Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
2417 open access dissertations and theses found for:
if(Vulnerabilities)  »   Refine Search
61.
An Event Management Framework to Aid Solution Providers in Cybersecurity
by Leon, Ryan James, D.Engr.  The George Washington University. 2018: 114 pages; 10745141.
62.
Natural Hazards Perceptions in the United States: Significant Determining Factors and Influences on Where People Live
by Jackson, Sarah, M.S.  Southern Illinois University at Edwardsville. 2016: 144 pages; 10249688.
63.
Architectures for secure cloud computing servers
by Szefer, Jakub M., Ph.D.  Princeton University. 2013: 355 pages; 3597568.
64.
A method for automatically generating rules for a requires-provides security model of a system
by Orvis, William Snow, M.S.  University of California, Davis. 2009: 109 pages; 1470280.
65.
Hardware-Assisted Protection and Isolation
by Wang, Jiang, Ph.D.  George Mason University. 2011: 126 pages; 3471624.
66.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
68.
How Distributed Ledger Technology is Transforming the Financial Marketplace
by Bougas, Michelle, M.S.  Utica College. 2016: 72 pages; 10245691.
69.
Addressing production run failures dynamically
by Tucek, Joseph A., Ph.D.  University of Illinois at Urbana-Champaign. 2011: 163 pages; 3503707.
70.
71.
73.
Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
by Herr, Trey, Ph.D.  The George Washington University. 2016: 317 pages; 10076294.
75.
Core Flight System Cryptography Library
by Lucas, John Patrick, M.S.  West Virginia University. 2017: 115 pages; 10268719.
76.
77.
Factors associated with outpatient mental health services among adolescents
by Maldonado, Yuli Karen, M.S.W.  California State University, Long Beach. 2014: 64 pages; 1527727.
78.
Honeypot with Honeypot Management System for web applications
by Karia, Rutu, M.S.  California State University, Long Beach. 2011: 85 pages; 1504488.
80.
Disaster Management for Socioeconomic Status Challenged Populations in the United States
by Kendig, Marla R., D.H.A.  University of Phoenix. 2012: 379 pages; 3534890.
81.
Labor, Limits, and Liberty: A Study of Day Laborers at a Grassroots Collective in Southern California
by Bowling, Julie Marcele, Ph.D.  University of Nevada, Reno. 2018: 246 pages; 13425070.
82.
Child care teachers' perceptions of their work as women's work
by Kim, Mi Ai, Ph.D.  The University of Texas at Austin. 2010: 222 pages; 3428990.
83.
Privilege Leakage in Practical Systems
by Grace, Michael C., Ph.D.  North Carolina State University. 2017: 114 pages; 10969800.
84.
Coastal climate change adaptation: The influence of perceived risk, uncertainty, trust, and scale
by Kettle, Nathan P., Ph.D.  University of South Carolina. 2012: 193 pages; 3548844.
87.
Integrated hardware/software approaches to software security for embedded systems
by Gelbart, Olga, D.Sc.  The George Washington University. 2008: 137 pages; 3297440.
88.
Developmentally Infonned Community Treatment for Adolescents with Problem Sexual Behavior
by Walker, Janet Lyons, Psy.D.  Antioch University. 2012: 109 pages; 10807698.
90.
Mitigating Privilege Escalation
by Brookes, Scott, Ph.D.  Dartmouth College. 2018: 215 pages; 10822683.
61 - 90 of 2417 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest