Theses
- Musab Al-Turki, “Rewriting-based Formal Modeling, Analysis and Implementation of Real-time Distributed Services”, PhD Thesis, August 2011. [full text]
- Jonas Eckhardt, “Security Analysis in Cloud Computing Using Rewriting Logic”, MS Thesis, January 2012. [full text]
- Tobias Muhlbauer, “Formal Specification and Analysis of Cloud Computing Management”, MS Thesis, January 2012. [full text]
- Brian Cho, “Satisfying Strong Application Requirements in Data-Intensive Cloud Computing Environments,” PhD Thesis, October 2012. [full text]
- Qiaomin Xie, “Routing and Scheduling for Cloud Service Data Centers”, MS Thesis, December 2012. [full text]
- Mirko Montanari, “Limiting Information Exposure in Multi-domain Monitoring Systems”, PhD Thesis, July 2013. [full text]
- Parya Moinzadah, “I-AdMiN: A Framework for Deriving Adaptive Service Configuration in Sensor Networks”, PhD Thesis, December 2013. [full text]
- Jon Grov, “Transactional Data Management for Multi-Site Systems”, PhD Thesis, January 2014. [full text]
- Cristina Abad, “Big Data Storage Workload Characterization, Modeling and Synthetic Generation”, PhD Thesis, March 2014. [full text]
- Peter Dinges, “Symcretic Testing of Programs”, PhD Thesis, December 2014. [full text]
- Fangzhou Yao, “Secure Framework for Virtualized Systems with Data Confidentiality Protection”, MS Thesis, December 2014. [full text]
- Weijie Liu, “Inter-Flow Consistency: Novel SDN Update Abstraction for Supporting Inter-flow Constraints”, MS Thesis, May 2015. [full text]
- John Bellessa, “Implementing MPLS with Label Switching in Software-Defined Networks, MS Thesis, May 2015. [full text]
- Mayank Pundir, “ZORRO: Zero-cost Reactive Failure Recovery in Distributed Graph Processing”, MS Thesis, May 2105. [full text]
- Xiao Cai, “Phurti: Application and Network-Aware Flow Scheduling for MapReduce”, MS Thesis, May 2015. [full text]
- Gary L. Wang, “Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring”, MS Thesis, May 2015. [full text]
- Gourav Khaneja, “An Experimental Study of Monolithic Scheduler Architecture in Cloud Computing Systems”, MS Thesis, May 2015. [full text]
- Phuong Cao, “An Experiment Using Factor Graph for Early Attack Detection”, MS Thesis, May 2015. [full text]
- Uttam Thakore, “A Quantitative Methodology for Evaluating and Deploying Security Monitors”, MS Thesis, August 2015. [full text]
- Reza Shiftehafar, “A Flexible Fine-grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications”, December 2015. [full text]
- Mohammad Ahmad, “Cauldron: A Framework To Defend Against Cache-Based Side-Channel Attacks In Clouds”, MS Thesis, May 2016.
- Zachary Estrada, “Dynamic Reliability and Security Monitoring: A Virtual Machine Approach”, PhD Thesis, University of Illinois at Urbana-Champaign, August 2016. [full text]
- Carlo Di-Giulio, “Privacy and Security in the Clouds: IT Security and Privacy Standards in the EU and US”, MA Thesis, May 2017. [full text]