Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
2413 open access dissertations and theses found for:
if(Vulnerabilities)  »   Refine Search
121.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
122.
123.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
124.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
125.
How U.S. political and socio-economic trends promotes hacktivist activity
by Aviles, Grisselle, M.S.  Utica College. 2015: 85 pages; 1590361.
126.
Information security: A study of decision-making factors
by Griffith, Ronald E., II, Ph.D.  Capella University. 2009: 104 pages; 3342228.
128.
Creating a culture of safety using electronic medical records as a tool
by Alayed, Rana Ali, M.S.  California State University, Long Beach. 2010: 61 pages; 1486373.
129.
An implementation of a multi-touch draw-a-secret password schema for windows-based computers
by Lichtenberger, Matthew, M.Eng.  University of Louisville. 2011: 89 pages; 1504201.
130.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
131.
Enabling User Space Secure Hardware
by Coughlin, Aimee, Ph.D.  University of Colorado at Boulder. 2018: 137 pages; 10791863.
132.
Emergent Network Defense
by Crane, Earl Newell, Ph.D.  The George Washington University. 2013: 167 pages; 3548491.
133.
A Policy Analysis: Senate Bill 794 Child Welfare Services
by Rosales, Jacqueline, M.S.W.  California State University, Long Beach. 2019: 68 pages; 13811829.
134.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
135.
Business continuity planning: Identifying gaps, patterns and justifications
by Bethany, Michael P., M.S.  California State University, Long Beach. 2014: 169 pages; 1526894.
138.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
139.
Disaster relief: A system for recovery
by LaRusso, Adam, M.Arch.  University of Maryland, College Park. 2011: 150 pages; 1506540.
140.
Autonomous vehicle two-factor authentication: Safety in keyless vehicle systems
by Tse, Gilbert, M.S.  California State University, Long Beach. 2016: 43 pages; 10105281.
141.
U.S. and NATO Cyber Defense: Bridging the Resource Gap with a Centralized Market Structure
by Lipke, Alexa, M.A.  The George Washington University. 2016: 71 pages; 10189713.
142.
The impact of heir property on post-Katrina housing recovery in New Orleans
by Kluckow, Richard, M.A.  Colorado State University. 2014: 98 pages; 1573070.
143.
The influence of gardens on resilience in older adults living in a continuing care community
by Bailey, Christie N., Ph.D.  Florida Atlantic University. 2015: 223 pages; 10154932.
144.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
145.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
146.
Emergency Management Standards for NCAA Division I-A Football Stadia
by Hoogstra, Joshua R., Ph.D.  Walden University. 2012: 210 pages; 3543035.
147.
The Role of International Organizations in Financial Market Reform
by Silvia, Joseph Edward, LL.M.  The George Washington University. 2010: 84 pages; 1483982.
148.
Self-Reported Emotional State as a Measure of Interpersonal Vulnerability
by Pulido, Manuel D., M.A.  California State University, Long Beach. 2017: 98 pages; 10601962.
149.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
150.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
121 - 150 of 2413 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest