1.
With the rapid increase of the cyber-attacks, threat information sharing has become essential to understand and defend against cyber-attack in a timely and cost-effective[...]
2019 | doctoral dissertations |
2.
Cloud computing has attracted a lot of research efforts in recent years.More and more companies start to move their data and operations to cloud computing environment. Ho[...]
2017 | doctoral dissertations |
3.
Traditional approaches to cyber defense lack the agility to effectively counter stealthy and undetectable attacks, placing defenders at a disadvantage. In response to thi[...]
2023 | doctoral dissertations |