Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
26455 open access dissertations and theses found for:
if(Threat detection)  »   Refine Search
2.
The stochastics of diagnostic and threat detection tests
by Gordon, Anna S., Ph.D.  The George Washington University. 2012: 143 pages; 3502847.
5.
Development of Unintended Radiated Emissions (URE) Threat Identification System
by Friedel, Joseph E., D.Engr.  The George Washington University. 2018: 190 pages; 10743603.
6.
Information Security Risk Analysis and Advanced Persistent Threat: A Multiple Case Study
by Zuhdi, Barham, D.B.A.  Northcentral University. 2018: 178 pages; 10837747.
7.
Threat Modeling and Circumvention of Internet Censorship
by Fifield, David, Ph.D.  University of California, Berkeley. 2017: 96 pages; 10688573.
9.
Detection of communication over DNSSEC covert channels
by Hands, Nicole M., M.S.  Purdue University. 2016: 82 pages; 10181541.
10.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
11.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
12.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
13.
Mine detection rats: Effects of repeated extinction on detection rates
by Mahoney, Amanda M., Ph.D.  Western Michigan University. 2012: 67 pages; 3531894.
14.
Detecting and characterizing malicious websites
by Xu, Li, Ph.D.  The University of Texas at San Antonio. 2014: 93 pages; 3637094.
15.
16.
Use of double-loop learning to combat advanced persistent threat: Multiple case studies
by Lamb, Christopher J., Ph.D.  Capella University. 2013: 151 pages; 3607034.
17.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
18.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
20.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
21.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
22.
An Examination of User Detection of Business eMail Compromise amongst Corporate Professionals
by Aviv, Shahar Sean, Ph.D.  Nova Southeastern University. 2019: 141 pages; 27667282.
24.
Calculating malware severity rating using threat tree analysis
by Malhotra, Asheer, M.S.  Mississippi State University. 2015: 338 pages; 1586986.
28.
The test-taking pupil: Effects of depletion, difficulty, and threat on pupil responsivity
by Kuhlman, B. Brian, Ph.D.  The University of Utah. 2014: 53 pages; 3640140.
29.
Real Time Driver Drowsiness Detection
by Jujhavarapu, Srihitha, M.S.  California State University, Long Beach. 2017: 45 pages; 10639631.
30.
1 - 30 of 26455 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest