Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
2363 open access dissertations and theses found for:
if(Vulnerabilities)  »   Refine Search
271.
Malware Vectors: A Technique for Discovering Defense Logics
by Stocco, Gabriel Fortunato, Ph.D.  Dartmouth College. 2014: 121 pages; 3685144.
272.
Classification of Health Information Technology-Related Contributing Factors to Patient Safety Events
by Castro, Gerard Michael, Ph.D.  University of Illinois at Chicago. 2014: 113 pages; 3668931.
274.
Thwarting malicious and selfish behavior in commodity Wi -Fi networks
by Ma, Liran, D.Sc.  The George Washington University. 2008: 123 pages; 3320933.
275.
From Architect to Sculptor
by Eilering, Brad, M.F.A.  Southern Illinois University at Edwardsville. 2018: 39 pages; 10793975.
277.
Predicting Future Risk of Liability in Police Officer Candidates Using M-PULSE Inventory™
by Foreman, Mark E., Psy.D.  Alliant International University. 2014: 109 pages; 3612238.
278.
Effects of Power Output Utilizing Post-Activation Potentiation versus Static Stretching on the Vertical Jump
by Carpenter, Timothy A., M.S.  The William Paterson University of New Jersey. 2014: 44 pages; 1583025.
279.
The impact of data breaches on market value of firms in the E-Commerce marketplace
by Washington, Kevin D., D.B.A.  Capella University. 2016: 84 pages; 10102712.
280.
Spiritual well-being and acculturative stress among older Chinese immigrants in the United States
by Liu, Ying-Han, M.S.  California State University, Long Beach. 2012: 114 pages; 1517719.
282.
Digital currency wallet for mobile devices
by Jose, Mamitha, M.S.  California State University, Long Beach. 2011: 102 pages; 1504486.
283.
Crossroads in a Crisis: The Syrian Refugee Response in Lebanon
by Ngo, Catherine, M.A.  The American University of Paris (France). 2014: 71 pages; 13871608.
286.
The Conceptualization of Schizophrenia by Siblings of Individuals with Schizophrenia
by Chin, Sammantha, Psy.D.  Roosevelt University. 2018: 112 pages; 10750967.
289.
Byzantine survivable routing for mobile ad hoc networks
by Holmer, David, Ph.D.  The Johns Hopkins University. 2007: 101 pages; 3267877.
290.
Educational Technology: Transitioning from Business Continuity to Mission Continuity
by Mekdeci, Kelly Broyles, Ed.D.  Lehigh University. 2011: 116 pages; 3493755.
291.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
292.
The Impact of Media Promulgated Fear on the Psyche: Love Will Prevail
by McClenahan, Abbe, M.A.  Pacifica Graduate Institute. 2017: 64 pages; 10257935.
293.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
294.
295.
296.
297.
Familias Empoderadas: A School-based Psychoeducational Program for Mixed-status Families: A Grant Proposal
by Cruz, Cassandra Anais, M.S.W.  California State University, Long Beach. 2018: 73 pages; 10784981.
298.
299.
Adapting Swarm Applications: A Systematic and Quantitative Approach
by Zhang, Ben, Ph.D.  University of California, Berkeley. 2018: 100 pages; 10931111.
300.
With One Hand in My Pocket: An Exploration of Individuation With Visible Physical Anomaly
by Walker, Michael Lon, M.A.  Pacifica Graduate Institute. 2011: 118 pages; 1504565.
271 - 300 of 2363 displayed.
« First < Previous |   7    8    9    10    11    12    13    14    15    16    17   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest