawcett, Jay Palmer, M.S.  Utica College. 2017: 71 pages; 10244196.
19.
Security Concept for VPN IPsec Site-to-Site Connections to Third Parties
by Schmalen, Daniel, M.S.  California State University, Long Beach. 2018: 74 pages; 10688606.
20.
Automatic Program State Exploration Techniques for Security Analysis of Android Apps
by Johnson, Ryan, Ph.D.  George Mason University. 2019: 211 pages; 27667472.
22.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
23.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
24.
Enhancing the Design of a Cybersecurity Risk Management Solution for Communities of Trust
by Fulford, James E., Jr., D.B.A.  University of South Florida. 2018: 180 pages; 10979126.
27.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
28.
Best practices to establish successful mobile health service in a healthcare setting
by Andrews, Kathy M., Ed.D.  Pepperdine University. 2016: 160 pages; 10251009.
29.
Analyzing Historical Data Breaches to Improve Public Cloud Security Postures
by Zhou, Yucheng, D.Engr.  The George Washington University. 2020: 125 pages; 27664530.
1 - 30 of 52 displayed.
  1    2   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest