1. An Anonymous and Distributed Approach to Improving Privacy in Cloud Computing: An Analysis of Privacy-Preserving Tools & Applications Peters, Emmanuel Sean 2017 Theses Electrical engineeringCloud computingComputer security
2. A Secure and Formally Verified Commodity Multiprocessor Hypervisor Li, Shih-Wei 2021 Theses Computer scienceMultiprocessors--ProgrammingComputer securityVirtual computer systemsLinux
3. Bespoke Security for Resource Constrained Cyber-Physical Systems Arroyo, Miguel Angel 2021 Theses Computer scienceComputer securityCooperating objects (Computer systems)Drone aircraftAutonomous vehicles
4. Combining Programs to Enhance Security Software Kang, Yuan Jochen 2018 Theses Computer scienceComputer securityComputer security--Computer programs
5. Computational and Analytical Tools for Resilient and Secure Power Grids Soltan, Saleh 2017 Theses Electrical engineeringComputer scienceElectric power distributionComputer security
6. Data-Driven Quickest Change Detection Kurt, Mehmet Necip 2020 Theses Electrical engineeringStatisticsMachine learningChange-point problemsComputer security
7. Embedded System Security: A Software-based Approach Cui, Ang 2015 Theses Embedded computer systemsComputer software--Security measuresEmbedded computer systems--ProgrammingEmbedded computer systems--Design and constructionComputer securityComputer science
8. Empirical Measurement of Defense in Depth Boggs, Nathaniel 2015 Theses Firewalls (Computer security)Virus inhibitorsIntrusion detection systems (Computer security)Computer securityComputer science
9. Machine Learning Based User Modeling for Enterprise Security and Privacy Risk Mitigation Dutta, Preetam Kumar 2019 Theses Computer scienceMachine learningComputer securityBusiness enterprises--Security measuresInternet users
10. Multi-Functional Interfaces for Accelerators Piccolboni, Luca 2022 Theses Computer scienceComputer engineeringSystems on a chip--Design and constructionComputer security