Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
19252 open access dissertations and theses found for:
if(Security)  »   Refine Search
361.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
362.
Connectivity Between Two Distant Sites with Automatic Failover to IPsec
by Singh, Mankaran, M.S.  California State University, Long Beach. 2017: 39 pages; 10262849.
363.
Deep Dynamic Analysis of Android Applications
by Gustafson, Eric David, M.S.  University of California, Davis. 2014: 48 pages; 1565669.
364.
Routing in the dark: Pitch black
by Evans, Nathan S., M.S.  University of Denver. 2009: 84 pages; 1465595.
365.
Information value of credit ratings in Asia ex-Japan markets
by Zhou, Chen, M.Sc.  Singapore Management University (Singapore). 2006: 58 pages; 1494109.
366.
Facilitating Frame Injection Exploits through SiK Radio Firmware Modification
by WIss, Victor Gordon, M.S.  Christopher Newport University. 2020: 72 pages; 27956517.
367.
An Examination of User Detection of Business eMail Compromise amongst Corporate Professionals
by Aviv, Shahar Sean, Ph.D.  Nova Southeastern University. 2019: 141 pages; 27667282.
368.
Altering the Deal: Explaining Variation in U.S. Intelligence Reform
by Melancon, Louis P., Ph.D.  The George Washington University. 2019: 225 pages; 10978619.
369.
Securing location privacy in vehicular applications and communications
by Corser, George P., Ph.D.  Oakland University. 2016: 165 pages; 10169186.
370.
An Empirical Study of Privacy Risk Assessment Methodologies in Cloud Computing Environments
by Pauley, Wayne A., Jr., Ph.D.  Nova Southeastern University. 2012: 222 pages; 3499794.
372.
The Onion Name System: Tor-powered distributed DNS for tor hidden services
by Victors, Jesse, M.C.S.  Utah State University. 2015: 72 pages; 1598486.
373.
From FLOWCORE to JITFLOW: Improving the speed of Information Flow in JavaScript
by Hennigan, Eric, Ph.D.  University of California, Irvine. 2015: 193 pages; 3688532.
374.
Cybersecurity testing and intrusion detection for cyber-physical power systems
by Pan, Shengyi, Ph.D.  Mississippi State University. 2014: 161 pages; 3665497.
375.
A multi-channel defense against communication denial -of -service attacks in wireless networks
by Alnifie, Ghada Matooq, Ph.D.  George Mason University. 2008: 165 pages; 3338544.
376.
Privacy on Online Social Networks
by Gao, Yunpeng, D.Engr.  The George Washington University. 2019: 67 pages; 22615441.
379.
Server management system
by Pandey, Rinku Omkarnath, M.S.  California State University, Long Beach. 2015: 44 pages; 1604881.
380.
Conflict between Saudi Arabia and Iran: An Examination of Critical Factors Inhibiting their Positive Roles in the Middle East
by Alghunaim, Ghadah Ghunaim Rashid, Ph.D.  Nova Southeastern University. 2014: 157 pages; 3687984.
382.
Attitudes and perspectives about backyard food gardening: A case study in south Florida
by Zahina-Ramos, John G., Ph.D.  Florida Atlantic University. 2013: 126 pages; 3571439.
383.
Laying a Foundation for America's Future: Progressive Deficit Reduction Proposals
by Hudson, Nicholas, M.P.S.  The George Washington University. 2011: 183 pages; 1496541.
385.
The Biodiversity and Direct Ecosystem Services and Disservices of Urban Gardens
by Clarke, Lorraine Weller, Ph.D.  University of California, Riverside. 2014: 163 pages; 3630666.
386.
387.
End-to-end Encryption, Backdoors, and Privacy
by Endeley, Robert E., T.D.  Capitol Technology University. 2019: 142 pages; 22624057.
389.
Armed for Arms Control? Presidents, Bureaucrats and the Role of Government Structure in Policymaking
by Dalton, Toby F., Ph.D.  The George Washington University. 2015: 502 pages; 3643434.
390.
Community gardening and nutritional health program for low-income youth affected by food scarcity: A grant proposal
by Dosen, Melanie K., M.S.W.  California State University, Long Beach. 2014: 65 pages; 1527918.
361 - 390 of 19252 displayed.
« First < Previous |   10    11    12    13    14    15    16    17    18    19    20   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest