1. Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings Johnson, Maritza Lupe 2012 Theses Computer scienceComputer securityComputer security--ManagementFacebook (Electronic resource)
2. Embedded System Security: A Software-based Approach Cui, Ang 2015 Theses Embedded computer systemsComputer software--Security measuresEmbedded computer systems--ProgrammingEmbedded computer systems--Design and constructionComputer securityComputer science
3. Empirical Measurement of Defense in Depth Boggs, Nathaniel 2015 Theses Firewalls (Computer security)Virus inhibitorsIntrusion detection systems (Computer security)Computer securityComputer science
4. On Efficiency and Accuracy of Data Flow Tracking Systems Jee, Kangkook 2015 Theses Data flow computingProgram transformation (Computer programming)Soft errors (Computer science)Computer securityComputer science
5. Secure Computation Towards Practical Applications Krell Loy, Fernando 2016 Theses Computer securityData encryption (Computer science)Computer scienceCryptographyInformation technology
6. Computational and Analytical Tools for Resilient and Secure Power Grids Soltan, Saleh 2017 Theses Electrical engineeringComputer scienceElectric power distributionComputer security
7. Using Machine Learning to improve Internet Privacy Zimmeck, Sebastian 2017 Theses Computer securityMachine learningInternet--Law and legislationComputer security--Law and legislationInternet--Security measuresComputer scienceLaw
8. Combining Programs to Enhance Security Software Kang, Yuan Jochen 2018 Theses Computer scienceComputer securityComputer security--Computer programs
9. Security Engineering of Hardware-Software Interfaces Tang, Beng Chiew 2018 Theses Computer scienceComputer securityHardwareComputer software
10. Machine Learning Based User Modeling for Enterprise Security and Privacy Risk Mitigation Dutta, Preetam Kumar 2019 Theses Computer scienceMachine learningComputer securityBusiness enterprises--Security measuresInternet users
11. Repurposing Software Defenses with Specialized Hardware Sinha, Kanad 2019 Theses Computer scienceComputer engineeringComputer security
12. Symbolic Model Learning: New Algorithms and Applications Argyros, Georgios 2019 Theses Computer scienceAlgorithmsSoftwareMathematical modelsComputer security
13. A Secure and Formally Verified Commodity Multiprocessor Hypervisor Li, Shih-Wei 2021 Theses Computer scienceMultiprocessors--ProgrammingComputer securityVirtual computer systemsLinux
14. Bespoke Security for Resource Constrained Cyber-Physical Systems Arroyo, Miguel Angel 2021 Theses Computer scienceComputer securityCooperating objects (Computer systems)Drone aircraftAutonomous vehicles
15. Multi-Functional Interfaces for Accelerators Piccolboni, Luca 2022 Theses Computer scienceComputer engineeringSystems on a chip--Design and constructionComputer security