Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
21997 open access dissertations and theses found for:
if(Usable security)  »   Refine Search
151.
Policy Analysis of the Homeland Security Act of 2002
by Huchim, Jennifer, M.S.W.  California State University, Long Beach. 2018: 62 pages; 10751639.
152.
Intelligence Sharing in the European Union
by Socias, Marc, M.A.  The American University of Paris (France). 2010: 84 pages; 10305791.
153.
FHIR: Cell-Level Security and Real Time Access with Accumulo
by Ruiz, Daniel Alfonso, M.S.  University of Colorado at Colorado Springs. 2016: 55 pages; 10108817.
154.
User Interface Design, Database Connectivity, and Security in Fortified Cards
by Pradhan, Sayli H., M.S.  California State University, Long Beach. 2017: 46 pages; 10638557.
155.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
156.
Energy and security aspects of wireless networks: Performance and tradeoffs
by Abuzainab, Nof, Ph.D.  University of Maryland, College Park. 2013: 207 pages; 3599933.
157.
Security and privacy in location-based mobile ad-hoc networks
by El Defrawy, Karim, Ph.D.  University of California, Irvine. 2010: 174 pages; 3422236.
159.
Convergence – A Homeland Security and Educational Problem: A Mixed Methodological Study
by Ippolito, Steven Christopher, Ph.D.  Northcentral University. 2017: 495 pages; 10624690.
160.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
161.
Design Automation for Carbon Nanotube Circuits Considering Performance and Security Optimization
by Liu, Lin, Ph.D.  Michigan Technological University. 2017: 169 pages; 10267186.
162.
Thailand's energy security: Strategic Petroleum Reserve and its economic impacts
by Leesombatpiboon, Poonpat, Ph.D.  The George Washington University. 2010: 257 pages; 3403306.
163.
Duty-Cycle Based Physical Unclonable Functions (PUFs) for Hardware Security Applications
by Azhar, Mahmood Javed, Ph.D.  University of South Florida. 2018: 100 pages; 10980455.
164.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
165.
We know who you are! Connecting education, identity, and national security
by Torres, Eric D., Ph.D.  The University of North Carolina at Greensboro. 2010: 154 pages; 3403776.
166.
Public-key cryptography security-based analysis of the underlying intractable problems
by Al Khulaif, Husain H., M.S.  University of Colorado at Denver. 2013: 143 pages; 1549537.
167.
Divorced women, poverty, and the Social Security Act: A policy analysis
by Schellenberg, Diana Lynne, M.S.W.  California State University, Long Beach. 2010: 56 pages; 1486525.
168.
Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
by Herr, Trey, Ph.D.  The George Washington University. 2016: 317 pages; 10076294.
169.
India as a Model for Environmental Security: The Lynchpin of South Asia
by Jarvis, Teresa Marie, M.S.  Villanova University. 2019: 159 pages; 27735666.
170.
171.
Smoking and violence: An exploratory study within a maximum security forensic institution
by Cryns, Yvonne Lapp, M.S.N.  California State University, Long Beach. 2011: 84 pages; 1493106.
172.
Rethinking information privacy for the web
by Tierney, Matthew Ryan, Ph.D.  New York University. 2013: 161 pages; 3602740.
173.
Counter-Radicalization: An Analysis on Violent Extremist Ideologies
by Ayres, Jolene M., D.S.S.  National American University. 2018: 199 pages; 13807573.
177.
The Process of Foreseeing: A Case Study of National Security Strategy Development
by Morgan, Brian, Ed.D.  The George Washington University. 2016: 213 pages; 3733631.
178.
Technology transfer and U.S. national security policy: The Joint Strike Fighter
by Krueger, Richard D., Ph.D.  George Mason University. 2010: 360 pages; 3421719.
179.
Evaluation of security methods for the prevention of malware on mobile devices
by Giacalone, Anthony S., M.S.  California State University, Long Beach. 2014: 87 pages; 1527936.
180.
A three tier security system with mobile sinks in wireless sensor networks
by Pebbeti, Mounika, M.S.  California State University, Long Beach. 2016: 51 pages; 10007409.
151 - 180 of 21997 displayed.
« First < Previous |   3    4    5    6    7    8    9    10    11    12    13   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest