Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
52 open access dissertations and theses found for:
if(Ransomware)  »   Refine Search
32.
A Deep Learning Approach to Detecting Covert Channels in the Domain Name System
by Peña, Tomás Antonio, T.D.  Capitol Technology University. 2020: 206 pages; 27735496.
33.
Nation State Threat Actions Against Critical Energy Infrastructures
by Garner, Michael Wilson, Jr., M.S.  Utica College. 2017: 43 pages; 10686214.
34.
Susceptibility to Social Engineering: Human Vulnerabilities
by Schroeder, Chelsea, M.S.  Utica College. 2019: 41 pages; 27670795.
36.
37.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
38.
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
by LeDoux, Charles, Ph.D.  University of Louisiana at Lafayette. 2016: 179 pages; 10245924.
39.
Iranian Cyber Espionage
by Spataro, Jason G., M.S.  Utica College. 2019: 72 pages; 13877649.
40.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
41.
A Security Strategy for the United States of America
by Pedersen, Christian E.||||||Payne, Michael A.||||||Gagner, Cari, M.P.P.  Pepperdine University. 2014: 91 pages; 1594924.
42.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
44.
Adapting Swarm Applications: A Systematic and Quantitative Approach
by Zhang, Ben, Ph.D.  University of California, Berkeley. 2018: 100 pages; 10931111.
45.
Structuring Disincentives for Online Criminals
by Leontiadis, Nektarios, Ph.D.  Carnegie Mellon University. 2014: 370 pages; 3691274.
46.
Essays on the Future of Money
by Moulton, Charles E., Jr., Ph.D.  George Mason University. 2018: 174 pages; 13419644.
47.
Cybersecurity Workforce Alert: Women's Perspectives on Factors Influencing Female Interest
by Pifer, Carrie L., Ed.D.  Frostburg State University. 2017: 172 pages; 10744000.
48.
Cybersecurity IR: A Thematic-analysis of Practitioner Plans, Policies, and Guidelines
by Fox, Michael B., Ph.D.  Trident University International. 2019: 192 pages; 13904714.
49.
A Multivariate Bayesian Approach to Modeling Vulnerability Discovery in the Software Security Lifecycle
by Johnston, Reuben Aaron, Ph.D.  The George Washington University. 2018: 205 pages; 10828524.
50.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
51.
Resilient and Thriving Leadership in Extreme and Prolonged Chaotic Milieus
by Noumair, Edgar, Ed.D.  University of Pennsylvania. 2018: 304 pages; 10827552.
52.
Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
by Herr, Trey, Ph.D.  The George Washington University. 2016: 317 pages; 10076294.
31 - 52 of 52 displayed.
« First < Previous |   1    2  
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest