Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Entire DC Network

Interoperability In An Electrified Pavement System: A Model-Based Systems Engineering Perspective, Beatriz Irene Soto Dec 2022

Interoperability In An Electrified Pavement System: A Model-Based Systems Engineering Perspective, Beatriz Irene Soto

Open Access Theses & Dissertations

In a 2021 statement provided by The White House, (The White House, 2021), the Biden administration announce the goal for electric vehicles to account for 50% of new vehicle sales in the United States by 2035. In addition, the legislation allocates a budget of $7.5 billion to build out a national network of EV chargers along highway corridors to facilitate long-distance travel and within communities to provide convenient charging where people live, work, and shop. This investment will support the President's goal of building a nationwide network of 500,000 EV chargers to accelerate the adoption of EVs, reduce emissions, improve …


Online/Incremental Learning To Mitigate Concept Drift In Network Traffic Classification, Alberto R. De La Rosa Dec 2022

Online/Incremental Learning To Mitigate Concept Drift In Network Traffic Classification, Alberto R. De La Rosa

Open Access Theses & Dissertations

Communication networks play a large role in our everyday lives. COVID19 pandemic in 2020 highlighted their importance as most jobs had to be moved to remote work environments. It is possible that the spread of the virus, the death toll, and the economic consequences would have been much worse without communication networks. To remove sole dependence on one equipment vendor, networks are heterogeneous by design. Due to this, as well as their increasing size, network management has become overwhelming for network managers. For this reason, automating network management will have a significant positive impact. Machine learning and software defined networking …


Analyzing And Quantifying The Impact Of Software Diversification On Return-Oriented Programming (Rop) Based Exploits, David Reyes Dec 2022

Analyzing And Quantifying The Impact Of Software Diversification On Return-Oriented Programming (Rop) Based Exploits, David Reyes

Open Access Theses & Dissertations

With the implementation of modern software mitigation techniques such: as Address Space Layout Randomization (ASLR), stack canaries, and the No-Execute bit (N.X.), attackers can no longer achieve arbitrary code execution simply by injecting shellcode into a vulnerable buffer and redirecting execution to this vulnerable buffer. Instead, attackers have pivoted to Return Oriented Programming (ROP) to achieve the same arbitrary code execution. Using this attack method, attackers string together ROP gadgets, assembly code snippets found in the target binary, to form what are known as ROP Chains. Using these ROP Chains, attackers can achieve the same malicious behavior as previous code …


Radio Frequency Fingerprinting And Its Application To Scada Environments, Evan White Dec 2022

Radio Frequency Fingerprinting And Its Application To Scada Environments, Evan White

Open Access Theses & Dissertations

With the introduction of IoT into ICS and smartgrid environments there has been a mod-ernization of communication protocols through the internet. This has led to the use of features such as TCP/IP but with it comes modernized attack vectors against these sys- tems. These attacks can be Man In the Middle (MITM), rogue device communication and device cloning. To prevent these attacks, this thesis deploys Radio Frequency Fingerprint- ing (RFF) techniques to verify the uniqueness and legitimacy of known devices. It is crucial to employ security measures within ICS that do not add to the network complexity as this effects …


Decision Making Under Uncertainty With A Special Emphasis On Geosciences And Education, Laxman Bokati Dec 2022

Decision Making Under Uncertainty With A Special Emphasis On Geosciences And Education, Laxman Bokati

Open Access Theses & Dissertations

In many practical situations, we need to make a decision. In engineering, we need to decideon the best design of a system, and, for existing systems - on the best control strategy. In financial applications, we need to decide what is the best way to invest money. In geosciences, we need to decide whether we should explore a possible mineral deposit - or whether we should perform more experiments and measurements (and what exactly). In some cases, we can compute the exact consequences of each decision - e.g., if we are controlling a satellite. However, in many other cases, we …


Oil Particle Analysis Using Machine Learning And Holography Imaging, Daniel Cruz Dec 2022

Oil Particle Analysis Using Machine Learning And Holography Imaging, Daniel Cruz

Open Access Theses & Dissertations

Holographic cameras show potential as a sensor to monitor oil spills. Holographic cameras record the light interference from particles in a volume of space, producing an image called a hologram. Processing these holograms is known as hologram reconstruction. It produces a representation of particles located in three-dimensional space. These cameras can record precise shapes and sizes of particles in a volume of water. However, it is very time-consuming and resource-intensive to process the images. Most algorithms that perform particle analysis require the hologram reconstruction step. The well-documented hybrid method is one such algorithm. Machine learning is one possible technique that …


Investigation Into The Economic Viability Of Industry 4.0 Practices In A Small Start-Up Setting: A Case Study, Joseph Lindley Dec 2022

Investigation Into The Economic Viability Of Industry 4.0 Practices In A Small Start-Up Setting: A Case Study, Joseph Lindley

Open Access Theses & Dissertations

Industry 4.0 has been a hot button topic since the first rumouringâ??s of a fourth industrial revolution taking place in the early 2010s. Since that time many companies have attempted to transform their process, procedures, and systems to become streamlined, efficient, and overall, more profitable. An example of this can be seen in companies such as Microsoft and IBM, Mitsubishi and Siemens who have gained a stronger foothold in their respective markets by their efficient implementation of Industry 4.0. Before we can address how small start-up companies can begin to compete with these behemoths, we must address the question; what …


High-Temperature Valve Design For A Solid Oxide Fuel Cell/Gas Turbine Hybrid System Utilizing Smart Materials, Alba Jazmin Leyva Dec 2022

High-Temperature Valve Design For A Solid Oxide Fuel Cell/Gas Turbine Hybrid System Utilizing Smart Materials, Alba Jazmin Leyva

Open Access Theses & Dissertations

The topic of this project includes extensive research on the Solid Oxide Fuel Cell Gas Turbine (SOFC/GT) hybrid system located at the National Energy Technology Laboratory. The goal is to reduce pollution and generate energy by using natural gas and a combination of fuel cells, heat exchangers, bypass valves, turbines, and combustors as components working together to produce clean energy. The SOFC/GT system works by having the fuel cell pressurized by the gas turbine. The turbine then produces exhaust gas for the fuel cell, because the turbine recovers the majority of the heat and the pressurization contributes to the enhancement …


Security Analysis And Implementation Of Dnp3 Multilayer Protocol For Secure And Safe Communication In Scada Systems, Isaac Monroy Dec 2022

Security Analysis And Implementation Of Dnp3 Multilayer Protocol For Secure And Safe Communication In Scada Systems, Isaac Monroy

Open Access Theses & Dissertations

When SCADA systems were first introduced into society, a lot of manpower was required for monitoring and controlling devices within critical infrastructures. With the increasing demand for services and growing systems, a need arose to automate the monitoring and controlling tasks. This led to introduction of networks into SCADA systems to enhance monitoring and control capabilities, that can scale with system size and requirements. But this introduction of network layer along with its advantages, also introduced a new threat surface which exposed multiple vulnerabilities within the system that can exploited to launch attacks, that led to the integration of security …


Continuous Field Sensor Authentication And Process Integrity Assurance Mechanisms In Critical National Infrastructures, Abel Osvaldo Gomez Rivera Aug 2022

Continuous Field Sensor Authentication And Process Integrity Assurance Mechanisms In Critical National Infrastructures, Abel Osvaldo Gomez Rivera

Open Access Theses & Dissertations

The growing modernization of traditional Industrial Cyber-Physical Systems (ICPSs) has increased the probability and effectiveness of cyber attacks by integrating modern communication technologies that expose security vulnerabilities like lack of access control policies to adversaries. The exponential growth of cyber attacks has caught the attention of stakeholders that have proposed cybersecurity initiatives to protect ICPSs. ICPSs are part of the Critical National Infrastructures (CNIs) supporting the society's sustainability and national security. The cybersecurity initiatives aiming to address cyber attacks proposed by stakeholders must continuously authenticate constrained devices. Operational thresholds and process integrity assurance must also be maintained. A centralized ICPS …


Game-Theoretic Deception Modeling For Distracting Network Adversarie, Mohammad Sujan Miah May 2022

Game-Theoretic Deception Modeling For Distracting Network Adversarie, Mohammad Sujan Miah

Open Access Theses & Dissertations

In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identifying network vulnerabilities and work out various targets to attack where deception is becoming an increasingly crucial technique for the defenders to delay these attacks. For securing computer networks, the defenders use various deceptive decoy objects to detect, confuse, and distract attackers. By trapping the attackers, these decoys gather information, waste their time and resources, and potentially prevent future attacks. However, we have to consider that an attacker with the help of smart techniques may detect the decoys and avoid them. One of the well-known …