Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
22100 open access dissertations and theses found for:
if(Usable security)  »   Refine Search
361.
Use of image-based mnemonic techniques to enhance the memorability of user-generated passwords
by Nelson, Deborah L., M.S.  California State University, Long Beach. 2009: 108 pages; 1466145.
363.
Towards Practical Dynamic Spectrum Sharing
by Yang, Lei, Ph.D.  University of California, Santa Barbara. 2011: 263 pages; 3456231.
364.
Application Layer Authentication Using a Time-Based Password Effect upon the Smart Home Automation Controller
by Bringardner, Alan Scott, D.Sc.  Capitol Technology University. 2017: 227 pages; 27739945.
365.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
366.
Novel Compact Narrow-Linewidth Mid-infrared Lasers for Sensing Applications
by Behzadi, Behsan, Ph.D.  The University of New Mexico. 2018: 202 pages; 10830890.
367.
Routing in the dark: Pitch black
by Evans, Nathan S., M.S.  University of Denver. 2009: 84 pages; 1465595.
369.
Assessing the impact of complexity attributes on system development project outcomes
by Sheard, Sarah A., Ph.D.  Stevens Institute of Technology. 2012: 341 pages; 3518280.
371.
An Empirical Study of Privacy Risk Assessment Methodologies in Cloud Computing Environments
by Pauley, Wayne A., Jr., Ph.D.  Nova Southeastern University. 2012: 222 pages; 3499794.
372.
Critical Infrastructure: Legislative Factors for Preventing a "Cyber-Pearl Harbor"
by Palmer, Robert Kenneth, LL.M.  The George Washington University. 2013: 75 pages; 1545831.
373.
Reliable and Efficient Routing for Wireless Sensor Networks
by Sinha, Saket, M.S.  California State University, Long Beach. 2017: 55 pages; 10263570.
376.
A model of forensic analysis using goal-oriented logging
by Peisert, Sean Philip, Ph.D.  University of California, San Diego. 2007: 182 pages; 3246091.
377.
Attack Space Reduction through Software Hardening and Specialization Using Compiler and Binary Analysis
by Quach, Anh, Ph.D.  State University of New York at Binghamton. 2020: 151 pages; 27958904.
378.
Factors influencing the quality of EHR performance: An exploratory qualitative study
by Rhodes, Harry B., Ph.D.  Capella University. 2016: 235 pages; 10252643.
379.
Exploring Web Simplification for People with Cognitive Disabilities
by Hoehl, Jeffery Arthur, Ph.D.  University of Colorado at Boulder. 2016: 120 pages; 10108753.
380.
381.
Typical and top-ranked Polish private higher education: Intersectoral and intrasectoral distinctiveness
by Musial, Joanna, Ph.D.  State University of New York at Albany. 2012: 276 pages; 3517109.
383.
Secure Mobile Deployment of NFL Training Materials
by Corris, Alexander Grosholz, Ph.D.  Nova Southeastern University. 2014: 93 pages; 3642884.
384.
Rethinking diplomatic architecture
by Faughnan, Eric Hewlett, M.Arch.  University of Maryland, College Park. 2011: 210 pages; 1495786.
385.
Speaking up or Remaining Silent: Understanding the Influences on Nurses When Patients Are at Risk
by Rainer, Jennifer Boice, Ph.D.  Saint Louis University. 2019: 124 pages; 13806579.
386.
The Case for Engagement: Building a Framework and Policy to Move U.S.-Iranian Relations Forward
by West, Graham F., M.A.  The George Washington University. 2016: 128 pages; 10159048.
388.
Off the clock: Walker Evans and the crisis of American Capital, 1933–1938
by May, Jessica Lee, Ph.D.  University of California, Berkeley. 2010: 250 pages; 3444817.
389.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
361 - 390 of 22100 displayed.
« First < Previous |   10    11    12    13    14    15    16    17    18    19    20   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest