Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
601 open access dissertations and theses found for:
if(Spam)  »   Refine Search
61.
Nation State Threat Actions Against Critical Energy Infrastructures
by Garner, Michael Wilson, Jr., M.S.  Utica College. 2017: 43 pages; 10686214.
62.
Aideready: A Mobile App-Based Home Care Agency
by Romana, Joanna M., M.S.  California State University, Long Beach. 2018: 59 pages; 10751625.
63.
The effect of part-task and whole-task training on air traffic controller communication complexity
by Arnsdorff, G. Blake, M.S.  California State University, Long Beach. 2016: 76 pages; 10096076.
64.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
65.
Irrelevant Relations in Rat Serial Pattern Learning
by Kundey, Shannon M. A., Ph.D.  Kent State University. 2008: 186 pages; 10631123.
66.
Expanded Internet Art and the Informational Milieu
by Moss, Cecilia Laurel, Ph.D.  New York University. 2015: 187 pages; 3740855.
67.
Behavioral modeling of botnet populations viewed through internet protocol address space
by Weaver, Rhiannon Lisa, Ph.D.  Carnegie Mellon University. 2012: 204 pages; 3528576.
68.
Robust and efficient feature selection for high-dimensional datasets
by Mo, Dengyao, Ph.D.  University of Cincinnati. 2011: 131 pages; 3458192.
69.
Role of the sodium pump in auditory function of Drosophila melanogaster
by Roy, Madhuparna, Ph.D.  The University of Iowa. 2012: 139 pages; 3516742.
70.
Evaluation and Design of Robust Neural Network Defenses
by Carlini, Nicholas, Ph.D.  University of California, Berkeley. 2018: 138 pages; 10931076.
71.
Techniques for detecting zero day phishing websites
by Blasi, Michael, M.S.  Iowa State University. 2009: 89 pages; 1465719.
72.
Detecting and characterizing malicious websites
by Xu, Li, Ph.D.  The University of Texas at San Antonio. 2014: 93 pages; 3637094.
74.
Rydberg-Mediated Atomic Ensemble Entanglement and Hyperfine Qubit Detection
by Kwon, Minho, Ph.D.  The University of Wisconsin - Madison. 2019: 255 pages; 13862690.
75.
Exploring internet users' vulnerability to online dating fraud: Analysis of routine activities theory factors
by Garrett, Elena Victorovna, M.S.  The University of Texas at Dallas. 2014: 124 pages; 1583633.
76.
Botnet Detection Using Graph Based Feature Clustering
by Akula, Ravi Kiran, M.S.  Mississippi State University. 2018: 69 pages; 10751733.
77.
Health behaviors in the Chamorro community: Beliefs and practices in nutrition and physical activity
by Torres, Linda Therese, M.A.  California State University, Long Beach. 2011: 148 pages; 1493062.
80.
81.
Online privacy sensitivity and gender: A case study of a highly -educated adult population
by Clifford, Brian Patrick, Ph.D.  Capella University. 2008: 123 pages; 3336862.
83.
The Exceptionalist's Approach to Private Sector Cybersecurity: A Marque and Reprisal Model
by Hopkins, Michael Todd, LL.M.  The George Washington University. 2011: 88 pages; 1505935.
84.
Word Choice, Sentence Structure, and Tone in E-mails on Shared Message Understanding
by Wheeler, Kristine R., Ph.D.  University of Phoenix. 2011: 198 pages; 3486629.
85.
Leadership styles and information security in small businesses: An empirical investigation
by Bhattacharya, Debasis, D.B.A.  University of Phoenix. 2008: 252 pages; 3324059.
86.
The use of information: How new technology is changing discussions of privacy
by Corliss, Michael, M.A.L.S.  Georgetown University. 2010: 130 pages; 1475484.
87.
Enhanced Secondary Bus Microarchitecture
by O'Farrell, John William, Ph.D.  Auburn University. 2011: 96 pages; 3480707.
88.
90.
ROVER: A DNS-based method to detect and prevent IP hijacks
by Gersch, Joseph E., Ph.D.  Colorado State University. 2013: 179 pages; 3608195.
61 - 90 of 601 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest