Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
19549 open access dissertations and theses found for:
if(Security)  »   Refine Search
271.
Extensible Performance-aware Runtime Integrity Measurement
by Delgado, Brian G., Ph.D.  Portland State University. 2020: 234 pages; 27741720.
272.
Emergency Management Standards for NCAA Division I-A Football Stadia
by Hoogstra, Joshua R., Ph.D.  Walden University. 2012: 210 pages; 3543035.
273.
Apollo: End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
by Wu, Hua, Ph.D.  The George Washington University. 2020: 248 pages; 27666292.
276.
Securing Secrets and Managing Trust in Modern Computing Applications
by Sayler, Andy, Ph.D.  University of Colorado at Boulder. 2016: 212 pages; 10108746.
277.
278.
White House computer adoption and information policy from 1969 – 1979
by Laprise, John Paul, Ph.D.  Northwestern University. 2009: 261 pages; 3386523.
279.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
281.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
282.
National decision making and nuclear fuel cycles: An analysis of influences
by Platte, James Edward, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2013: 299 pages; 3559057.
283.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
285.
Architectures for secure cloud computing servers
by Szefer, Jakub M., Ph.D.  Princeton University. 2013: 355 pages; 3597568.
286.
Core versus peripheral positions: An integrated model
by Jiang, Lixin, Ph.D.  Washington State University. 2013: 170 pages; 3587112.
287.
Schemes for Surviving Advanced Persistent Threats
by Mehresh, Ruchika, Ph.D.  State University of New York at Buffalo. 2013: 159 pages; 3598713.
289.
Reliable and Efficient Routing for Wireless Sensor Networks
by Sinha, Saket, M.S.  California State University, Long Beach. 2017: 55 pages; 10263570.
290.
Software vulnerabilities: Lifespans, metrics, and case study
by Wright, Jason L., M.S.  University of Idaho. 2014: 117 pages; 1556964.
292.
The Case for Engagement: Building a Framework and Policy to Move U.S.-Iranian Relations Forward
by West, Graham F., M.A.  The George Washington University. 2016: 128 pages; 10159048.
293.
Strong-DISM: A First Attempt to a Dynamically Typed Assembly Language (D-TAL)
by Hernandez, Ivory, M.S.C.S.  University of South Florida. 2017: 65 pages; 10640802.
294.
Secure Mobile Deployment of NFL Training Materials
by Corris, Alexander Grosholz, Ph.D.  Nova Southeastern University. 2014: 93 pages; 3642884.
295.
Rethinking diplomatic architecture
by Faughnan, Eric Hewlett, M.Arch.  University of Maryland, College Park. 2011: 210 pages; 1495786.
296.
A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems
by Jeddi, Zahra, Ph.D.  University of Louisiana at Lafayette. 2014: 178 pages; 3687692.
297.
298.
An American Response to International Chinese Predatory Economic Practices in the Geopolitical Contest of the 21st Century
by Rajpurohit, Krishna, M.A.  The William Paterson University of New Jersey. 2018: 157 pages; 10839174.
299.
Cyber terrorrism threats
by Gobran, Ashraf, M.S.  Utica College. 2015: 48 pages; 1588500.
300.
Predicting Political Development After United States Military Assistance: Evidence from Case Study Analysis
by Alaniz, Susan Rae, Ph.D.  The University of Southern Mississippi. 2020: 499 pages; 28030655.
271 - 300 of 19549 displayed.
« First < Previous |   7    8    9    10    11    12    13    14    15    16    17   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest