Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
2463 open access dissertations and theses found for:
if(Vulnerabilities)  »   Refine Search
121.
Authenticating executions for trusted systems
by Aktas, Erdem, Ph.D.  State University of New York at Binghamton. 2013: 215 pages; 3596989.
122.
124.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
125.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
126.
How U.S. political and socio-economic trends promotes hacktivist activity
by Aviles, Grisselle, M.S.  Utica College. 2015: 85 pages; 1590361.
127.
Information security: A study of decision-making factors
by Griffith, Ronald E., II, Ph.D.  Capella University. 2009: 104 pages; 3342228.
128.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
131.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
132.
Emergent Network Defense
by Crane, Earl Newell, Ph.D.  The George Washington University. 2013: 167 pages; 3548491.
133.
Business continuity planning: Identifying gaps, patterns and justifications
by Bethany, Michael P., M.S.  California State University, Long Beach. 2014: 169 pages; 1526894.
134.
Enabling User Space Secure Hardware
by Coughlin, Aimee, Ph.D.  University of Colorado at Boulder. 2018: 137 pages; 10791863.
135.
Emergency Management Standards for NCAA Division I-A Football Stadia
by Hoogstra, Joshua R., Ph.D.  Walden University. 2012: 210 pages; 3543035.
136.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
137.
U.S. and NATO Cyber Defense: Bridging the Resource Gap with a Centralized Market Structure
by Lipke, Alexa, M.A.  The George Washington University. 2016: 71 pages; 10189713.
138.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
139.
The influence of gardens on resilience in older adults living in a continuing care community
by Bailey, Christie N., Ph.D.  Florida Atlantic University. 2015: 223 pages; 10154932.
140.
Creating a culture of safety using electronic medical records as a tool
by Alayed, Rana Ali, M.S.  California State University, Long Beach. 2010: 61 pages; 1486373.
142.
An implementation of a multi-touch draw-a-secret password schema for windows-based computers
by Lichtenberger, Matthew, M.Eng.  University of Louisville. 2011: 89 pages; 1504201.
143.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
144.
Self-Reported Emotional State as a Measure of Interpersonal Vulnerability
by Pulido, Manuel D., M.A.  California State University, Long Beach. 2017: 98 pages; 10601962.
145.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
146.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
147.
Software modulated fault tolerance
by Reis, George A., III, Ph.D.  Princeton University. 2008: 104 pages; 3308327.
148.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
149.
The Role of International Organizations in Financial Market Reform
by Silvia, Joseph Edward, LL.M.  The George Washington University. 2010: 84 pages; 1483982.
150.
Securing Operating Systems Through Utility Virtual Machines
by Denz, Robert, Ph.D.  Dartmouth College. 2016: 222 pages; 10190644.
121 - 150 of 2463 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest