1. Musab Al-Turki, “Rewriting-based Formal Modeling, Analysis and Implementation of Real-time Distributed Services”, PhD Thesis, August 2011. [full text]
  2. Jonas Eckhardt, “Security Analysis in Cloud Computing Using Rewriting Logic”, MS Thesis, January 2012. [full text]
  3. Tobias Muhlbauer, “Formal Specification and Analysis of Cloud Computing Management”, MS Thesis, January 2012. [full text]
  4. Brian Cho, “Satisfying Strong Application Requirements in Data-Intensive Cloud Computing Environments,” PhD Thesis, October 2012. [full text]
  5. Qiaomin Xie, “Routing and Scheduling for Cloud Service Data Centers”, MS Thesis, December 2012. [full text]
  6. Mirko Montanari, “Limiting Information Exposure in Multi-domain Monitoring Systems”, PhD Thesis, July 2013. [full text]
  7. Parya Moinzadah, “I-AdMiN: A Framework for Deriving Adaptive Service Configuration in Sensor Networks”, PhD Thesis, December 2013. [full text]
  8. Jon Grov, “Transactional Data Management for Multi-Site Systems”, PhD Thesis, January 2014. [full text]
  9. Cristina Abad, “Big Data Storage Workload Characterization, Modeling and Synthetic Generation”, PhD Thesis, March 2014. [full text]
  10. Peter Dinges, “Symcretic Testing of Programs”, PhD Thesis, December 2014. [full text]
  11. Fangzhou Yao, “Secure Framework for Virtualized Systems with Data Confidentiality Protection”, MS Thesis, December 2014. [full text]
  12. Weijie Liu, “Inter-Flow Consistency: Novel SDN Update Abstraction for Supporting Inter-flow Constraints”, MS Thesis, May 2015. [full text]
  13. John Bellessa, “Implementing MPLS with Label Switching in Software-Defined Networks, MS Thesis, May 2015. [full text]
  14. Mayank Pundir, “ZORRO: Zero-cost Reactive Failure Recovery in Distributed Graph Processing”, MS Thesis, May 2105. [full text]
  15. Xiao Cai, “Phurti: Application and Network-Aware Flow Scheduling for MapReduce”, MS Thesis, May 2015. [full text]
  16. Gary L. Wang, “Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring”, MS Thesis, May 2015. [full text]
  17. Gourav Khaneja, “An Experimental Study of Monolithic Scheduler Architecture in Cloud Computing Systems”, MS Thesis, May 2015. [full text]
  18. Phuong Cao, “An Experiment Using Factor Graph for Early Attack Detection”, MS Thesis, May 2015. [full text]
  19. Uttam Thakore, “A Quantitative Methodology for Evaluating and Deploying Security Monitors”, MS Thesis, August 2015. [full text]
  20. Reza Shiftehafar, “A Flexible Fine-grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications”, December 2015. [full text]
  21. Mohammad Ahmad, “Cauldron: A Framework To Defend Against Cache-Based Side-Channel Attacks In Clouds”, MS Thesis, May 2016.
  22. Zachary Estrada, “Dynamic Reliability and Security Monitoring: A Virtual Machine Approach”, PhD Thesis, University of Illinois at Urbana-Champaign, August 2016. [full text]
  23. Carlo Di-Giulio, “Privacy and Security in the Clouds: IT Security and Privacy Standards in the EU and US”, MA Thesis, May 2017. [full text]