Dissertations / Theses on the topic 'Virtual machines security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 39 dissertations / theses for your research on the topic 'Virtual machines security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Fediushyn, O. I., O. O. Yatsiuk, and H. O. Rusanov. "Virtual environment for training auditors with information security." Thesis, ВА ЗС АР; НТУ "ХПІ"; НАУ, ДП "ПДПРОНДІАВІАПРОМ"; УмЖ, 2021. https://openarchive.nure.ua/handle/document/15754.
Full textCarbone, Martim. "Semantic view re-creation for the secure monitoring of virtual machines." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44841.
Full textŽirgulis, Mantas. "Virtualios aplinkos saugos sistemos prototipas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_100757-27871.
Full textShah, Payal Hemchand. "Security in live Virtual Machine migration." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5205.
Full textHu, Ji. "A virtual machine architecture for IT-security laboratories." Phd thesis, [S.l.] : [s.n.], 2006. http://deposit.ddb.de/cgi-bin/dokserv?idn=980935652.
Full textDenz, Robert. "Securing Operating Systems Through Utility Virtual Machines." Thesis, Dartmouth College, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10190644.
Full textLin, Sammy. "Towards virtual machine integrity using introspection /." Online version of thesis, 2009. http://hdl.handle.net/1850/10648.
Full textHu, Ji, Dirk Cordel, and Christoph Meinel. "A virtual machine architecture for creating IT-security laboratories." Universität Potsdam, 2006. http://opus.kobv.de/ubp/volltexte/2009/3307/.
Full textMaiyama, Kabiru M. "Performance Analysis of Virtualisation in a Cloud Computing Platform. An application driven investigation into modelling and analysis of performance vs security trade-offs for virtualisation in OpenStack infrastructure as a service (IaaS) cloud computing platform architectures." Thesis, University of Bradford, 2019. http://hdl.handle.net/10454/18587.
Full textHerzog, Almut. "Usable Security Policies for Runtime Environments." Doctoral thesis, Linköpings universitet, IISLAB - Laboratoriet för intelligenta informationssystem, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8809.
Full textHebbal, Yacine. "Semantic monitoring mechanisms dedicated to security monitoring in IaaS cloud." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0029/document.
Full textAslam, Mudassar. "Bringing Visibility in the Clouds : using Security, Transparency and Assurance Services." Doctoral thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-25376.
Full textSchneider, Christian A. [Verfasser], Claudia [Akademischer Betreuer] Eckert, and Thorsten [Akademischer Betreuer] Holz. "Full Virtual Machine State Reconstruction for Security Applications / Christian A. Schneider. Gutachter: Claudia Eckert ; Thorsten Holz. Betreuer: Claudia Eckert." München : Universitätsbibliothek der TU München, 2013. http://d-nb.info/1044395907/34.
Full textPfoh, Jonas [Verfasser], Claudia [Akademischer Betreuer] Eckert, and Uwe [Akademischer Betreuer] Baumgarten. "Leveraging Derivative Virtual Machine Introspection Methods for Security Applications / Jonas Pfoh. Gutachter: Claudia Eckert ; Uwe Baumgarten. Betreuer: Claudia Eckert." München : Universitätsbibliothek der TU München, 2013. http://d-nb.info/1033403024/34.
Full textPfoh, Jonas Verfasser], Claudia [Akademischer Betreuer] [Eckert, and Uwe [Akademischer Betreuer] Baumgarten. "Leveraging Derivative Virtual Machine Introspection Methods for Security Applications / Jonas Pfoh. Gutachter: Claudia Eckert ; Uwe Baumgarten. Betreuer: Claudia Eckert." München : Universitätsbibliothek der TU München, 2013. http://nbn-resolving.de/urn:nbn:de:bvb:91-diss-20130318-1115811-0-5.
Full textAthreya, Manoj B. "Subverting Linux on-the-fly using hardware virtualization technology." Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34844.
Full textSjöstedt, Matildha. "Monitoring of Cyber Security Exercise Environments in Cyber Ranges : with an implementation for CRATE." Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177647.
Full textZahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.
Full textBacke, Anton, and Hugo Lindén. "Cloud Computing Security: A Systematic Literature Review." Thesis, Uppsala universitet, Institutionen för informatik och media, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-256426.
Full textDévigne, Clément. "Exécution sécurisée de plusieurs machines virtuelles sur une plateforme Manycore." Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066138/document.
Full textDévigne, Clément. "Exécution sécurisée de plusieurs machines virtuelles sur une plateforme Manycore." Electronic Thesis or Diss., Paris 6, 2017. http://www.theses.fr/2017PA066138.
Full textAndreoni, Lopez Martin Esteban. "Un système de surveillance et détection de menaces utilisant le traitement de flux comme une fonction virtuelle pour le Big Data." Thesis, Sorbonne université, 2018. http://www.theses.fr/2018SORUS035/document.
Full textGrizzard, Julian B. "Towards Self-Healing Systems: Re-establishing Trust in Compromised Systems." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-04072006-133056/.
Full textMertlík, Tomáš. "Technologie NFC a její zabezpečení." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220202.
Full textAndreoni, Lopez Martin Esteban. "Un système de surveillance et détection de menaces utilisant le traitement de flux comme une fonction virtuelle pour le Big Data." Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS035.
Full textRasool, Muhammad Ahsan, and Shafiq Hafiz Muhammad. "Blockchain Technology : a new domain for Cyber Forensics." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38242.
Full textGraff, Philippe. "Caractérisation, identification dans le réseau et optimisation du transport de trafic à faible latence - le cas du Cloud-Gaming." Electronic Thesis or Diss., Université de Lorraine, 2023. http://www.theses.fr/2023LORR0314.
Full textLoreti, Ludovico. "Pass The Hash attack. Panoramica, sperimentazione ed analisi." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17297/.
Full textScarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Full textSadri, Sahba. "Towards Migrating Security Policies along with Virtual Machines in Cloud." Thesis, 2013. http://spectrum.library.concordia.ca/978154/1/Sadri_MASc_S2014.pdf.
Full textAhamed, Farhad. "Security aware virtual machine consolidation in cloud computing." Thesis, 2016. http://hdl.handle.net/1959.7/uws:38023.
Full textWang, Chia-Wei, and 王嘉偉. "Facilitating Malware Sandbox with Security-Oriented Virtual Machine Introspection." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/9t3h2m.
Full textYap, Loong-Tern, and 葉龍騰. "A Study on Network Security and Management in Virtual Machine." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/8zqrzw.
Full textHu, Ji [Verfasser]. "A virtual machine architecture for IT-security laboratories / von Ji Hu." 2006. http://d-nb.info/980935652/34.
Full text(9034865), Deepika Kaushal. "Bootstrapping a Private Cloud." Thesis, 2020.
Find full textChang, Hung-hsun, and 張弘勳. "The Study of Critical Success Factors on the Using of Virtual Machine to Enhance Network Security of Organizations." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/59719839454611210432.
Full textVan, Staden Wynand Johannes. "The use of a virtual machine as an access control mechanism in a relational database management system." Thesis, 2008. http://hdl.handle.net/10210/518.
Full textLitty, Lionel. "Architectural Introspection and Applications." Thesis, 2010. http://hdl.handle.net/1807/24817.
Full textRoy, Indrajit. "Protecting sensitive information from untrusted code." Thesis, 2010. http://hdl.handle.net/2152/ETD-UT-2010-08-1951.
Full text