1. Adaptive and Effective Fuzzing: a Data-Driven Approach She, Dongdong 2023 Theses Computer scienceComputer security--Computer programsMalware (Computer software)Machine learningGoogle (Firm)Microsoft Corporation
2. Design and Analysis of Decoy Systems for Computer Security Bowen, Brian M. 2011 Theses Computer scienceOperating systems (Computers)--Security measuresMalware (Computer software)Cyber intelligence (Computer security)
3. On Resilience to Computable Tampering Ball Jr, Maynard Marshall 2021 Theses Computer scienceData encryption (Computer science)Malware (Computer software)