Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17355 open access dissertations and theses found for:
if(Security)  »   Refine Search
361.
A model of forensic analysis using goal-oriented logging
by Peisert, Sean Philip, Ph.D.  University of California, San Diego. 2007: 182 pages; 3246091.
362.
How Distributed Ledger Technology is Transforming the Financial Marketplace
by Bougas, Michelle, M.S.  Utica College. 2016: 72 pages; 10245691.
363.
Critical infrastructure protection
by Shwani, Hazim G., M.S.  Utica College. 2014: 55 pages; 1555605.
364.
Striking first: Efficacy, legitimacy and morality of preemptive and preventive acts of state
by DeFalco, Ralph L., III, D.L.S.  Georgetown University. 2011: 211 pages; 3449995.
365.
Nagorno-Karabakh Conflict: Armenia and Azerbaijan between Conflict Resolution and Human Rights
by Hamamciyan, Liane-Sophie, M.A.  Webster University. 2014: 164 pages; 1525126.
367.
Understanding Preventive Wars Lessons from Pearl Harbor
by Fatton, Lionel Pierre, M.A.  Waseda University (Japan). 2011: 123 pages; 1493260.
368.
Defense Institutional Building - Integrating the Work
by McIlwain, Carol J., Ph.D.  University of Maryland, College Park. 2017: 525 pages; 10269397.
369.
Use of double-loop learning to combat advanced persistent threat: Multiple case studies
by Lamb, Christopher J., Ph.D.  Capella University. 2013: 151 pages; 3607034.
370.
Liberation Ecology of the Border Wall: Biodiversity in the Age of Biopolitics
by Hunt, Robert, Ph.D.  Prescott College. 2017: 141 pages; 10689661.
371.
Northeast Asia and the avoidance of a nuclear arms race
by Fogleman, Samuel, M.S.  Portland State University. 2010: 149 pages; 1478216.
372.
373.
China and Russia: Competition for Central Asian energy
by Serikbayeva, Assel, M.A.  Webster University. 2013: 80 pages; 1523365.
374.
Web browsers as operating systems: Supporting robust and secure web programs
by Reis, Charles, Ph.D.  University of Washington. 2009: 173 pages; 3370601.
375.
AEO and C-TPAT in the light of Art. XX GATT, with emphasis on lit. (b) and lit. (d)
by Carter, Angela Sandra, M.B.A.  Hochschule fuer Angewandte Wissenschaften Hamburg (Germany). 2014: 160 pages; 1527168.
376.
RSA-based key compromised resistant protocol (KCR) for large databases
by Alharbi, Fatemah Mordhi, M.S.  California State University, Los Angeles. 2013: 59 pages; 1553319.
377.
Japan's Contributions to International Peacekeeping in the 21st Century
by Inoue, Mari, M.A.  The George Washington University. 2011: 108 pages; 1496650.
378.
Detection of communication over DNSSEC covert channels
by Hands, Nicole M., M.S.  Purdue University. 2016: 82 pages; 10181541.
379.
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
by LeDoux, Charles, Ph.D.  University of Louisiana at Lafayette. 2016: 179 pages; 10245924.
380.
Liberians living in the U.S.: An examination of post-resettlement food insecurity and associated factors
by Nunnery, Danielle, M.S.  The University of North Carolina at Greensboro. 2012: 71 pages; 1511836.
381.
Using cognitive radio as an intrusion detection for ZigBee networks
by Sarakbi, Lelass, M.S.  California State University, Long Beach. 2012: 84 pages; 1507781.
382.
A policy analysis of phishing countermeasures
by Sheng, Xinguang (Steve), Ph.D.  Carnegie Mellon University. 2009: 181 pages; 3383412.
387.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
388.
Essays on the causes and consequences of unemployment
by Jarosch, Gregor, Ph.D.  The University of Chicago. 2015: 113 pages; 3711643.
389.
All Options on the Table? Nuclear Proliferation, Preventive War, and a Leader's Decision to Intervene
by Whitlark, Rachel Elizabeth, Ph.D.  The George Washington University. 2014: 329 pages; 3631585.
390.
Polymorphic attacks and network topology: Application of concepts from natural systems
by Rangan, Prahalad, Ph.D.  State University of New York at Albany. 2010: 102 pages; 3402465.
361 - 390 of 17355 displayed.
« First < Previous |   10    11    12    13    14    15    16    17    18    19    20   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest