Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
2927 open access dissertations and theses found for:
if(Vulnerabilities)  »   Refine Search
1.
Software vulnerabilities: Lifespans, metrics, and case study
by Wright, Jason L., M.S.  University of Idaho. 2014: 117 pages; 1556964.
2.
Quantitative analyses of software vulnerabilities
by Joh, HyunChul, Ph.D.  Colorado State University. 2011: 224 pages; 3489881.
3.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
4.
Susceptibility to Social Engineering: Human Vulnerabilities
by Schroeder, Chelsea, M.S.  Utica College. 2019: 41 pages; 27670795.
5.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
6.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
7.
Discovery and Remediation of Vulnerabilities in Monolithic IoT Firmware
by Gustafson, Eric D., Ph.D.  University of California, Santa Barbara. 2020: 151 pages; 28025862.
9.
Zero-Day Defense: Discovering and Removing Vulnerabilities throughProgram Customization and Fuzzing
by Chen, Yurong, D.Engr.  The George Washington University. 2020: 102 pages; 27740940.
10.
Coming Out: When Micro Level Vulnerabilities lead to Macro Level Risk
by Meneray, Jennifer, M.A.  The George Washington University. 2018: 93 pages; 10822934.
12.
Interconnectedness, Vulnerabilities, and Crisis Spillovers: Implications for the New Financial Stability Framework
by Tintchev, Kalin Iliev, Ph.D.  The George Washington University. 2014: 183 pages; 3610421.
15.
Targeting Therapeutically Relevant Vulnerabilities Induced by Pancreatic Ductal Adenocarcinoma Genetics and Microenvironment
by Schultz, Christopher William, Ph.D.  Thomas Jefferson University. 2019: 184 pages; 27664947.
17.
Automatic verification of string manipulating programs
by Yu, Fang, Ph.D.  University of California, Santa Barbara. 2010: 239 pages; 3422651.
18.
Prioritization of Open Source Defects Using Predictive Models
by Martinez, Jorge E., D.Engr.  The George Washington University. 2020: 164 pages; 28088873.
19.
Protecting Smart Devices from the Bottom-Up
by Machiry, Aravind K., Ph.D.  University of California, Santa Barbara. 2020: 179 pages; 28092431.
20.
Analyzing and Securing Embedded Systems
by Spensky, Chad Samuel, Ph.D.  University of California, Santa Barbara. 2020: 168 pages; 28090001.
21.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
22.
Automatic Program State Exploration Techniques for Security Analysis of Android Apps
by Johnson, Ryan, Ph.D.  George Mason University. 2019: 211 pages; 27667472.
23.
24.
Cyber Physical System Modeling of Smart Charging Process
by Langschwager, Matthew T., M.S.  University of Louisiana at Lafayette. 2018: 98 pages; 13420593.
25.
Network Models for Capturing Molecular Feature and Predicting Drug Target for Various Cancers
by liu, enze, Ph.D.  Indiana University - Purdue University Indianapolis. 2020: 113 pages; 28257744.
27.
Building a Base for Cyber-autonomy
by Shoshitaishvili, Yan, Ph.D.  University of California, Santa Barbara. 2017: 178 pages; 10620012.
28.
Cyber Agility for Attack Deterrence and Deception
by Jafarian, Jafar Haadi, Ph.D.  The University of North Carolina at Charlotte. 2017: 200 pages; 10686943.
29.
A Multivariate Bayesian Approach to Modeling Vulnerability Discovery in the Software Security Lifecycle
by Johnston, Reuben Aaron, Ph.D.  The George Washington University. 2018: 205 pages; 10828524.
30.
Practical Black-Box Analysis for Network Functions and Services
by Moon, Soo-Jin, Ph.D.  Carnegie Mellon University. 2020: 202 pages; 28148170.
1 - 30 of 2927 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest