1. Multi-Functional Interfaces for Accelerators Piccolboni, Luca 2022 Theses Computer scienceComputer engineeringSystems on a chip--Design and constructionComputer security
2. A Secure and Formally Verified Commodity Multiprocessor Hypervisor Li, Shih-Wei 2021 Theses Computer scienceMultiprocessors--ProgrammingComputer securityVirtual computer systemsLinux
3. Bespoke Security for Resource Constrained Cyber-Physical Systems Arroyo, Miguel Angel 2021 Theses Computer scienceComputer securityCooperating objects (Computer systems)Drone aircraftAutonomous vehicles
4. Machine Learning Based User Modeling for Enterprise Security and Privacy Risk Mitigation Dutta, Preetam Kumar 2019 Theses Computer scienceMachine learningComputer securityBusiness enterprises--Security measuresInternet users
5. Repurposing Software Defenses with Specialized Hardware Sinha, Kanad 2019 Theses Computer scienceComputer engineeringComputer security
6. Symbolic Model Learning: New Algorithms and Applications Argyros, Georgios 2019 Theses Computer scienceAlgorithmsSoftwareMathematical modelsComputer security
7. Combining Programs to Enhance Security Software Kang, Yuan Jochen 2018 Theses Computer scienceComputer securityComputer security--Computer programs
8. Security Engineering of Hardware-Software Interfaces Tang, Beng Chiew 2018 Theses Computer scienceComputer securityHardwareComputer software
9. Computational and Analytical Tools for Resilient and Secure Power Grids Soltan, Saleh 2017 Theses Electrical engineeringComputer scienceElectric power distributionComputer security
10. Using Machine Learning to improve Internet Privacy Zimmeck, Sebastian 2017 Theses Computer securityMachine learningInternet--Law and legislationComputer security--Law and legislationInternet--Security measuresComputer scienceLaw
11. Secure Computation Towards Practical Applications Krell Loy, Fernando 2016 Theses Computer securityData encryption (Computer science)Computer scienceCryptographyInformation technology
12. Embedded System Security: A Software-based Approach Cui, Ang 2015 Theses Embedded computer systemsComputer software--Security measuresEmbedded computer systems--ProgrammingEmbedded computer systems--Design and constructionComputer securityComputer science
13. Empirical Measurement of Defense in Depth Boggs, Nathaniel 2015 Theses Firewalls (Computer security)Virus inhibitorsIntrusion detection systems (Computer security)Computer securityComputer science
14. On Efficiency and Accuracy of Data Flow Tracking Systems Jee, Kangkook 2015 Theses Data flow computingProgram transformation (Computer programming)Soft errors (Computer science)Computer securityComputer science
15. Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings Johnson, Maritza Lupe 2012 Theses Computer scienceComputer securityComputer security--ManagementFacebook (Electronic resource)