Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
31266 open access dissertations and theses found for:
if(Security modeling)  »   Refine Search
1.
Identifying Factors Contributing towards Information Security Maturity in an Organization
by Edwards, Madhuri M., Ph.D.  Nova Southeastern University. 2018: 245 pages; 10746212.
3.
Emergent Network Defense
by Crane, Earl Newell, Ph.D.  The George Washington University. 2013: 167 pages; 3548491.
4.
Enforcing role-based access control on a social network
by Anderson, James Carold, M.S.  East Carolina University. 2012: 240 pages; 1518475.
5.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
7.
A framework for the governance of information security
by Edwards, Charles K., Ph.D.  Nova Southeastern University. 2013: 228 pages; 3607548.
8.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
9.
Design Automation for Carbon Nanotube Circuits Considering Performance and Security Optimization
by Liu, Lin, Ph.D.  Michigan Technological University. 2017: 169 pages; 10267186.
10.
Modeling and analyzing service-oriented enterprise architectural styles
by Tang, Longji, Ph.D.  The University of Texas at Dallas. 2011: 269 pages; 3494567.
11.
Assessing the Influence of Building Geometry on Active Shooter Event Outcomes
by Dane, Kristopher R., D.Engr.  The George Washington University. 2018: 115 pages; 10841977.
13.
A Prudent Access Control Behavioral Intention Model for the Healthcare Domain
by Mussa, Constance C., Ph.D.  Nova Southeastern University. 2011: 247 pages; 3474092.
15.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
16.
Quantitative analyses of software vulnerabilities
by Joh, HyunChul, Ph.D.  Colorado State University. 2011: 224 pages; 3489881.
17.
Cyber Physical System Modeling of Smart Charging Process
by Langschwager, Matthew T., M.S.  University of Louisiana at Lafayette. 2018: 98 pages; 13420593.
18.
End user software product line support for smart spaces
by Tzeremes, Vasilios, Ph.D.  George Mason University. 2016: 287 pages; 10249280.
19.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
21.
A Multivariate Bayesian Approach to Modeling Vulnerability Discovery in the Software Security Lifecycle
by Johnston, Reuben Aaron, Ph.D.  The George Washington University. 2018: 205 pages; 10828524.
22.
Validating Petri Net Models of Cyberattacks
by Christensen, Nicholas M., M.S.  The University of Alabama in Huntsville. 2017: 102 pages; 10608103.
23.
Systemic effects of human factors in information security
by Kelley, Timothy D., Ph.D.  Indiana University. 2014: 153 pages; 3665483.
24.
An exploratory investigation of organizational security climate in a highly regulated environment
by Bitzer, Edward George, III, Ph.D.  Colorado State University. 2010: 125 pages; 3433677.
25.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
26.
An examination of the relationship between levels of food security and depression
by Svojse, Erica K., M.A.  The University of Wisconsin - Milwaukee. 2014: 70 pages; 1566450.
27.
Cyber Agility for Attack Deterrence and Deception
by Jafarian, Jafar Haadi, Ph.D.  The University of North Carolina at Charlotte. 2017: 200 pages; 10686943.
28.
A method for automatically generating rules for a requires-provides security model of a system
by Orvis, William Snow, M.S.  University of California, Davis. 2009: 109 pages; 1470280.
29.
Reasoning software process modeling and simulation: A stakeholder-oriented approach
by Bai, Xu, Ph.D.  Southern Methodist University. 2012: 235 pages; 3548130.
30.
Global Operation of Integrated Decentralized Power Systems
by Khanabadi Ghehi, Mojtaba, Ph.D.  Mississippi State University. 2017: 123 pages; 10643425.
1 - 30 of 31266 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest