Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17736 open access dissertations and theses found for:
if(Security)  »   Refine Search
241.
Human Trafficking: Flying under the Radar
by Hulsey, Amber Lee, Ph.D.  The University of Southern Mississippi. 2018: 239 pages; 10752077.
242.
244.
Internet Protocol version Six (IPv6) at UC Davis: Traffic Analysis with a Security Perspective
by Ard, Julia Boxwell, M.S.  University of California, Davis. 2012: 115 pages; 1519649.
245.
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
by Lombardo, Gary, Ph.D.  Capella University. 2018: 121 pages; 10751570.
246.
Accommodative mandatory access control
by Thomas, Jacques D., Ph.D.  Purdue University. 2011: 236 pages; 3506071.
250.
Policy Analysis of the Homeland Security Act of 2002
by Huchim, Jennifer, M.S.W.  California State University, Long Beach. 2018: 62 pages; 10751639.
252.
Balancing belligerents or feeding the beast: Transforming conflict traps
by Hayden, Nancy K., Ph.D.  University of Maryland, College Park. 2016: 474 pages; 10130005.
253.
A three tier security system with mobile sinks in wireless sensor networks
by Pebbeti, Mounika, M.S.  California State University, Long Beach. 2016: 51 pages; 10007409.
254.
Public-key cryptography security-based analysis of the underlying intractable problems
by Al Khulaif, Husain H., M.S.  University of Colorado at Denver. 2013: 143 pages; 1549537.
255.
Factors related to changes in infant attachment security: A test of the differential susceptibility hypothesis
by Stupica, Brandi Shawn, M.S.  University of Maryland, College Park. 2009: 80 pages; 1469467.
256.
257.
Detection and Prevention of Misuse of Software Components
by Ting, Dai, Ph.D.  National University of Singapore (Singapore). 2015: 141 pages; 10005992.
258.
Rethinking diplomatic architecture
by Faughnan, Eric Hewlett, M.Arch.  University of Maryland, College Park. 2011: 210 pages; 1495786.
259.
Strong-DISM: A First Attempt to a Dynamically Typed Assembly Language (D-TAL)
by Hernandez, Ivory, M.S.C.S.  University of South Florida. 2017: 65 pages; 10640802.
260.
261.
An American Response to International Chinese Predatory Economic Practices in the Geopolitical Contest of the 21st Century
by Rajpurohit, Krishna, M.A.  The William Paterson University of New Jersey. 2018: 157 pages; 10839174.
262.
A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems
by Jeddi, Zahra, Ph.D.  University of Louisiana at Lafayette. 2014: 178 pages; 3687692.
264.
Key exchange protocol for satellite multicast systems using Elliptic Curve Cryptography primitives
by Osuji, Obioma, M.S.  California State University, Long Beach. 2016: 64 pages; 10007416.
265.
Is Pursuing Nuclear Energy in India's Strategic Interest?
by Rajashekaran, Dhruv, M.A.  Webster University. 2014: 93 pages; 1526151.
266.
The laws will fall silent: Ex Parte Quirin, a troubling precedent for military commissions
by Luebbert, Brad P., M.A.  University of Louisville. 2010: 118 pages; 1485151.
268.
China-Philippine Joint Explorations: The Future of Competition and Cooperation in the South China Sea
by Tackett, Trevor M., M.A.  The George Washington University. 2018: 84 pages; 10822348.
269.
Unconventional warfare in U.S. foreign policy: U.S. support of insurgencies in Afghanistan, Nicaragua, and Iraq from 1979-2001
by Linnington, Abigail T., Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2013: 367 pages; 3559052.
270.
Nation State Threat Actions Against Critical Energy Infrastructures
by Garner, Michael Wilson, Jr., M.S.  Utica College. 2017: 43 pages; 10686214.
241 - 270 of 17736 displayed.
« First < Previous |   6    7    8    9    10    11    12    13    14    15    16   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest