Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
19642 open access dissertations and theses found for:
if(Security)  »   Refine Search
181.
A method for automatically generating rules for a requires-provides security model of a system
by Orvis, William Snow, M.S.  University of California, Davis. 2009: 109 pages; 1470280.
182.
183.
Internet Protocol version Six (IPv6) at UC Davis: Traffic Analysis with a Security Perspective
by Ard, Julia Boxwell, M.S.  University of California, Davis. 2012: 115 pages; 1519649.
184.
Traffic management between two locations across multiprotocol label switching backbone cloud with enhanced network security
by Rao, Ashish Rao Janardhan, M.S.  California State University, Long Beach. 2015: 86 pages; 1605182.
185.
Analyzing and Securing Embedded Systems
by Spensky, Chad Samuel, Ph.D.  University of California, Santa Barbara. 2020: 168 pages; 28090001.
186.
A human-centered approach to improving the user experience of software updates
by Mathur, Arunesh, M.S.  University of Maryland, College Park. 2016: 111 pages; 10161060.
187.
Factors related to changes in infant attachment security: A test of the differential susceptibility hypothesis
by Stupica, Brandi Shawn, M.S.  University of Maryland, College Park. 2009: 80 pages; 1469467.
188.
All-hazards and active shooter web-based training: Beneficial to the transportation security administration workforce
by Medina, Amira Jean, M.S.  California State University, Long Beach. 2016: 75 pages; 10096064.
189.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
190.
Religion, Peacebuilding, and Human Security in Africa (A Case Study of Jos Plateau State Nigeria)
by Enyiaka, Canice Chinyeaka, Ph.D.  Howard University. 2019: 275 pages; 13886819.
191.
Techniques for detecting zero day phishing websites
by Blasi, Michael, M.S.  Iowa State University. 2009: 89 pages; 1465719.
192.
193.
Impact of Microfinance on Food Security, Informal Credit, and Agricultural Wages: The Case of Bangladesh
by Berg, Claudia N., Ph.D.  The George Washington University. 2014: 165 pages; 3609079.
195.
The Role of Relationship Building in a United States National Security Strategy for the Asia Pacific
by Paz y Mino, Jonathan D., M.A.  The American University of Paris (France). 2013: 66 pages; 10305828.
197.
Distributed Security Paradigm for Resource-constrained Wireless Sensors in the Context of Internet of Things (IoT)
by Iqbal, Muhammad Aamir, Ph.D.  University of Louisiana at Lafayette. 2017: 130 pages; 10254391.
198.
199.
Enforcing role-based access control on a social network
by Anderson, James Carold, M.S.  East Carolina University. 2012: 240 pages; 1518475.
200.
It is risky business: Three essays on ensuring reliability, security and privacy in technology-mediated settings
by Anderson, Catherine L., Ph.D.  University of Maryland, College Park. 2010: 228 pages; 3409866.
201.
203.
National security and transparency: The legal frameworks and factors federal courts use to balance competing democratic values
by Silver, Derigan A., Ph.D.  The University of North Carolina at Chapel Hill. 2009: 323 pages; 3352712.
207.
Striking a Balance The Evolution of Today's Private Military and Security Industry in the United States
by Hagengruber, Dana, M.A.  The George Washington University. 2009: 119 pages; 1531253.
181 - 210 of 19642 displayed.
« First < Previous |   4    5    6    7    8    9    10    11    12    13    14   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest