Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17943 open access dissertations and theses found for:
if(Security)  »   Refine Search
151.
Duty-Cycle Based Physical Unclonable Functions (PUFs) for Hardware Security Applications
by Azhar, Mahmood Javed, Ph.D.  University of South Florida. 2018: 100 pages; 10980455.
152.
Environmental Impacts on Guam's Water Security and Sustainable Management of the Resource
by Khalaj-Teimoury, Masoud, Ph.D.  University of Alaska Fairbanks. 2018: 76 pages; 10787879.
155.
Security and privacy in location-based mobile ad-hoc networks
by El Defrawy, Karim, Ph.D.  University of California, Irvine. 2010: 174 pages; 3422236.
156.
An economic analysis of airport baggage routing and airline security
by Sozi, Johny Leonard, M.S.  University of Maryland, Baltimore County. 2011: 140 pages; 1497447.
157.
School Security: A Study of Existing Measures and Plausible Solutions to Better Secure Students
by Julius, Jonathon D., Ph.D.  Indiana State University. 2019: 121 pages; 13812795.
159.
The role of African leafy vegetables in food security
by Croft, Marcia M., Ph.D.  Purdue University. 2016: 254 pages; 10245801.
160.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
162.
Distributed Security Paradigm for Resource-constrained Wireless Sensors in the Context of Internet of Things (IoT)
by Iqbal, Muhammad Aamir, Ph.D.  University of Louisiana at Lafayette. 2017: 130 pages; 10254391.
163.
Enforcing role-based access control on a social network
by Anderson, James Carold, M.S.  East Carolina University. 2012: 240 pages; 1518475.
165.
Striking a Balance The Evolution of Today's Private Military and Security Industry in the United States
by Hagengruber, Dana, M.A.  The George Washington University. 2009: 119 pages; 1531253.
167.
Religion, Peacebuilding, and Human Security in Africa (A Case Study of Jos Plateau State Nigeria)
by Enyiaka, Canice Chinyeaka, Ph.D.  Howard University. 2019: 275 pages; 13886819.
168.
A method for automatically generating rules for a requires-provides security model of a system
by Orvis, William Snow, M.S.  University of California, Davis. 2009: 109 pages; 1470280.
169.
It is risky business: Three essays on ensuring reliability, security and privacy in technology-mediated settings
by Anderson, Catherine L., Ph.D.  University of Maryland, College Park. 2010: 228 pages; 3409866.
170.
173.
Impact of Microfinance on Food Security, Informal Credit, and Agricultural Wages: The Case of Bangladesh
by Berg, Claudia N., Ph.D.  The George Washington University. 2014: 165 pages; 3609079.
174.
National security and transparency: The legal frameworks and factors federal courts use to balance competing democratic values
by Silver, Derigan A., Ph.D.  The University of North Carolina at Chapel Hill. 2009: 323 pages; 3352712.
176.
Traffic management between two locations across multiprotocol label switching backbone cloud with enhanced network security
by Rao, Ashish Rao Janardhan, M.S.  California State University, Long Beach. 2015: 86 pages; 1605182.
177.
178.
All-hazards and active shooter web-based training: Beneficial to the transportation security administration workforce
by Medina, Amira Jean, M.S.  California State University, Long Beach. 2016: 75 pages; 10096064.
180.
151 - 180 of 17943 displayed.
« First < Previous |   3    4    5    6    7    8    9    10    11    12    13   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest