Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Air Force Institute of Technology (216)
- Walden University (117)
- Nova Southeastern University (90)
- San Jose State University (61)
- University of Texas at El Paso (52)
-
- Missouri University of Science and Technology (50)
- University of South Florida (50)
- University of Central Florida (44)
- Wright State University (43)
- Dakota State University (40)
- University of Arkansas, Fayetteville (39)
- Florida Institute of Technology (35)
- Old Dominion University (33)
- Edith Cowan University (24)
- University for Business and Technology in Kosovo (23)
- Purdue University (22)
- Dartmouth College (21)
- Brigham Young University (20)
- Regis University (20)
- University of Wisconsin Milwaukee (16)
- William & Mary (16)
- Louisiana State University (15)
- Washington University in St. Louis (15)
- California State University, San Bernardino (14)
- Kennesaw State University (14)
- Wayne State University (14)
- East Tennessee State University (13)
- Marquette University (13)
- Utah State University (13)
- Boise State University (12)
- Keyword
-
- Cybersecurity (139)
- Security (79)
- Machine learning (56)
- Machine Learning (44)
- Department of Computer Science and Engineering (40)
-
- Computer security (38)
- Computer Science (31)
- Computer networks--Security measures (31)
- Privacy (30)
- Information technology (24)
- Deep learning (23)
- Information security (23)
- Cyber Security (22)
- Malware (22)
- Applied sciences (21)
- Cyber security (21)
- Blockchain (19)
- College for Professional Studies (19)
- Internet of Things (19)
- School of Computer & Information Science (19)
- Information Technology (18)
- Artificial intelligence (17)
- Computer Engineering (17)
- Education (15)
- Information Security (14)
- IoT (14)
- Network security (14)
- Vulnerability (14)
- Center_CCR (13)
- Compliance (13)
- Publication Year
- Publication
-
- Theses and Dissertations (360)
- Walden Dissertations and Doctoral Studies (117)
- CCE Theses and Dissertations (90)
- Electronic Theses and Dissertations (63)
- Master's Projects (61)
-
- Open Access Theses & Dissertations (52)
- USF Tampa Graduate Theses and Dissertations (50)
- Browse all Theses and Dissertations (43)
- Doctoral Dissertations (41)
- Masters Theses & Doctoral Dissertations (40)
- Masters Theses (39)
- Graduate Theses and Dissertations (27)
- Dissertations (20)
- Regis University Student Publications (comprehensive collection) (20)
- Electronic Theses and Dissertations, 2020- (16)
- Theses: Doctorates and Masters (15)
- Dissertations, Theses, and Masters Projects (14)
- McKelvey School of Engineering Theses & Dissertations (14)
- Open Access Theses (14)
- Wayne State University Dissertations (13)
- Boise State University Theses and Dissertations (12)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (12)
- Honors Theses (12)
- Theses (12)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (12)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (11)
- Engineering Management & Systems Engineering Theses & Dissertations (11)
- Dissertations and Theses Collection (Open Access) (10)
- Graduate Theses, Dissertations, and Problem Reports (10)
- LSU Master's Theses (10)
- File Type
Articles 1 - 30 of 1599
Full-Text Articles in Entire DC Network
Enabling Iov Communication Through Secure Decentralized Clustering Using Federated Deep Reinforcement Learning, Chandler Scott
Enabling Iov Communication Through Secure Decentralized Clustering Using Federated Deep Reinforcement Learning, Chandler Scott
Electronic Theses and Dissertations
The Internet of Vehicles (IoV) holds immense potential for revolutionizing transporta- tion systems by facilitating seamless vehicle-to-vehicle and vehicle-to-infrastructure communication. However, challenges such as congestion, pollution, and security per- sist, particularly in rural areas with limited infrastructure. Existing centralized solu- tions are impractical in such environments due to latency and privacy concerns. To address these challenges, we propose a decentralized clustering algorithm enhanced with Federated Deep Reinforcement Learning (FDRL). Our approach enables low- latency communication, competitive packet delivery ratios, and cluster stability while preserving data privacy. Additionally, we introduce a trust-based security framework for IoV environments, integrating a central authority …
Federated Learning Based Autoencoder Ensemble System For Malware Detection On Internet Of Things Devices, Steven Edward Arroyo
Federated Learning Based Autoencoder Ensemble System For Malware Detection On Internet Of Things Devices, Steven Edward Arroyo
Theses and Dissertations
New technologies are being introduced at a rate faster than ever before and smaller in size. Due to the size of these devices, security is often difficult to implement. The existing solution is a firewall-segmented “IoT Network” that only limits the effect of these infected devices on other parts of the network. We propose a lightweight unsupervised hybrid-cloud ensemble anomaly detection system for malware detection. We perform transfer learning using a generalized model trained on multiple IoT device sources to learn network traffic on new devices with minimal computational resources. We further extend our proposed system to utilize federated learning …
Companionship, Romance, And Self-Perception With Conversational Chatbots, Jonathan Windsor
Companionship, Romance, And Self-Perception With Conversational Chatbots, Jonathan Windsor
Student Research Submissions
Serving as a metaphorical gateway transcending the communicative barriers of physical relationships in interpersonal dialogues, artificial imators of human behavior and speech, also known as conversational chatbots; a simulation of human knowledge and existence in a bi-directional conversation, functions as a rhetor of expression. Spanning from contexts of professional to romantic, I serve to dissect and critically analyze the nuances of human-machine relationships based on pre-established literature, inviting ethical considerations and biases in their design and marketing. Corporate influences spark pre-established servitude-esque relationships with conversational agents. Professional applications, both task-oriented and emotionally based alike, paint a mixed picture of …
Detection Of Jamming Attacks In Vanets, Thomas Justice
Detection Of Jamming Attacks In Vanets, Thomas Justice
Undergraduate Honors Theses
A vehicular network is a type of communication network that enables vehicles to communicate with each other and the roadside infrastructure. The roadside infrastructure consists of fixed nodes such as roadside units (RSUs), traffic lights, road signs, toll booths, and so on. RSUs are devices equipped with communication capabilities that allow vehicles to obtain and share real-time information about traffic conditions, weather, road hazards, and other relevant information. These infrastructures assist in traffic management, emergency response, smart parking, autonomous driving, and public transportation to improve roadside safety, reduce traffic congestion, and enhance the overall driving experience. However, communication between the …
The Human Side Of Adaptive Autonomy: Design Considerations For Adaptive Autonomous Teammates, Allyson Hauptman
The Human Side Of Adaptive Autonomy: Design Considerations For Adaptive Autonomous Teammates, Allyson Hauptman
All Dissertations
Ground-breaking advances in artificial intelligence (AI) have led to the possibility of AI agents operating not just as useful tools for teams, but also as full-fledged team members with unique, interdependent roles. This possibility is fueled by the human desire to create more and more autonomous systems that possess computational powers beyond human capability and the promise of increasing the productivity and efficiency of human teams dramatically. Yet, for all the promise and potential of these human-AI teams, the inclusion of AI teammates presents several challenges and concerns for both teaming and human-centered AI.
An important part of teaming is …
A Post-Quantum Mercurial Signature Scheme, Madison Mabe
A Post-Quantum Mercurial Signature Scheme, Madison Mabe
All Theses
This paper introduces the first post-quantum mercurial signature scheme. We also discuss how this can be used to construct a credential scheme, as well as some practical applications for the constructions.
Humanity Amid Innovation: Exploring Our Relationship To Technology, Sarah Durkee
Humanity Amid Innovation: Exploring Our Relationship To Technology, Sarah Durkee
Senior Theses and Projects
This thesis examines the impacts of technology on fundamental aspects of human nature and experience. Drawing on the works from Kant, Turing, Arendt, Benjamin, and Freud, it explores how rapid technological change is redefining human reason, intelligence, and creativity in the digital age. The first chapter analyzes whether modern online communication platforms realize or undermine Kant's vision of an enlightened public sphere fostering free discourse and critique. It argues that prioritizing engagement over substantive debate, these digital realms corrode the depth of interaction essential for cultivating human reason. The second chapter explores the pursuit of artificial intelligence as a reproduction …
Security And Interpretability In Large Language Models, Lydia Danas
Security And Interpretability In Large Language Models, Lydia Danas
Undergraduate Honors Theses
Large Language Models (LLMs) have the capability to model long-term dependencies in sequences of tokens, and are consequently often utilized to generate text through language modeling. These capabilities are increasingly being used for code generation tasks; however, LLM-powered code generation tools such as GitHub's Copilot have been generating insecure code and thus pose a cybersecurity risk. To generate secure code we must first understand why LLMs are generating insecure code. This non-trivial task can be realized through interpretability methods, which investigate the hidden state of a neural network to explain model outputs. A new interpretability method is rationales, which obtains …
An In-Network Approach For Pmu Missing Data Recovery With Data Plane Programmability, Jack Norris
An In-Network Approach For Pmu Missing Data Recovery With Data Plane Programmability, Jack Norris
Computer Science and Computer Engineering Undergraduate Honors Theses
Phasor measurement unit (PMU) systems often experience unavoidable missing and erroneous measurements, which undermine power system observability and operational effectiveness. Traditional solutions for recovering missing PMU data employ a centralized approach at the control center, resulting in lengthy recovery times due to data transmission and aggregation. In this work, we leverage P4-based programmable networks to expedite missing data recovery. Our approach utilizes the data plane programmability offered by P4 to present an in-network solution for PMU data recovery. We establish a data-plane pipeline on P4 switches, featuring a customized PMU protocol parser, a missing data detection module, and an auto-regressive …
Legislative Recommendations On Biometric Security And Privacy Jurisprudence, Joshua M. Morrow
Legislative Recommendations On Biometric Security And Privacy Jurisprudence, Joshua M. Morrow
All Student Scholarship
This project focuses on the prevalence of biometrics today, their various applications, and the biometric laws and legislations in place in the United States (U.S.) and Maine. Due to various threats and vulnerabilities imposing risk on collecting and using peoples’ biometric data, sufficient cyber protections related to citizens’ privacy rights, ethical control, and security of personally identifiable information (PII) must become necessary components of contemporary biometric laws and legislation. Without such explicit cyber protections, citizens participate in and comply with various technical domains and entities, such as private companies and governmental agencies, with minimal awareness or comprehension that their sensitive …
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Honors Theses
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Investigating User Awareness Of Privacy And Security Concerns In The Iot Era, Jack Ruffner
Investigating User Awareness Of Privacy And Security Concerns In The Iot Era, Jack Ruffner
ALL - Honors Theses
The Internet of Things (IoT) has had a significant impact on the way we view and interact with technology. This is especially prevalent in the areas of smart homes, smart tech, and mobile devices. However, despite the advantageous functions of IoT devices, they are accompanied by numerous security concerns that enable several severe privacy concerns. Many studies and informative articles present ideas that explain and prove the presence of the various risks associated with IoT devices and the need to address them. This thesis paper aims to explore the relationship between IoT device usage and security and privacy risks as …
Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy
Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy
Theses/Capstones/Creative Projects
Cryptocurrencies rely on a distributed public ledger (record of transactions) in order to perform their intended functions. However, the public’s ability to audit the network is both its greatest strength and greatest weakness: Anyone can see what address sent currency, and to whom the currency was sent. If cryptocurrency is ever going to take some of the responsibility of fiat currency, then there needs to be a certain level of confidentiality. Thus far, Monero has come out on top as the preferred currency for embodying the ideas of privacy and confidentiality. Through numerous cryptographic procedures, Monero is able to obfuscate …
Space Transformation For Open Set Recognition, Atefeh Mahdavi
Space Transformation For Open Set Recognition, Atefeh Mahdavi
Theses and Dissertations
Open Set Recognition (OSR) is about dealing with unknown situations that were not learned by the models during training. In OSR, only a limited number of known classes are available at the time of training the model and the possibility of unknown classes never seen at training time emerges in the test environment. In such a setting, the unknown classes and their risk should be considered in the algorithm. Such systems require not only to identify and discriminate instances that belong to the source domain (i.e., the seen known classes contained in the training dataset) but also to reject unknown …
White Cell Support Application For Expo Ops Tactical Wargame System, Zackery Joseph Milder
White Cell Support Application For Expo Ops Tactical Wargame System, Zackery Joseph Milder
Theses
The purpose of this project was to create a support application for a tabletop wargame currently used for training and scenario simulation by the United States Marine Corps. The EXPO OPS Companion is meant to enhance the capabilities of the White Cell/table director, the unbiased third party responsible for running adjudication for the EXPO OPS Tactical Wargames System. EXPO OPS TWS is “…a table top wargame covering contemporary and future conflict at the platoon, company and battalion level. It is a wargame toolkit that enables wargaming scenarios in the 2020 to 2030 timeframe. The design centers on plans and decisions …
Achieving Responsible Anomaly Detection, Xiao Han
Achieving Responsible Anomaly Detection, Xiao Han
All Graduate Theses and Dissertations, Fall 2023 to Present
In the digital transformation era, safeguarding online systems against anomalies – unusual patterns indicating potential threats or malfunctions – has become crucial. This dissertation embarks on enhancing the accuracy, explainability, and ethical integrity of anomaly detection systems. By integrating advanced machine learning techniques, it improves anomaly detection performance and incorporates fairness and explainability at its core.
The research tackles performance enhancement in anomaly detection by leveraging few-shot learning, demonstrating how systems can effectively identify anomalies with minimal training data. This approach overcomes data scarcity challenges. Reinforcement learning is employed to iteratively refine models, enhancing decision-making processes. Transfer learning enables the …
Stability Of Quantum Computers, Samudra Dasgupta
Stability Of Quantum Computers, Samudra Dasgupta
Doctoral Dissertations
Quantum computing's potential is immense, promising super-polynomial reductions in execution time, energy use, and memory requirements compared to classical computers. This technology has the power to revolutionize scientific applications such as simulating many-body quantum systems for molecular structure understanding, factorization of large integers, enhance machine learning, and in the process, disrupt industries like telecommunications, material science, pharmaceuticals and artificial intelligence. However, quantum computing's potential is curtailed by noise, further complicated by non-stationary noise parameter distributions across time and qubits. This dissertation focuses on the persistent issue of noise in quantum computing, particularly non-stationarity of noise parameters in transmon processors. It …
Artificial Intelligence's Ability To Detect Online Predators, Olatilewa Osifeso
Artificial Intelligence's Ability To Detect Online Predators, Olatilewa Osifeso
Electronic Theses, Projects, and Dissertations
Online child predators pose a danger to children who use the Internet. Children fall victim to online predators at an alarming rate, based on the data from the National Center of Missing and Exploited Children. When making online profiles and joining websites, you only need a name, an email and a password without identity verification. Studies have shown that online predators use a variety of methods and tools to manipulate and exploit children, such as blackmail, coercion, flattery, and deception. These issues have created an opportunity for skilled online predators to have fewer obstacles when it comes to contacting and …
Multimodal Stylometry: A Novel Approach For Authorship Identification., Glory O. Adebayo
Multimodal Stylometry: A Novel Approach For Authorship Identification., Glory O. Adebayo
Electronic Theses and Dissertations
This dissertation introduces multimodal stylometry, a novel approach to authorship identification that integrates text and source code features for a comprehensive understanding of an author's unique style. Traditional stylometric methods have primarily focused on either text stylometry or source code stylometry, thereby neglecting the potential insights that multimodality may provide. This research aims to bridge this gap by proposing a framework that combines textual and source code data to enhance the accuracy and reliability of authorship identification. The study begins by reviewing existing literature on authorship identification and stylometry, highlighting the limitations of unimodal approaches. Leveraging recent advancements in multimodal …
Multithreaded Applications On The Heterogeneous Research Computing Environment., Sungbo Jung
Multithreaded Applications On The Heterogeneous Research Computing Environment., Sungbo Jung
Electronic Theses and Dissertations
Bioinformatics is a domain that has experienced rapid research growth in recent years, as evidenced by the increasing number of articles in biomedical databases such as PubMed, which adds over a million publications every year. However, this also poses a challenge for researchers who need to find relevant citations for their work. Therefore, developing efficient indexing and searching methods for text data is crucial for Bioinformatics. One key technique for information retrieval is document inversion, which involves creating an inverted index to enable efficient searching through vast collections of text or documents. This Ph.D. research aims to design the research …
Individual Behavioral Modeling Across Games Of Strategy, Logan Fields
Individual Behavioral Modeling Across Games Of Strategy, Logan Fields
USF Tampa Graduate Theses and Dissertations
An individual’s actions in a particular environment and with specified resources can reveal their decision-making tendencies and patterns, and by analyzing the variations in cognitive traits among individuals, it may be possible to identify trends that can foretell their future behaviors. This can be a powerful tool in various fields including cognitive modeling, player analytics, computer security, and threat detection. Collectible card games are a fruitful test space for studying cognitive differences in decision-making, as they can have clearly defined and replicable environments and large player bases. As such, in this work, I explore the potential of using two virtual …
An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley
An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley
LSU Master's Theses
The growing cybersecurity workforce gap underscores the urgent need to address deficiencies in cybersecurity education: the current education system is not producing competent cybersecurity professionals, and current efforts are not informing the non-technical general public of basic cybersecurity practices. We argue that this gap is compounded by a fundamental disconnect between cybersecurity education literature and established education theory. Our research addresses this issue by examining the alignment of cybersecurity education literature concerning educational methods and tools with education literature.
In our research, we endeavor to bridge this gap by critically analyzing the alignment of cybersecurity education literature with education theory. …
Introductory Chemistry Student Success: Evaluating Peer-Led Team Learning And Describing Sense Of Belonging, Jessica D. Young
Introductory Chemistry Student Success: Evaluating Peer-Led Team Learning And Describing Sense Of Belonging, Jessica D. Young
USF Tampa Graduate Theses and Dissertations
Identifying approaches that make science and engineering education broader and more inclusive is core to discipline based education research. Both fundamental and applied research are important in advancing a STEM education that retains the necessary scientists of the U.S.’s future. Thus, the major goal of this work was to evaluate and describe efforts that promote student success within introductory STEM courses. This began with applied research by utilizing quantitative analyses like case-matching, logistic regression, independent sample t-tests, and repeated measures while evaluating the efficacy of peer-led team learning (PLTL). Later, this work delves into qualitative approaches to answer fundamental research …
A Study On Ethical Hacking In Cybersecurity Education Within The United States, Jordan Chew
A Study On Ethical Hacking In Cybersecurity Education Within The United States, Jordan Chew
Master's Theses
As the field of computer security continues to grow, it becomes increasingly important to educate the next generation of security professionals. However, much of the current education landscape primarily focuses on teaching defensive skills. Teaching offensive security, otherwise known as ethical hacking, is an important component in the education of all students who hope to contribute to the field of cybersecurity. Doing so requires a careful consideration of what ethical, legal, and practical issues arise from teaching students skills that can be used to cause harm. In this thesis, we first examine the current state of cybersecurity education in the …
Adaptive Model Selection In Stock Market Prediction: A Modular And Scalable Big Data Analytics Approach, Mohammadehsan Akhavanpour
Adaptive Model Selection In Stock Market Prediction: A Modular And Scalable Big Data Analytics Approach, Mohammadehsan Akhavanpour
Electronic Theses and Dissertations
In today's globalized economy, financial markets are more interconnected than ever, generating vast amounts of data from thousands of sources every second. The need to accurately analyze and interpret this data is crucial for investors, analysts, and researchers alike. Traditional models for market prediction are limited by their ability to adapt to the real-time nature and 'big data' dimensions of these complex financial datasets. To address these challenges, this thesis proposes and implements a novel framework that combines Apache Kafka with a microservices framework. This framework offers a scalable, real-time solution for financial market prediction that effectively manages the 5Vs …
Towards Energy-Efficient Edge Computing For Tiny Ai Applications, Vamsi Krishna Bhagavathula
Towards Energy-Efficient Edge Computing For Tiny Ai Applications, Vamsi Krishna Bhagavathula
Theses and Dissertations
As artificial intelligence (AI) applications become more common on the edge of networks, like Raspberry Pi servers, it is crucial to optimize their energy use. This research project investigates how AI algorithms affect energy efficiency and resource usage on Raspberry Pi servers. Two models were created: one predicts resource usage, and the other predicts power consumption of AI algorithms on Raspberry Pi. Several factors are considered like CPU and memory use, algorithm speed, dataset size, and types of algorithms and datasets. Using regression-based methods, we model how these factors affect energy use. By converting categorical factors into numerical ones, we …
Employing Genetic Algorithms For Energy-Efficient Data Routing In Internet Of Things Networks, Farzana Akhter
Employing Genetic Algorithms For Energy-Efficient Data Routing In Internet Of Things Networks, Farzana Akhter
Graduate College Dissertations and Theses
The Internet of Things (IoT) connects a vast number of smart objects for various applications,such as home automation, industrial control, and healthcare. The rapid advancement in wireless technologies and miniature embedded devices has enabled IoT systems to be deployed in various environments. However, the performance of IoT devices is limited because of the imbalance of data traffic on different router nodes. Nodes that experience high data volume will have a higher energy depletion rate and, as a result, will reach the end of their life quicker than other routers that have less data traffic. Genetic Algorithms are a well-known technique …
How Increased Ransomware Attacks Have Impacted Hospitals In The United States, Mackenzie Dotson
How Increased Ransomware Attacks Have Impacted Hospitals In The United States, Mackenzie Dotson
Theses, Dissertations and Capstones
Introduction: The healthcare industry, particularly hospitals, have fallen prey to the alarming rise of ransomware attacks. In recent years, highly sophisticated cybergroups, armed with substantial funds and advanced technology, have intensified their focus on hospitals. Despite the advice against it, most hospitals have paid the ransom in order to regain access to their electronic systems and patient data, underlining the severity of these attacks.
Purpose of the Study: The purpose of this research was to evaluate the effects of ransomware attacks on hospitals in the US to determine if the patients were at risk due to hackers withholding patient information …
Time Series Anomaly Detection Using Generative Adversarial Networks, Shyam Sundar Saravanan
Time Series Anomaly Detection Using Generative Adversarial Networks, Shyam Sundar Saravanan
Masters Theses
"Anomaly detection is widely used in network intrusion detection, autonomous driving, medical diagnosis, credit card frauds, etc. However, several key challenges remain open, such as lack of ground truth labels, presence of complex temporal patterns, and generalizing over different datasets. In this work, we propose TSI-GAN, an unsupervised anomaly detection model for time-series that can learn complex temporal patterns automatically and generalize well, i.e., no need for choosing dataset-specific parameters, making statistical assumptions about underlying data, or changing model architectures. To achieve these goals, we convert each input time-series into a sequence of 2D images using two encoding techniques with …
Optimizing Php Api Calls With Pagination And Caching, Parsharam Reddy Sudda
Optimizing Php Api Calls With Pagination And Caching, Parsharam Reddy Sudda
Dissertations, Master's Theses and Master's Reports
The Keweenaw Time Traveler (KeTT) project is devoted to mapping the historical and social landscapes of the Keweenaw Peninsula. During the project, it was discovered that the server-side performance needed improvement. To address this issue, the "Optimizing PHP API Calls with Pagination and Caching" initiative was launched. This initiative focused on refining API calls, implementing server caching and pagination, and fortifying security against common vulnerabilities. The project successfully mitigated risks associated with SQL Injection and XSS through meticulous code enhancements while improving error handling. Additionally, the introduction of Scroll-Induced Pagination optimized data delivery, significantly reducing response times, and elevating the …