Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Theses/Dissertations

2008

Institution
Keyword
Publication

Articles 31 - 34 of 34

Full-Text Articles in Entire DC Network

Adapting Information Operations To A Changing World: Future Options For The United States Government, Edwin L. Armistead Jan 2008

Adapting Information Operations To A Changing World: Future Options For The United States Government, Edwin L. Armistead

Theses: Doctorates and Masters

In 1998, the Department of Defense in the United States released the first of a series of seminal policies on Information Operations (IO). Entitled Joint Publication 3-13, this instruction laid out for the first time, in an unclassified format, how the American military forces could utilise this particular element of power. As a relative newly defined activity, this publication proposed to revolutionise the manner in which warfare, diplomacy, business and a number of other areas are conducted. However, this radical transformation in the United States government with regard to IQ has not occurred over the last decade and a significant …


Application Of Computer Simulation Modeling To Evaluate Business Continuity Plans, Jose Francisco Molina Garcia Plaza Jan 2008

Application Of Computer Simulation Modeling To Evaluate Business Continuity Plans, Jose Francisco Molina Garcia Plaza

CCE Theses and Dissertations

Business continuity plans (BCP) help organizations plan for and withstand the occurrence of unexpected events that interrupt the normal operation of business. Managers typically develop several alternate plans to minimize the business impact of unexpected events. The problem for decision makers is that comparative evaluation of BCP is typically done using subjective judgments.

This research uses a case study approach focusing on a single organization and a single business continuity application to propose the use of computer simulation as a tool for managers to identify and evaluate different BCP prior to committing resources. In the context of an insurance firm, …


Botnets And Distributed Denial Of Service Attacks, Anilkumar Panicker Jan 2008

Botnets And Distributed Denial Of Service Attacks, Anilkumar Panicker

Master's Projects

With their ever increasing malicious capabilities and potential to infect a vast majority of computers on the Internet, botnets are emerging as the single biggest threat to Internet security. The aim of this project is to perform a detailed analysis of botnets and the vulnerabilities exploited by them to spread themselves and perform various malicious activities such as DDoS attacks. DDoS attacks are without doubt the most potent form of attacks carried out by botnets. In order to better understand this growing phenomenon and develop effective counter measures, it is necessary to be able to simulate DDoS attacks in a …


Fuzzy Range Query In Xml, Dexiong Zhang Jan 2008

Fuzzy Range Query In Xml, Dexiong Zhang

Master's Projects

This writing project presents a new approach to implement a fuzzy range query solution for retrieving Extensible Markup Language (XML) data. Ever since XML was introduced, it has become a web standard to describe data on the Internet. The need for performing range query against XML data is growing day by day. Many search service providers are eager to improve their solutions on range query against XML data. The project studies and analyzes the limitations on the current range query solutions. The project also proposes a new solution using fuzzy semantic analysis to quantify XML data so that it can …