Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Engineering

On The Feasibility Of Profiling, Forecasting And Authenticating Internet Usage Based On Privacy Preserving Netflow Logs, Soheil Sarmadi Nov 2018

On The Feasibility Of Profiling, Forecasting And Authenticating Internet Usage Based On Privacy Preserving Netflow Logs, Soheil Sarmadi

USF Tampa Graduate Theses and Dissertations

Understanding Internet user behavior and Internet usage patterns is fundamental in developing future access networks and services that meet technical as well as Internet user needs. User behavior is routinely studied and measured, but with different methods depending on the research discipline of the investigator, and these disciplines rarely cross. We tackle this challenge by developing frameworks that the Internet usage statistics used as the main features in understanding Internet user behaviors, with the purpose of finding a complete picture of the user behavior and working towards a unified analysis methodology. In this dissertation we collected Internet usage statistics via …


Gate Level Probabilistic Simulation Based Hardware Trojan Susceptibility Analysis Of Combinational Circuits, Venkata Lakshmi Bhargavi Gurram Oct 2018

Gate Level Probabilistic Simulation Based Hardware Trojan Susceptibility Analysis Of Combinational Circuits, Venkata Lakshmi Bhargavi Gurram

USF Tampa Graduate Theses and Dissertations

Today multi-million gate integrated circuits are being commonly used in many critical (eg., health care) and sensitive (eg., military) applications. Therefore, they are susceptible to malicious modifications, namely, Hardware Trojans (HTs), with the intent of leaking sensitive information, denial-of-service etc. There are many ways of inserting Hardware Trojans in ICs. Thus, HT detection and mitigation are very important tasks. In this thesis, we propose a novel probabilistic simulation based approach to estimate the susceptibility of a combinational circuit to a HT. One of the common ways is to simulate the netlist with typical input sequences and identifying low activity nets …


Understanding Transit System Performance Using Avl-Apc Data: An Analytics Platform With Case Studies For The Pittsburgh Region, Xidong Pi, Mark Egge, Jackson Whitmore, Amy Silbermann, Zhen Sean Qian Jul 2018

Understanding Transit System Performance Using Avl-Apc Data: An Analytics Platform With Case Studies For The Pittsburgh Region, Xidong Pi, Mark Egge, Jackson Whitmore, Amy Silbermann, Zhen Sean Qian

Journal of Public Transportation

This paper introduces a novel transit data analytics platform for public transit planning, assessing service quality and revealing service problems in high spatiotemporal resolution for public transit systems based on Automatic Passenger Counting (APC) and Automatic Vehicle Location (AVL) technologies. The platform offers a systematic way for users and decision makers to understand system performance from many aspects of service quality, including passenger waiting time, stop-skipping frequency, bus bunching level, bus travel time, on-time performance, and bus fullness. The AVL-APC data from September 2012 to March 2016 were archived in a database to support the development of a user-friendly web …


Channel Camouflage And Manipulation Techniques In Wireless Networks, Song Fang Jun 2018

Channel Camouflage And Manipulation Techniques In Wireless Networks, Song Fang

USF Tampa Graduate Theses and Dissertations

The security of wireless networks and systems is becoming increasingly important as wireless devices are more and more ubiquitous nowadays. The wireless channel exhibits the spatial uncorrelation property, which is that the characteristics of a wireless channel become uncorrelated every half carrier wavelength over distance. This property has prompted an emerging research area that utilizes wireless channel characteristics to achieve location distinction, to detect location changes or facilitate authentication of wireless users, and to establish shared secret key between legitimate communicators. This dissertation includes two work toward the security improvement of existing wireless networks and systems. With the discovered channel …


Sr Flip-Flop Based Physically Unclonable Function (Puf) For Hardware Security, Rohith Prasad Challa Jun 2018

Sr Flip-Flop Based Physically Unclonable Function (Puf) For Hardware Security, Rohith Prasad Challa

USF Tampa Graduate Theses and Dissertations

Physically Unclonable Functions (PUFs) are now widely being used to uniquely identify Integrated Circuits (ICs). In this work, we propose a novel Set-Reset (SR) Flip-flop based PUF design. For a NAND gate based SR flip-flop, the input condition S (Set) = 1 and R (Reset) = 1 must be avoided as it is an inconsistent condition. When S=R=1 is applied followed by S=R=0, then the outputs Q and Q' undergo race condition and depending on the delays of the NAND gates in the feedback path, the output Q can settle at either 0 or 1. Because of process variations in …


Emerging Non-Volatile Memory Technologies For Computing And Security, Rekha Govindaraj May 2018

Emerging Non-Volatile Memory Technologies For Computing And Security, Rekha Govindaraj

USF Tampa Graduate Theses and Dissertations

With CMOS technology scaling reaching its limitations rigorous research of alternate and competent technologies is paramount to push the boundaries of computing. Spintronic and resistive memories have proven to be effective alternatives in terms of area, power and performance to CMOS because of their non-volatility, ability for logic computing and easy integration with CMOS. However, deeper investigations to understand their physical phenomenon and improve their properties such as writability, stability, reliability, endurance, uniformity with minimal device-device variations is necessary for deployment as memories in commercial applications. Application of these technologies beyond memory and logic are investigated in this thesis i.e. …


Multi-Objective Resource Provisioning In Network Function Virtualization Infrastructures, Diogo Oliveira Apr 2018

Multi-Objective Resource Provisioning In Network Function Virtualization Infrastructures, Diogo Oliveira

USF Tampa Graduate Theses and Dissertations

Network function virtualization (NFV) and software-dened networking (SDN) are two recent networking paradigms that strive to increase manageability, scalability, pro- grammability and dynamism. The former decouples network functions and hosting devices, while the latter decouples the data and control planes. As more and more service providers adopt these new paradigms, there is a growing need to address multi-failure conditions, particularly those arising from large-scale disaster events. Overall, addressing the virtual network function (VNF) placement and routing problem is crucial to deploy NFV surviv- ability. In particular, many studies have inspected non-survivable VNF provisioning, however no known work have proposed survivable/resilient …