Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
19515 open access dissertations and theses found for:
if(Security)  »   Refine Search
421.
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
by LeDoux, Charles, Ph.D.  University of Louisiana at Lafayette. 2016: 179 pages; 10245924.
422.
The legal-military dilemma in the response to international terrorism
by Allan, Matthew Wesley, Ph.D.  Texas A&M University. 2009: 253 pages; 3400678.
423.
The Proletariat in Higher Education: An Introduction of Contingent Faculty as the Precarious Class
by Barrone, Janet Teresa, Ed.D.  Northern Arizona University. 2020: 155 pages; 27743387.
424.
Practical Inference-Time Attacks against Machine-Learning Systems and a Defense against Them
by Sharif, Mahmood, Ph.D.  Carnegie Mellon University. 2019: 137 pages; 27662625.
425.
Exploring Community-Oriented Policing as an Anti-Terrorism Approach Post 9/11: A Case Study
by Castillo, Warner Alberto, D.B.A.  Northcentral University. 2015: 230 pages; 3712165.
426.
428.
Gender, justice and geopolitics of undocumented North Korean migration
by Choi, Eunyoung, Ph.D.  Syracuse University. 2010: 267 pages; 3437568.
429.
Methodologies and Tools to Study Malicious Ecosystems
by miramirkhani, najmehalsadat, Ph.D.  State University of New York at Stony Brook. 2020: 147 pages; 27738172.
430.
Types for the Chain of Trust: No (Loader) Write Left Behind
by Shapiro, Rebecca, Ph.D.  Dartmouth College. 2018: 221 pages; 10811531.
431.
Defense Institutional Building - Integrating the Work
by McIlwain, Carol J., Ph.D.  University of Maryland, College Park. 2017: 525 pages; 10269397.
432.
Synthetic collateral debt obligation pricing
by Zhanyong, Liu, M.Sc.  Singapore Management University (Singapore). 2007: 74 pages; 1483222.
433.
Authoritative and Unbiased Geographic Services
by Adhikari, Naresh, Ph.D.  Mississippi State University. 2020: 184 pages; 27743848.
434.
Protecting financial services while ensuring regulatory compliance
by Harper, Dana C., M.S.  Utica College. 2016: 56 pages; 10252116.
435.
Learning how to sweat: Explaining the dispatch of Japan's self -defense forces in the Gulf War and Iraq War
by Hornung, Jeffrey Wayne, Ph.D.  The George Washington University. 2009: 378 pages; 3366728.
436.
Hard instances with hidden solutions
by Jia, Haixia, Ph.D.  The University of New Mexico. 2007: 73 pages; 3298151.
437.
Practical Backdoor Attacks and Defenses in Deep Learning Systems
by Yao, Yuanshun, Ph.D.  The University of Chicago. 2020: 181 pages; 28002642.
439.
Exploiting Human Factors in User Authentication
by Gupta, Payas, Ph.D.  Singapore Management University (Singapore). 2013: 170 pages; 3601349.
440.
The Victim Identity Model: The Pathology of Apithological Organized Collective Violent Conflict
by Tomlin, Jeremy Kane, D.S.S.  National American University. 2019: 115 pages; 13808723.
441.
Application Layer Authentication Using a Time-Based Password Effect upon the Smart Home Automation Controller
by Bringardner, Alan Scott, D.Sc.  Capitol Technology University. 2017: 227 pages; 27739945.
443.
The Onion Name System: Tor-powered distributed DNS for tor hidden services
by Victors, Jesse, M.C.S.  Utah State University. 2015: 72 pages; 1598486.
444.
From FLOWCORE to JITFLOW: Improving the speed of Information Flow in JavaScript
by Hennigan, Eric, Ph.D.  University of California, Irvine. 2015: 193 pages; 3688532.
445.
Cybersecurity testing and intrusion detection for cyber-physical power systems
by Pan, Shengyi, Ph.D.  Mississippi State University. 2014: 161 pages; 3665497.
446.
A multi-channel defense against communication denial -of -service attacks in wireless networks
by Alnifie, Ghada Matooq, Ph.D.  George Mason University. 2008: 165 pages; 3338544.
448.
Rethinking community preparedness: A relational approach to self-reliance
by Chen, Karen Kyfa, Ph.D.  California Institute of Integral Studies. 2011: 386 pages; 3489667.
449.
Information role of analysts' target prices: Event and intra-day analysis
by Chen, Fan, M.Sc.  Singapore Management University (Singapore). 2009: 77 pages; 1483215.
450.
Cybersecurity IR: A Thematic-analysis of Practitioner Plans, Policies, and Guidelines
by Fox, Michael B., Ph.D.  Trident University International. 2019: 192 pages; 13904714.
421 - 450 of 19515 displayed.
« First < Previous |   12    13    14    15    16    17    18    19    20    21    22   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest