COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
3002 open access dissertations and theses found for:
if(Vulnerabilities)  »   Refine Search
61.
Building disaster resilience: Why community gardens improve community resilience
by Brown, Nancy, M.S.  California State University, Long Beach. 2015: 106 pages; 1573030.
63.
64.
Internet of Things Device Cybersecurity and National Security
by England, Suzanne K., M.S.  Utica College. 2020: 62 pages; 28094260.
65.
Privacy and Security Management Practices of Emerging Technologies: Internet of Things
by Bartlett, Trisha, D.Sc.  Robert Morris University. 2020: 109 pages; 28000028.
66.
The Security and Performance Impact of Object File Shuffling
by Buch, Jonathan, M.S.  University of Idaho. 2020: 68 pages; 27833446.
67.
Forensic Accountants' Strategies and Cybercrime Mitigation
by Okechukwu, Joseph Chukwudi, D.B.A.  Northcentral University. 2020: 201 pages; 27830687.
69.
More than just good deeds: Fraud within religious organizations
by Peters, Carrol Susan, M.S.  Utica College. 2015: 62 pages; 1599154.
71.
Hardware-Assisted Protection and Isolation
by Wang, Jiang, Ph.D.  George Mason University. 2011: 126 pages; 3471624.
72.
Graph theoretic approaches to understand resilience of complex systems
by Chopra, Shauhrat S., Ph.D.  University of Pittsburgh. 2015: 204 pages; 3735255.
73.
Attack Space Reduction through Software Hardening and Specialization Using Compiler and Binary Analysis
by Quach, Anh, Ph.D.  State University of New York at Binghamton. 2020: 151 pages; 27958904.
74.
Continuity and Change: Structural Realism and International Stability in the Information Age
by Mitsutomi, Yuichiro, M.A.  The George Washington University. 2011: 105 pages; 1502439.
75.
Therapist Countertransference and Countertransference Management of Client Sexual Issues: A Qualitative Study
by Kirkendoll, Peiper Hastings, Ph.D.  The George Washington University. 2019: 198 pages; 13806298.
77.
Ambulatory Care Organizations: Improving Diagnosis
by McDonald, Kathryn Mack, Ph.D.  University of California, Berkeley. 2017: 111 pages; 10278324.
78.
ROVER: A DNS-based method to detect and prevent IP hijacks
by Gersch, Joseph E., Ph.D.  Colorado State University. 2013: 179 pages; 3608195.
79.
Stochastic Drought Risk Analysis and Projection Methods For Thermoelectric Power Systems
by Bekera, Behailu Belamo, Ph.D.  The George Washington University. 2016: 166 pages; 3725243.
81.
Labor, Limits, and Liberty: A Study of Day Laborers at a Grassroots Collective in Southern California
by Bowling, Julie Marcele, Ph.D.  University of Nevada, Reno. 2018: 246 pages; 13425070.
82.
Child care teachers' perceptions of their work as women's work
by Kim, Mi Ai, Ph.D.  The University of Texas at Austin. 2010: 222 pages; 3428990.
83.
The role of dignity in rural natural resource governance
by Johnson, Tora, Ph.D.  The University of Maine. 2015: 236 pages; 3664634.
84.
Defensive Model for Protecting Sensitive Information
by Johnson, Dana R., D.I.T.  Capella University. 2020: 135 pages; 28263420.
85.
Exploring Crisis Management in U.S. Small Businesses
by Williams, Jon, D.B.A.  Northcentral University. 2016: 117 pages; 10109613.
86.
Facilitating Frame Injection Exploits through SiK Radio Firmware Modification
by WIss, Victor Gordon, M.S.  Christopher Newport University. 2020: 72 pages; 27956517.
87.
Cyber terrorrism threats
by Gobran, Ashraf, M.S.  Utica College. 2015: 48 pages; 1588500.
88.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
89.
Cybersecurity testing and intrusion detection for cyber-physical power systems
by Pan, Shengyi, Ph.D.  Mississippi State University. 2014: 161 pages; 3665497.
90.
An Exploration of Countermeasures to Defend Against Weaponized AI Malware Exploiting Facial Recognition
by Jalaluddin, Arooj Zafar, D.Sc.  Capitol Technology University. 2020: 197 pages; 28094887.
61 - 90 of 3002 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest