Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
63 open access dissertations and theses found for:
if(Ransomware)  »   Refine Search
1.
Evolving Ransomware Attacks on Healthcare Providers
by Al Qartah, Ayed, M.S.  Utica College. 2020: 70 pages; 28093945.
2.
Dynamic Malware Analysis of GPU-Assisted Cryptoviruses Using Contained AES Side-Channels
by Espinoza, Jesus Pastor, D.Sc.  Capitol Technology University. 2018: 503 pages; 13853787.
3.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
6.
Forensic Accountants' Strategies and Cybercrime Mitigation
by Okechukwu, Joseph Chukwudi, D.B.A.  Northcentral University. 2020: 201 pages; 27830687.
7.
An Exploration of Countermeasures to Defend Against Weaponized AI Malware Exploiting Facial Recognition
by Jalaluddin, Arooj Zafar, D.Sc.  Capitol Technology University. 2020: 197 pages; 28094887.
8.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
9.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
11.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
12.
Benchmarks for Evaluating Anomaly-Based Intrusion Detection Solutions
by Miller, Nicholas J., M.S.  California State University, Long Beach. 2018: 30 pages; 10752128.
13.
IT Security Managers' Strategies for Mitigating Data Breaches in Texas School Districts
by Nwankwo, Mercy Ikhuoria, D.I.T.  Walden University. 2020: 273 pages; 28150989.
14.
Extensible Performance-aware Runtime Integrity Measurement
by Delgado, Brian G., Ph.D.  Portland State University. 2020: 234 pages; 27741720.
16.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
17.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
by Osei-Amanfi, Michael, D.B.A.  Grand Canyon University. 2018: 359 pages; 13423232.
18.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
19.
Relationship of Organizational Structures in Higher Education to Risk Management
by Asante, Robert, Ed.D.  University of Pennsylvania. 2019: 230 pages; 27664719.
20.
Maintaining Small Retail Business Profitability by Reducing Cyberattacks
by Phillips, Ira J., Jr., D.B.A.  Walden University. 2020: 141 pages; 28024279.
21.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
23.
Security Concept for VPN IPsec Site-to-Site Connections to Third Parties
by Schmalen, Daniel, M.S.  California State University, Long Beach. 2018: 74 pages; 10688606.
24.
Bitcoin regulations and investigations: A proposal for U.S. policies
by Fawcett, Jay Palmer, M.S.  Utica College. 2017: 71 pages; 10244196.
25.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
26.
Automatic Program State Exploration Techniques for Security Analysis of Android Apps
by Johnson, Ryan, Ph.D.  George Mason University. 2019: 211 pages; 27667472.
28.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
30.
Enhancing the Design of a Cybersecurity Risk Management Solution for Communities of Trust
by Fulford, James E., Jr., D.B.A.  University of South Florida. 2018: 180 pages; 10979126.
1 - 30 of 63 displayed.
  1    2    3   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest