Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
18361 open access dissertations and theses found for:
if(Hypervisor security)  »   Refine Search
1.
Strengthening System Security on the ARMv7 Processor Architecture with Hypervisor-Based Security Mechanisms
by Vetter, Julian, Ph.D.  Technische Universitaet Berlin (Germany). 2017: 115 pages; 27610268.
2.
Hardware-Assisted Protection and Isolation
by Wang, Jiang, Ph.D.  George Mason University. 2011: 126 pages; 3471624.
3.
Architectures for secure cloud computing servers
by Szefer, Jakub M., Ph.D.  Princeton University. 2013: 355 pages; 3597568.
4.
Mitigating Privilege Escalation
by Brookes, Scott, Ph.D.  Dartmouth College. 2018: 215 pages; 10822683.
6.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
7.
Securing Operating Systems Through Utility Virtual Machines
by Denz, Robert, Ph.D.  Dartmouth College. 2016: 222 pages; 10190644.
9.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
10.
An attack-resistant and rapid recovery desktop system
by Deshane, Todd, Ph.D.  Clarkson University. 2010: 149 pages; 3428987.
12.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
13.
A study on virtualization technology and its impact on computer hardware
by Semnanian, Amir Ali, M.S.  California State University, Long Beach. 2013: 76 pages; 1523065.
14.
Privilege Leakage in Practical Systems
by Grace, Michael C., Ph.D.  North Carolina State University. 2017: 114 pages; 10969800.
15.
Analyzing Historical Data Breaches to Improve Public Cloud Security Postures
by Zhou, Yucheng, D.Engr.  The George Washington University. 2020: 125 pages; 27664530.
22.
Performance comparison between x86 virtualization technologies
by Pham, Duy M., M.S.  California State University, Long Beach. 2014: 73 pages; 1528024.
26.
Identifying Factors Contributing towards Information Security Maturity in an Organization
by Edwards, Madhuri M., Ph.D.  Nova Southeastern University. 2018: 245 pages; 10746212.
27.
Schemes for Surviving Advanced Persistent Threats
by Mehresh, Ruchika, Ph.D.  State University of New York at Buffalo. 2013: 159 pages; 3598713.
28.
An exploratory investigation of organizational security climate in a highly regulated environment
by Bitzer, Edward George, III, Ph.D.  Colorado State University. 2010: 125 pages; 3433677.
29.
Decision-Making by Effective Information Security Managers
by Pettigrew, James Andrew, III, Ph.D.  The George Washington University. 2012: 359 pages; 3502331.
30.
Authenticating executions for trusted systems
by Aktas, Erdem, Ph.D.  State University of New York at Binghamton. 2013: 215 pages; 3596989.
1 - 30 of 18361 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest