Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
81 open access dissertations and theses found for:
if(SIEM)  »   Refine Search
2.
Application of SIEM/UEBA/SOAR/SOC (Cyber SUSS) Concepts on MSCS 6560 Computer Lab
by Singh, Kunal, M.S.  Marquette University. 2020: 82 pages; 28029141.
4.
Performance, Practice, and Possibility: How Large Scale Processes Affect the Bodily Economy of Cambodia's Classical Dancers
by Tuchman-Rosta, Celia Johanna, Ph.D.  University of California, Riverside. 2018: 377 pages; 10748212.
7.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
9.
An Event Management Framework to Aid Solution Providers in Cybersecurity
by Leon, Ryan James, D.Engr.  The George Washington University. 2018: 114 pages; 10745141.
10.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
12.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
13.
Pairing correlations and phase transitions in mesoscopic systems
by Sumaryada, Tony Ibnu, Ph.D.  The Florida State University. 2007: 86 pages; 3301598.
14.
Rethinking Existing Cybersecurity Frameworks: How to Incentivise Companies to Better Defend against Cyber Threats
by Wang, BaoFa, M.S.  University of London, Royal Holloway, University of London (United Kingdom). 2020: 106 pages; 28087173.
15.
Understanding Controls to Detect and Mitigate Malicious Privileged User Abuse
by Harris, Clyde Devince, D.Sc.  Capitol Technology University. 2020: 210 pages; 28088128.
16.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
17.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
19.
The Soriya Band: A Case Study of Cambodian American Rock Music in Southern California
by Seng, Sophea, M.A.  University of California, Riverside. 2016: 76 pages; 10153682.
20.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
21.
Personal narrative: Journey from the killing fields to the United States of America
by McCormick, Ponneary, M.S.W.  California State University, Long Beach. 2010: 98 pages; 1486323.
22.
Malware Vectors: A Technique for Discovering Defense Logics
by Stocco, Gabriel Fortunato, Ph.D.  Dartmouth College. 2014: 121 pages; 3685144.
24.
The Mental Health and Well-Being of College Students in Cambodia
by Pan, Alexandria, M.S.  California State University, Long Beach. 2017: 65 pages; 10288540.
25.
Detection of communication over DNSSEC covert channels
by Hands, Nicole M., M.S.  Purdue University. 2016: 82 pages; 10181541.
26.
Personal narrative: An ethnic Lao Cambodian refugee's journey to educational opportunity
by Antoniades, Narin Phaingdy, M.S.W.  California State University, Long Beach. 2009: 61 pages; 1481607.
27.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
28.
29.
Reverse Engineering of Ancient Ceramic Technologies from Southeast Asia and South China
by Kivi, Nicholas, M.S.  The University of Arizona. 2019: 192 pages; 13426471.
1 - 30 of 81 displayed.
  1    2    3   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest