Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
19264 open access dissertations and theses found for:
if(Security)  »   Refine Search
331.
Student perceptions of safety at urban, suburban, and rural community colleges
by Agubokwu, Vincent Okereke, Ed.D.  Morgan State University. 2016: 119 pages; 10240156.
332.
Battling Spam and Sybils on the Social Web
by Wilson, Christo, Ph.D.  University of California, Santa Barbara. 2012: 329 pages; 3545102.
333.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
335.
An Automated System for Rapid and Secure Device Sanitization
by LaBarge, Ralph S., Ph.D.  The George Washington University. 2014: 113 pages; 3620600.
337.
On the Modular Verification and Design of Firewalls
by Bhattacharya, Hrishikesh, Ph.D.  The University of Texas at Austin. 2012: 118 pages; 3572873.
338.
Building disaster resilience: Why community gardens improve community resilience
by Brown, Nancy, M.S.  California State University, Long Beach. 2015: 106 pages; 1573030.
339.
Essays on productivity growth in agriculture
by Baldos, Uris Lantz Caldo, Ph.D.  Purdue University. 2014: 143 pages; 3686829.
340.
Assessing City Preparedness for a Biological Attack
by Moore, Joseph T., Ph.D.  Walden University. 2011: 113 pages; 3457361.
341.
342.
Analysis of advanced encryption standard and ElGamal cryptographic algorithm for wireless sensor network
by Venugopal, Ranganathan, M.S.  California State University, Long Beach. 2015: 62 pages; 1606061.
343.
Methodologies and Tools to Study Malicious Ecosystems
by miramirkhani, najmehalsadat, Ph.D.  State University of New York at Stony Brook. 2020: 147 pages; 27738172.
344.
Types for the Chain of Trust: No (Loader) Write Left Behind
by Shapiro, Rebecca, Ph.D.  Dartmouth College. 2018: 221 pages; 10811531.
345.
Defense Institutional Building - Integrating the Work
by McIlwain, Carol J., Ph.D.  University of Maryland, College Park. 2017: 525 pages; 10269397.
346.
Synthetic collateral debt obligation pricing
by Zhanyong, Liu, M.Sc.  Singapore Management University (Singapore). 2007: 74 pages; 1483222.
347.
Measuring and Analyzing Typosquatting Toward Fighting Abusive Domain Registrations
by Szurdi, Janos, Ph.D.  Carnegie Mellon University. 2020: 148 pages; 27994260.
348.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
349.
Connectivity Between Two Distant Sites with Automatic Failover to IPsec
by Singh, Mankaran, M.S.  California State University, Long Beach. 2017: 39 pages; 10262849.
350.
Deep Dynamic Analysis of Android Applications
by Gustafson, Eric David, M.S.  University of California, Davis. 2014: 48 pages; 1565669.
351.
Routing in the dark: Pitch black
by Evans, Nathan S., M.S.  University of Denver. 2009: 84 pages; 1465595.
352.
Information value of credit ratings in Asia ex-Japan markets
by Zhou, Chen, M.Sc.  Singapore Management University (Singapore). 2006: 58 pages; 1494109.
353.
Facilitating Frame Injection Exploits through SiK Radio Firmware Modification
by WIss, Victor Gordon, M.S.  Christopher Newport University. 2020: 72 pages; 27956517.
354.
An Examination of User Detection of Business eMail Compromise amongst Corporate Professionals
by Aviv, Shahar Sean, Ph.D.  Nova Southeastern University. 2019: 141 pages; 27667282.
355.
Altering the Deal: Explaining Variation in U.S. Intelligence Reform
by Melancon, Louis P., Ph.D.  The George Washington University. 2019: 225 pages; 10978619.
356.
Securing location privacy in vehicular applications and communications
by Corser, George P., Ph.D.  Oakland University. 2016: 165 pages; 10169186.
357.
An Empirical Study of Privacy Risk Assessment Methodologies in Cloud Computing Environments
by Pauley, Wayne A., Jr., Ph.D.  Nova Southeastern University. 2012: 222 pages; 3499794.
359.
The Onion Name System: Tor-powered distributed DNS for tor hidden services
by Victors, Jesse, M.C.S.  Utah State University. 2015: 72 pages; 1598486.
360.
From FLOWCORE to JITFLOW: Improving the speed of Information Flow in JavaScript
by Hennigan, Eric, Ph.D.  University of California, Irvine. 2015: 193 pages; 3688532.
331 - 360 of 19264 displayed.
« First < Previous |   9    10    11    12    13    14    15    16    17    18    19   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest