Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Western Michigan University

Theses/Dissertations

Machine learning

Articles 1 - 11 of 11

Full-Text Articles in Entire DC Network

On Phishing: Proposing A Host-Based Multi-Layer Passive/Active Anti-Phishing Approach Combating Counterfeit Websites, Wesam Harbi Fadheel Aug 2023

On Phishing: Proposing A Host-Based Multi-Layer Passive/Active Anti-Phishing Approach Combating Counterfeit Websites, Wesam Harbi Fadheel

Dissertations

Phishing is the starting point of most cyberattacks, mainly categorized as Email, Websites, Social Networks, Phone calls (Vishing), and SMS messaging (Smishing). Phishing refers to an attempt to collect sensitive data, typically in the form of usernames, passwords, credit card numbers, bank account information, etc., or other crucial facts, intending to use or sell the information obtained. Similar to how a fisherman uses bait to catch a fish, an attacker will pose as a trustworthy source to attract and deceive the victim.

This study explores the efficacy of host-side APT (Anti-Phishing Techniques) based onWebsite features like Lexical, Host-Based, or Content-Based …


Socially Aware Natural Language Processing With Commonsense Reasoning And Fairness In Intelligent Systems, Sirwe Saeedi Apr 2023

Socially Aware Natural Language Processing With Commonsense Reasoning And Fairness In Intelligent Systems, Sirwe Saeedi

Dissertations

Although Artificial Intelligence (AI) promises to deliver ever more user-friendly consumer applications, recent mishaps involving fake information and biased treatment serve as vivid reminders of the pitfalls of AI. AI can harbor latent biases and flaws that can cause harm in diverse and unexpected ways. It is crucial to understand the reasons for, mechanisms behind, and circumstances under which AI can fail. For instance, a lack of commonsense reasoning can lead to biased or unfair decisions made by Machine Learning (ML) systems. For example, if an ML system is trained on data that is biased or unrepresentative of the real …


Hierarchical Aggregation Of Multidimensional Data For Efficient Data Mining, Safaa Khalil Alwajidi Dec 2020

Hierarchical Aggregation Of Multidimensional Data For Efficient Data Mining, Safaa Khalil Alwajidi

Dissertations

Big data analysis is essential for many smart applications in areas such as connected healthcare, intelligent transportation, human activity recognition, environment, and climate change monitoring. Traditional data mining algorithms do not scale well to big data due to the enormous number of data points and the velocity of their generation. Mining and learning from big data need time and memory efficiency techniques, albeit the cost of possible loss in accuracy. This research focuses on the mining of big data using aggregated data as input. We developed a data structure that is to be used to aggregate data at multiple resolutions. …


A Unified Decentralized Trust Framework For Detection Of Iot Device Attacks In Smart Homes, Hussein Salim Qasim Alsheakh Jun 2020

A Unified Decentralized Trust Framework For Detection Of Iot Device Attacks In Smart Homes, Hussein Salim Qasim Alsheakh

Dissertations

Trust in Smart Home technology security is a primary concern for consumers, which can prevent them from adopting smart home services. Such concerns are due to following reasons; (i) nature of IoT devices– which due to their limited computational and resource capabilities, cannot support traditional on-device security controls (ii) any breach to cyber-attacks have an immediate impact on the smart homeowner, compared to traditional cyber-attacks (iii) a large variety of different applications and services under the umbrella of make an overarching security framework for smart homes fundamentally challenging for both providers to offer and owners to manage.

This dissertation offers …


Toward Self-Reconfigurable Parametric Systems: Reinforcement Learning Approach, Ting-Yu Mu Dec 2019

Toward Self-Reconfigurable Parametric Systems: Reinforcement Learning Approach, Ting-Yu Mu

Dissertations

For the ongoing advancement of the fields of Information Technology (IT) and Computer Science, machine learning-based approaches are utilized in different ways in order to solve the problems that belong to the Nondeterministic Polynomial time (NP)-hard complexity class or to approximate the problems if there is no known efficient way to find a solution. Problems that determine the proper set of reconfigurable parameters of parametric systems to obtain the near optimal performance are typically classified as NP-hard problems with no efficient mathematical models to obtain the best solutions. This body of work aims to advance the knowledge of machine learning …


Predicting The Complexity Of Locality Patterns In Loop Nests In C Scientific Programs, Nasser M. Alsaedi Aug 2019

Predicting The Complexity Of Locality Patterns In Loop Nests In C Scientific Programs, Nasser M. Alsaedi

Dissertations

On modern computer systems, the performance of an application depends on its locality. Most existing locality measurements performed by compiler static analysis mainly target analyzing regular array references in loop nests. Measurements based on compiler static analysis have limited applicability when the loop bounds are unknown at compile time, when the control flow is dynamic, or when index arrays or pointer operations are used. In addition, compiler static analysis cannot adapt to input change.

Training-based locality analysis predicts the data reuse change across program inputs to provide run-time information. This analysis quantifies the number of unique memory locations accessed between …


Exploring The Dynamics Of Scientific Research, Shilpa Lakhanpal Jun 2019

Exploring The Dynamics Of Scientific Research, Shilpa Lakhanpal

Dissertations

Scientific research papers present the research endeavors of numerous scientists around the world, and are documented across multitudes of technical conference proceedings, and other such publications. Given the plethora of such research data, if we could automate the extraction of key interesting areas of research, and provide access to this new information, it would make literature searches incredibly easier for researchers. This in turn could be very useful for them in furthering their research agenda. With this goal in mind, we have endeavored to provide such solutions through our research. Specifically, the focus of our research is to design, analyze …


Efficacy Of Deep Learning In Support Of Smart Services, Basheer Mohammed Basheer Qolomany Dec 2018

Efficacy Of Deep Learning In Support Of Smart Services, Basheer Mohammed Basheer Qolomany

Dissertations

The massive amount of streaming data generated and captured by smart service appliances, sensors and devices needs to be analyzed by algorithms, transformed into information, and minted to extract knowledge to facilitate timely actions and better decision making. This can lead to new products and services that can dramatically transform our lives. Machine learning and data analytics will undoubtedly play a critical role in enabling the delivery of smart services. Within the machine-learning domain, Deep Learning (DL) is emerging as a superior new approach that is much more effective than any rule or formula used by traditional machine learning. Furthermore, …


A Holistic Computational Approach To Boosting The Performance Of Protein Search Engines, Majdi Ahmad Mosa Maabreh Apr 2018

A Holistic Computational Approach To Boosting The Performance Of Protein Search Engines, Majdi Ahmad Mosa Maabreh

Dissertations

Despite availability of several proteins search engines, due to the increasing amounts of MS/MS data and database sizes, more efficient data analysis and reduction methods are important. Improving accuracy and performance of protein identification is a main goal in the community of proteomic research. In this research, a holistic solution for improvement in search performance is developed.

Most current search engines apply the SEQUEST style of searching protein databases to define MS/MS spectra. SEQUEST involves three main phases: (i) Indexing the protein databases, (ii) Matching and Ranking the MS/MS spectra and (iii) Filtering the matches and reporting the final proteins. …


Exploring The Use Of Hierarchal Statistical Analysis And Deep Neural Networks To Detect And Mitigate Covert Timing Channels, Omar Darwish Apr 2018

Exploring The Use Of Hierarchal Statistical Analysis And Deep Neural Networks To Detect And Mitigate Covert Timing Channels, Omar Darwish

Dissertations

Covert timing channels provide a mechanism to transmit unauthorized information across different processes. It utilizes the inter-arrival times between the transmitted packets to hide the communicated data. It can be exploited in a variety of malevolent scenarios such as leaking military secrets, trade secrets, and other forms of Intellectual Property (IP). They can be also used as a vehicle to attack existing computing systems to disseminate software viruses or worms while bypassing firewalls, intrusion detection and protection systems, and application filters. Therefore, the detection and mitigation of covert channels is a key issue in modern Information Technology (IT) infrastructure. Many …


Artificial Immune Systems And Particle Swarm Optimization For Solutions To The General Adversarial Agents Problem, Jeremy Mange Apr 2013

Artificial Immune Systems And Particle Swarm Optimization For Solutions To The General Adversarial Agents Problem, Jeremy Mange

Dissertations

The general adversarial agents problem is an abstract problem description touching on the fields of Artificial Intelligence, machine learning, decision theory, and game theory. The goal of the problem is, given one or more mobile agents, each identified as either “friendly" or “enemy", along with a specified environment state, to choose an action or series of actions from all possible valid choices for the next “timestep" or series thereof, in order to lead toward a specified outcome or set of outcomes. This dissertation explores approaches to this problem utilizing Artificial Immune Systems, Particle Swarm Optimization, and hybrid approaches, along with …