Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
772 open access dissertations and theses found for:
if(Spoofing attackers)  »   Refine Search
1.
Localization of spoofing attackers by using spatial correlation of received signal strength
by Madithati, Roopesh Kumar Reddy, M.S.  California State University, Long Beach. 2016: 40 pages; 10004165.
2.
Cybersecurity of unmanned aircraft systems (UAS)
by Gomez, Cesar A., M.S.  Utica College. 2015: 70 pages; 1605296.
3.
4.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
5.
Relationship between User Privacy and Application Permissions in Smartphone Platforms
by Caushaj, Eralda, Ph.D.  Oakland University. 2017: 159 pages; 10639215.
6.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
7.
Securing multi-channel wireless networks against malicious behavior
by Zheng, Chaodong, Ph.D.  National University of Singapore (Singapore). 2015: 136 pages; 10006123.
9.
Iranian Cyber Espionage
by Spataro, Jason G., M.S.  Utica College. 2019: 72 pages; 13877649.
10.
Cyber Agility for Attack Deterrence and Deception
by Jafarian, Jafar Haadi, Ph.D.  The University of North Carolina at Charlotte. 2017: 200 pages; 10686943.
11.
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
by LeDoux, Charles, Ph.D.  University of Louisiana at Lafayette. 2016: 179 pages; 10245924.
12.
Secure Distributed Inference
by Chen, Yuan, Ph.D.  Carnegie Mellon University. 2019: 169 pages; 13883829.
13.
Comparison of ad-hoc on demand distance vector and enhanced-ad-hoc on demand distance vector on vehicular ad-hoc networks
by Chandwasker, Tanmay, M.S.  California State University, Long Beach. 2016: 51 pages; 10011277.
14.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
15.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
16.
Behavior modeling and forensics for multimedia social networks
by Lin, Wan-Yi, Ph.D.  University of Maryland, College Park. 2009: 253 pages; 3372974.
17.
Routing in the dark: Pitch black
by Evans, Nathan S., M.S.  University of Denver. 2009: 84 pages; 1465595.
18.
Location detection using RFID
by Parmar, Aniketh M., M.S.  California State University, Long Beach. 2009: 44 pages; 1472242.
19.
Honeypot with Honeypot Management System for web applications
by Karia, Rutu, M.S.  California State University, Long Beach. 2011: 85 pages; 1504488.
20.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
22.
Cyber terrorrism threats
by Gobran, Ashraf, M.S.  Utica College. 2015: 48 pages; 1588500.
23.
Securing location privacy in vehicular applications and communications
by Corser, George P., Ph.D.  Oakland University. 2016: 165 pages; 10169186.
24.
Validating Petri Net Models of Cyberattacks
by Christensen, Nicholas M., M.S.  The University of Alabama in Huntsville. 2017: 102 pages; 10608103.
25.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
26.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
27.
Battling Spam and Sybils on the Social Web
by Wilson, Christo, Ph.D.  University of California, Santa Barbara. 2012: 329 pages; 3545102.
29.
Detecting and characterizing malicious websites
by Xu, Li, Ph.D.  The University of Texas at San Antonio. 2014: 93 pages; 3637094.
1 - 30 of 772 displayed.
  1    2    3    4    5    6    7    8    9    10   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest