Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17347 open access dissertations and theses found for:
if(Security)  »   Refine Search
242.
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
by Lombardo, Gary, Ph.D.  Capella University. 2018: 121 pages; 10751570.
243.
Factors related to changes in infant attachment security: A test of the differential susceptibility hypothesis
by Stupica, Brandi Shawn, M.S.  University of Maryland, College Park. 2009: 80 pages; 1469467.
244.
Nation State Threat Actions Against Critical Energy Infrastructures
by Garner, Michael Wilson, Jr., M.S.  Utica College. 2017: 43 pages; 10686214.
245.
Accommodative mandatory access control
by Thomas, Jacques D., Ph.D.  Purdue University. 2011: 236 pages; 3506071.
250.
Strong-DISM: A First Attempt to a Dynamically Typed Assembly Language (D-TAL)
by Hernandez, Ivory, M.S.C.S.  University of South Florida. 2017: 65 pages; 10640802.
251.
252.
Detection and Prevention of Misuse of Software Components
by Ting, Dai, Ph.D.  National University of Singapore (Singapore). 2015: 141 pages; 10005992.
253.
254.
The Social Security retirement decision: Maximizing expected discounted worth
by Thompson, Gregory L., M.S.I.E.  Purdue University. 2011: 85 pages; 1501927.
255.
Smoking and violence: An exploratory study within a maximum security forensic institution
by Cryns, Yvonne Lapp, M.S.N.  California State University, Long Beach. 2011: 84 pages; 1493106.
256.
Formally ensuring the permissibility of obligations in security and privacy policies
by Chowdhury, Omar Haider, Ph.D.  The University of Texas at San Antonio. 2013: 306 pages; 3594559.
257.
Rethinking diplomatic architecture
by Faughnan, Eric Hewlett, M.Arch.  University of Maryland, College Park. 2011: 210 pages; 1495786.
258.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
259.
The Integration of China's Dual-track Social Security System and Its Impact
by Lingxiao, Luo, M.S.  National University of Singapore (Singapore). 2015: 44 pages; 10006057.
262.
Behavior-based admission and access control for network security
by Frias-Martinez, Vanessa, Ph.D.  Columbia University. 2008: 167 pages; 3333480.
263.
China-Philippine Joint Explorations: The Future of Competition and Cooperation in the South China Sea
by Tackett, Trevor M., M.A.  The George Washington University. 2018: 84 pages; 10822348.
264.
Design Automation for Carbon Nanotube Circuits Considering Performance and Security Optimization
by Liu, Lin, Ph.D.  Michigan Technological University. 2017: 169 pages; 10267186.
265.
The Implications of the Internet's Topological Structure for Its Efficiency, Security, and Reliability
by Nur, Abdullah Yasin, Ph.D.  University of Louisiana at Lafayette. 2018: 170 pages; 10980025.
266.
Ensuring security and authentication using zero knowledge protocol in wireless sensor network applications
by Matta Veera Venkata, Sudheer, M.S.  California State University, Long Beach. 2015: 55 pages; 1604873.
267.
China Study: Emerging Challenges in Social Security, Health Care, and Leadership: Volume I
by Huff, Patrick D., Ed.D.  Pepperdine University. 2019: 415 pages; 13807532.
268.
A three tier security system with mobile sinks in wireless sensor networks
by Pebbeti, Mounika, M.S.  California State University, Long Beach. 2016: 51 pages; 10007409.
269.
Technology transfer and U.S. national security policy: The Joint Strike Fighter
by Krueger, Richard D., Ph.D.  George Mason University. 2010: 360 pages; 3421719.
270.
Duty-Cycle Based Physical Unclonable Functions (PUFs) for Hardware Security Applications
by Azhar, Mahmood Javed, Ph.D.  University of South Florida. 2018: 100 pages; 10980455.
241 - 270 of 17347 displayed.
« First < Previous |   6    7    8    9    10    11    12    13    14    15    16   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest