Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17035 open access dissertations and theses found for:
if(Security)  »   Refine Search
181.
A study of security in cloud computing
by Bhayal, Savita, M.S.  California State University, Long Beach. 2011: 68 pages; 1504430.
182.
Security, Computation and Data Issues in Clouds
by Li, Lifeng, M.S.  Arkansas State University. 2017: 112 pages; 10288061.
183.
Cyber Physical Security Analysis for Synchrophasor Applications
by Liu, Ren, Ph.D.  Washington State University. 2017: 148 pages; 10639030.
184.
Unemployment Compensation: Coverage in the Federal-State System, 1935-1976
by Dempsey Chronister, Christina, M.A.  The George Washington University. 2012: 136 pages; 1510567.
185.
Security measures to reduce violence in hospital settings
by Diaz, George M., M.H.A.  California State University, Long Beach. 2011: 46 pages; 1493012.
186.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
187.
Users' privacy and security behaviors on mobile devices
by Blount, Charles Lenward, M.S.  University of Maryland, Baltimore County. 2014: 106 pages; 1571723.
188.
Information technology-related operational risk: An empirical study
by Goldstein, James Charles, Jr., Ph.D.  Syracuse University. 2009: 164 pages; 3410001.
189.
Secure Mobile Deployment of NFL Training Materials
by Corris, Alexander Grosholz, Ph.D.  Nova Southeastern University. 2014: 93 pages; 3642884.
190.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
191.
194.
An economic analysis of airport baggage routing and airline security
by Sozi, Johny Leonard, M.S.  University of Maryland, Baltimore County. 2011: 140 pages; 1497447.
195.
From FLOWCORE to JITFLOW: Improving the speed of Information Flow in JavaScript
by Hennigan, Eric, Ph.D.  University of California, Irvine. 2015: 193 pages; 3688532.
196.
FHIR: Cell-Level Security and Real Time Access with Accumulo
by Ruiz, Daniel Alfonso, M.S.  University of Colorado at Colorado Springs. 2016: 55 pages; 10108817.
197.
A framework for enforcing information flow policies
by Mital, Bhuvan, M.S.  State University of New York at Stony Brook. 2010: 70 pages; 1477837.
199.
Defeating Insider Attacks via Autonomic Self-Protective Networks
by Sibai, Faisal M., Ph.D.  George Mason University. 2012: 139 pages; 3503962.
200.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
201.
Counter-Radicalization: An Analysis on Violent Extremist Ideologies
by Ayres, Jolene M., D.S.S.  National American University. 2018: 199 pages; 13807573.
203.
204.
Techniques for detecting zero day phishing websites
by Blasi, Michael, M.S.  Iowa State University. 2009: 89 pages; 1465719.
205.
Assessing the Influence of Building Geometry on Active Shooter Event Outcomes
by Dane, Kristopher R., D.Engr.  The George Washington University. 2018: 115 pages; 10841977.
206.
Human Trafficking: Flying under the Radar
by Hulsey, Amber Lee, Ph.D.  The University of Southern Mississippi. 2018: 239 pages; 10752077.
207.
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
by Lombardo, Gary, Ph.D.  Capella University. 2018: 121 pages; 10751570.
208.
Internet Protocol version Six (IPv6) at UC Davis: Traffic Analysis with a Security Perspective
by Ard, Julia Boxwell, M.S.  University of California, Davis. 2012: 115 pages; 1519649.
209.
Credibility in Crises: The Role of Leadership Beliefs in State Threat Assessments
by Macdonald, Julia Mary, Ph.D.  The George Washington University. 2016: 417 pages; 10150230.
210.
Do warrants lead the underlying stocks and index futures?
by Kui, Lin Ying, M.Sc.  Singapore Management University (Singapore). 2008: 89 pages; 1483220.
181 - 210 of 17035 displayed.
« First < Previous |   4    5    6    7    8    9    10    11    12    13    14   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest