Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
2681 open access dissertations and theses found for:
if(Vulnerabilities)  »   Refine Search
1.
Software vulnerabilities: Lifespans, metrics, and case study
by Wright, Jason L., M.S.  University of Idaho. 2014: 117 pages; 1556964.
2.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
3.
Quantitative analyses of software vulnerabilities
by Joh, HyunChul, Ph.D.  Colorado State University. 2011: 224 pages; 3489881.
4.
Susceptibility to Social Engineering: Human Vulnerabilities
by Schroeder, Chelsea, M.S.  Utica College. 2019: 41 pages; 27670795.
5.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
6.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
8.
Zero-Day Defense: Discovering and Removing Vulnerabilities throughProgram Customization and Fuzzing
by Chen, Yurong, D.Engr.  The George Washington University. 2020: 102 pages; 27740940.
9.
Coming Out: When Micro Level Vulnerabilities lead to Macro Level Risk
by Meneray, Jennifer, M.A.  The George Washington University. 2018: 93 pages; 10822934.
10.
Targeting Therapeutically Relevant Vulnerabilities Induced by Pancreatic Ductal Adenocarcinoma Genetics and Microenvironment
by Schultz, Christopher William, Ph.D.  Thomas Jefferson University. 2019: 184 pages; 27664947.
12.
Interconnectedness, Vulnerabilities, and Crisis Spillovers: Implications for the New Financial Stability Framework
by Tintchev, Kalin Iliev, Ph.D.  The George Washington University. 2014: 183 pages; 3610421.
16.
Automatic verification of string manipulating programs
by Yu, Fang, Ph.D.  University of California, Santa Barbara. 2010: 239 pages; 3422651.
17.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
18.
19.
Automatic Program State Exploration Techniques for Security Analysis of Android Apps
by Johnson, Ryan, Ph.D.  George Mason University. 2019: 211 pages; 27667472.
20.
Cyber Physical System Modeling of Smart Charging Process
by Langschwager, Matthew T., M.S.  University of Louisiana at Lafayette. 2018: 98 pages; 13420593.
21.
Building a Base for Cyber-autonomy
by Shoshitaishvili, Yan, Ph.D.  University of California, Santa Barbara. 2017: 178 pages; 10620012.
23.
Cyber Agility for Attack Deterrence and Deception
by Jafarian, Jafar Haadi, Ph.D.  The University of North Carolina at Charlotte. 2017: 200 pages; 10686943.
24.
A Multivariate Bayesian Approach to Modeling Vulnerability Discovery in the Software Security Lifecycle
by Johnston, Reuben Aaron, Ph.D.  The George Washington University. 2018: 205 pages; 10828524.
26.
Detection and Prevention of Misuse of Software Components
by Ting, Dai, Ph.D.  National University of Singapore (Singapore). 2015: 141 pages; 10005992.
27.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
29.
Validating Petri Net Models of Cyberattacks
by Christensen, Nicholas M., M.S.  The University of Alabama in Huntsville. 2017: 102 pages; 10608103.
30.
Cybersecurity of unmanned aircraft systems (UAS)
by Gomez, Cesar A., M.S.  Utica College. 2015: 70 pages; 1605296.
1 - 30 of 2681 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest