ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.
- Ahn, Gail-Joon
- 2 Arizona State University
- 2 Huang, Dijiang
- 1 Alshamrani, Adel
- 1 Chung, Chun-Jen
- 1 Davulcu, Hasan
- 1 Doupe, Adam
- more
- 1 Xue, Guoliang
- 1 Zhang, Yanchao
- 2 English
- 2 Public
- Software Defined Networking
- 2 Computer science
- 1 Advanced Persistent Threats
- 1 Anomaly Detection
- 1 Attack Graph
- 1 Cloud Computing
- 1 Cloud Security
- more
- 1 Cyber Attacks
- 1 Cybersecurity
- 1 Machine Learning
- 1 Network security
- 1 Threats Detection
- Dwarf Galaxies as Laboratories of Protogalaxy Physics: Canonical Star Formation Laws at Low Metallicity
- Evolutionary Genetics of CORL Proteins
- Social Skills and Executive Functioning in Children with PCDH-19
- Deep Domain Fusion for Adaptive Image Classification
- Software Defined Pulse-Doppler Radar for Over-The-Air Applications: The Joint Radar-Communications Experiment
Cloud computing is known as a new and powerful computing paradigm. This new generation of network computing model delivers both software and hardware as on-demand resources and various services over the Internet. However, the security concerns prevent users from adopting the cloud-based solutions to fulfill the IT requirement for many business critical computing. Due to the resource-sharing and multi-tenant nature of cloud-based solutions, cloud security is especially the most concern in the Infrastructure as a Service (IaaS). It has been attracting a lot of research and development effort in the past few years. Virtualization is the main technology of cloud …
- Contributors
- Chung, Chun-Jen, Huang, Dijiang, Ahn, Gail-Joon, et al.
- Created Date
- 2015
Cyber-systems and networks are the target of different types of cyber-threats and attacks, which are becoming more common, sophisticated, and damaging. Those attacks can vary in the way they are performed. However, there are similar strategies and tactics often used because they are time-proven to be effective. The motivations behind cyber-attacks play an important role in designating how attackers plan and proceed to achieve their goals. Generally, there are three categories of motivation are: political, economical, and socio-cultural motivations. These indicate that to defend against possible attacks in an enterprise environment, it is necessary to consider what makes such an …
- Contributors
- Alshamrani, Adel, Huang, Dijiang, Doupe, Adam, et al.
- Created Date
- 2018