Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
2379 open access dissertations and theses found for:
if(Vulnerabilities)  »   Refine Search
121.
Authenticating executions for trusted systems
by Aktas, Erdem, Ph.D.  State University of New York at Binghamton. 2013: 215 pages; 3596989.
122.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
123.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
125.
Disaster relief: A system for recovery
by LaRusso, Adam, M.Arch.  University of Maryland, College Park. 2011: 150 pages; 1506540.
126.
The impact of heir property on post-Katrina housing recovery in New Orleans
by Kluckow, Richard, M.A.  Colorado State University. 2014: 98 pages; 1573070.
127.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
128.
Creating a culture of safety using electronic medical records as a tool
by Alayed, Rana Ali, M.S.  California State University, Long Beach. 2010: 61 pages; 1486373.
129.
Autonomous vehicle two-factor authentication: Safety in keyless vehicle systems
by Tse, Gilbert, M.S.  California State University, Long Beach. 2016: 43 pages; 10105281.
130.
Business continuity planning: Identifying gaps, patterns and justifications
by Bethany, Michael P., M.S.  California State University, Long Beach. 2014: 169 pages; 1526894.
131.
Emergent Network Defense
by Crane, Earl Newell, Ph.D.  The George Washington University. 2013: 167 pages; 3548491.
133.
U.S. and NATO Cyber Defense: Bridging the Resource Gap with a Centralized Market Structure
by Lipke, Alexa, M.A.  The George Washington University. 2016: 71 pages; 10189713.
134.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
135.
Enabling User Space Secure Hardware
by Coughlin, Aimee, Ph.D.  University of Colorado at Boulder. 2018: 137 pages; 10791863.
136.
An implementation of a multi-touch draw-a-secret password schema for windows-based computers
by Lichtenberger, Matthew, M.Eng.  University of Louisville. 2011: 89 pages; 1504201.
138.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
139.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
140.
Emergency Management Standards for NCAA Division I-A Football Stadia
by Hoogstra, Joshua R., Ph.D.  Walden University. 2012: 210 pages; 3543035.
141.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
142.
The influence of gardens on resilience in older adults living in a continuing care community
by Bailey, Christie N., Ph.D.  Florida Atlantic University. 2015: 223 pages; 10154932.
143.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
144.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
145.
Self-Reported Emotional State as a Measure of Interpersonal Vulnerability
by Pulido, Manuel D., M.A.  California State University, Long Beach. 2017: 98 pages; 10601962.
146.
On the Modular Verification and Design of Firewalls
by Bhattacharya, Hrishikesh, Ph.D.  The University of Texas at Austin. 2012: 118 pages; 3572873.
147.
The Role of International Organizations in Financial Market Reform
by Silvia, Joseph Edward, LL.M.  The George Washington University. 2010: 84 pages; 1483982.
148.
Information processing, psychosocial adjustment, and sensory processing in gifted youth
by Moonilal, Jacqueline, Psy.D.  Azusa Pacific University. 2009: 139 pages; 3388477.
149.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
150.
Architectures for cryptography accelerators
by Cohen, Aaron Ethan, Ph.D.  University of Minnesota. 2007: 199 pages; 3277590.
121 - 150 of 2379 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest