Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
19030 open access dissertations and theses found for:
if(Security)  »   Refine Search
91.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
92.
Behavior-based admission and access control for network security
by Frias-Martinez, Vanessa, Ph.D.  Columbia University. 2008: 167 pages; 3333480.
93.
Stress Reduction Strategies for Improving Private Security Officer Performance
by Al-Mulla, Khalil I., D.B.A.  Walden University. 2018: 160 pages; 13427945.
94.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
95.
The Social Security retirement decision: Maximizing expected discounted worth
by Thompson, Gregory L., M.S.I.E.  Purdue University. 2011: 85 pages; 1501927.
96.
Parental payment abuse within the Supplemental Security Income program
by Taylor-King, Darlean, Ph.D.  Walden University. 2008: 154 pages; 3342465.
98.
Policy Analysis of the Homeland Security Act of 2002
by Huchim, Jennifer, M.S.W.  California State University, Long Beach. 2018: 62 pages; 10751639.
99.
Myanmar's Rohingya Refugees The Search for Human Security
by Crossman, Linda, M.A.  Georgetown University. 2014: 127 pages; 1568320.
100.
Energy Security and Japan-China Relations: Competition or Cooperation?
by Minoura, Haruna, M.A.  The George Washington University. 2011: 222 pages; 1496651.
101.
The role of African leafy vegetables in food security
by Croft, Marcia M., Ph.D.  Purdue University. 2016: 254 pages; 10245801.
102.
FHIR: Cell-Level Security and Real Time Access with Accumulo
by Ruiz, Daniel Alfonso, M.S.  University of Colorado at Colorado Springs. 2016: 55 pages; 10108817.
103.
User Interface Design, Database Connectivity, and Security in Fortified Cards
by Pradhan, Sayli H., M.S.  California State University, Long Beach. 2017: 46 pages; 10638557.
104.
Examining the relationship between organization systems and information security awareness
by Tintamusik, Yanarong, D.B.A.  Northcentral University. 2010: 183 pages; 3411167.
105.
An economic analysis of airport baggage routing and airline security
by Sozi, Johny Leonard, M.S.  University of Maryland, Baltimore County. 2011: 140 pages; 1497447.
107.
Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
by Herr, Trey, Ph.D.  The George Washington University. 2016: 317 pages; 10076294.
108.
Security and privacy in location-based mobile ad-hoc networks
by El Defrawy, Karim, Ph.D.  University of California, Irvine. 2010: 174 pages; 3422236.
109.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
110.
Energy and security aspects of wireless networks: Performance and tradeoffs
by Abuzainab, Nof, Ph.D.  University of Maryland, College Park. 2013: 207 pages; 3599933.
111.
Design Automation for Carbon Nanotube Circuits Considering Performance and Security Optimization
by Liu, Lin, Ph.D.  Michigan Technological University. 2017: 169 pages; 10267186.
112.
Convergence – A Homeland Security and Educational Problem: A Mixed Methodological Study
by Ippolito, Steven Christopher, Ph.D.  Northcentral University. 2017: 495 pages; 10624690.
113.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
114.
Formally ensuring the permissibility of obligations in security and privacy policies
by Chowdhury, Omar Haider, Ph.D.  The University of Texas at San Antonio. 2013: 306 pages; 3594559.
115.
Public-key cryptography security-based analysis of the underlying intractable problems
by Al Khulaif, Husain H., M.S.  University of Colorado at Denver. 2013: 143 pages; 1549537.
116.
Divorced women, poverty, and the Social Security Act: A policy analysis
by Schellenberg, Diana Lynne, M.S.W.  California State University, Long Beach. 2010: 56 pages; 1486525.
117.
Automatic Program State Exploration Techniques for Security Analysis of Android Apps
by Johnson, Ryan, Ph.D.  George Mason University. 2019: 211 pages; 27667472.
118.
Thailand's energy security: Strategic Petroleum Reserve and its economic impacts
by Leesombatpiboon, Poonpat, Ph.D.  The George Washington University. 2010: 257 pages; 3403306.
119.
Duty-Cycle Based Physical Unclonable Functions (PUFs) for Hardware Security Applications
by Azhar, Mahmood Javed, Ph.D.  University of South Florida. 2018: 100 pages; 10980455.
120.
We know who you are! Connecting education, identity, and national security
by Torres, Eric D., Ph.D.  The University of North Carolina at Greensboro. 2010: 154 pages; 3403776.
91 - 120 of 19030 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest