Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
19023 open access dissertations and theses found for:
if(Security)  »   Refine Search
271.
Core versus peripheral positions: An integrated model
by Jiang, Lixin, Ph.D.  Washington State University. 2013: 170 pages; 3587112.
273.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
274.
Architectures for secure cloud computing servers
by Szefer, Jakub M., Ph.D.  Princeton University. 2013: 355 pages; 3597568.
275.
Reliable and Efficient Routing for Wireless Sensor Networks
by Sinha, Saket, M.S.  California State University, Long Beach. 2017: 55 pages; 10263570.
277.
Software vulnerabilities: Lifespans, metrics, and case study
by Wright, Jason L., M.S.  University of Idaho. 2014: 117 pages; 1556964.
278.
The Case for Engagement: Building a Framework and Policy to Move U.S.-Iranian Relations Forward
by West, Graham F., M.A.  The George Washington University. 2016: 128 pages; 10159048.
280.
Strong-DISM: A First Attempt to a Dynamically Typed Assembly Language (D-TAL)
by Hernandez, Ivory, M.S.C.S.  University of South Florida. 2017: 65 pages; 10640802.
281.
Secure Mobile Deployment of NFL Training Materials
by Corris, Alexander Grosholz, Ph.D.  Nova Southeastern University. 2014: 93 pages; 3642884.
282.
Rethinking diplomatic architecture
by Faughnan, Eric Hewlett, M.Arch.  University of Maryland, College Park. 2011: 210 pages; 1495786.
283.
A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems
by Jeddi, Zahra, Ph.D.  University of Louisiana at Lafayette. 2014: 178 pages; 3687692.
284.
285.
Cyber terrorrism threats
by Gobran, Ashraf, M.S.  Utica College. 2015: 48 pages; 1588500.
286.
An American Response to International Chinese Predatory Economic Practices in the Geopolitical Contest of the 21st Century
by Rajpurohit, Krishna, M.A.  The William Paterson University of New Jersey. 2018: 157 pages; 10839174.
287.
The laws will fall silent: Ex Parte Quirin, a troubling precedent for military commissions
by Luebbert, Brad P., M.A.  University of Louisville. 2010: 118 pages; 1485151.
288.
289.
Securitization in Africa’s River Basin Organizations: Implications for Transboundary Water Governance
by Stuart, Jack Woodrow, M.A.  The George Washington University. 2019: 109 pages; 22618755.
290.
Core Flight System Cryptography Library
by Lucas, John Patrick, M.S.  West Virginia University. 2017: 115 pages; 10268719.
291.
Key exchange protocol for satellite multicast systems using Elliptic Curve Cryptography primitives
by Osuji, Obioma, M.S.  California State University, Long Beach. 2016: 64 pages; 10007416.
292.
Analyzing the impact of job dissatisfaction among social workers in managed care
by Hooper, Tina L., Ph.D.  Capella University. 2016: 106 pages; 10164284.
294.
Is Pursuing Nuclear Energy in India's Strategic Interest?
by Rajashekaran, Dhruv, M.A.  Webster University. 2014: 93 pages; 1526151.
297.
Correlating factors of the manager's decision to use Virtual Private Networks
by McEady, Erasmus W., Ph.D.  Capella University. 2009: 93 pages; 3366093.
298.
Essays on the causes and consequences of unemployment
by Jarosch, Gregor, Ph.D.  The University of Chicago. 2015: 113 pages; 3711643.
299.
The relationship between cell phone use and identity theft
by Saunders, Lewis O., Ph.D.  Walden University. 2014: 135 pages; 3615824.
300.
Polymorphic attacks and network topology: Application of concepts from natural systems
by Rangan, Prahalad, Ph.D.  State University of New York at Albany. 2010: 102 pages; 3402465.
271 - 300 of 19023 displayed.
« First < Previous |   7    8    9    10    11    12    13    14    15    16    17   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest