Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Engineering, Computer Science and Engineering (5)
- #antcenter (2)
- Industrial control systems (2)
- 3D (1)
- 3D Reconstruction (1)
-
- Absolute Position (1)
- Amino Acid (1)
- Behavior-based target tracking (1)
- Blind Change Point Detection (1)
- Cahe (1)
- Cave Mapping (1)
- Cone beam CT (1)
- Convolutional Neural Networks (1)
- Cyber Physical Systems (1)
- Cyber Security (1)
- Cyber defense training (1)
- Cyber incident response (1)
- Cyber security (1)
- Cyber threat (1)
- Cyber threat intelligence (1)
- Cyber training environments (1)
- DRMS (1)
- Deep Neural Network (1)
- Deep learning (1)
- Distributed geographic index (1)
- Engineering, Computer Engineering, Physical Sciences and Mathematics, Computer Sciences (1)
- Enhancing Security (1)
- Facial Action (1)
- Far infrared camera (1)
- File provenance (1)
Articles 1 - 26 of 26
Full-Text Articles in Engineering
Windows Server 2012, Fisnik Gojani
Windows Server 2012, Fisnik Gojani
Theses and Dissertations
Windows Server 2012 R2 ka mbi 300 funksione të reja dhe është sistemi i parë i Microsoft Server që ka lidhje me cloud.
Windows Server 2012 paraqet një bollëk të veçorive të reja për të adresuar nevojat e evolucionit të një infrastrukture moderne IT dhe fuqisë punëtore. Bërthama e kësaj përvoje është nevoja për të shkallëzuar, virtualizuar dhe zhvendosur ngarkesat e punës, aplikacionet dhe shërbimet për cloud. Windows Server 2012 përfshin një përvojë te ndërtimit, administrimit dhe funksionimit të cloud private dhe publike, të gjitha të bazuara në Windows Server.
Windows Server 2012 siguron sigurinë e të dhënave të gjeneratës …
Managed Containers For Increased Cyber-Resilience, Xavier J. Merino Aguilera
Managed Containers For Increased Cyber-Resilience, Xavier J. Merino Aguilera
Theses and Dissertations
Traditional defense mechanisms are no longer adequate in protecting critical infrastructure and mission critical systems. These systems require to be always-on-always-connected. High availability and data integrity become crucial to deliver their mission. Unable to guarantee uncompromisable security and given that systems will inevitably be attacked, we must change our goals to guarantee mission survivability, the ability of the system to fight through the attack. Previous work has been done to increase availability and integrity using virtual machines. We move away from virtual machines towards Linux containers and implement resiliency strategies to guarantee stateful system recovery after an attack. The goal …
A Location-Aware Middleware Framework For Collaborative Visual Information Discovery And Retrieval, Andrew J.M. Compton
A Location-Aware Middleware Framework For Collaborative Visual Information Discovery And Retrieval, Andrew J.M. Compton
Theses and Dissertations
This work addresses the problem of scalable location-aware distributed indexing to enable the leveraging of collaborative effort for the construction and maintenance of world-scale visual maps and models which could support numerous activities including navigation, visual localization, persistent surveillance, structure from motion, and hazard or disaster detection. Current distributed approaches to mapping and modeling fail to incorporate global geospatial addressing and are limited in their functionality to customize search. Our solution is a peer-to-peer middleware framework based on XOR distance routing which employs a Hilbert Space curve addressing scheme in a novel distributed geographic index. This allows for a universal …
The Impact Of Different Propagation Environments On The Performance Of Wireless Sensor Networks, Abdallah Mubark Aldosary
The Impact Of Different Propagation Environments On The Performance Of Wireless Sensor Networks, Abdallah Mubark Aldosary
Theses and Dissertations
This dissertation presents a methodology for evaluating the performance of wireless sensor network (WSN) protocols in different propagation environments. To create this methodology, practical RF propagation models that include many of the substantial features of different propagation environments are utilized, and radio energy models for different propagation environments are developed. Accurate environment-specific radio frequency (RF) propagation models should be utilized in order to improve the overall process of decision-making during pre-deployment of WSNs, to facilitate the deployment of the WSN, and to enhance the battery efficiency of sensing nodes so that the network lifetime can be prolonged. The investigating of …
Optimization Framework For Deployment Of Wireless Sensor Networks, Tajudeen Olawale Olasupo
Optimization Framework For Deployment Of Wireless Sensor Networks, Tajudeen Olawale Olasupo
Theses and Dissertations
In order to tackle the problem of network connectivity and sensing coverage in random placement of sensor nodes over an area of interest, this research presents an optimization and visualization framework for characterization and prediction of optimal deployments of large-scale wireless sensor networks (WSNs). This study presents efficient image processing algorithms for classification of deployment terrain in order to optimize deployment and connectivity coverage with required minimum number of nodes and transmission power. It reports formation of efficient models for WSN signal propagation under different terrain conditions. The study describes the developmental approach of the WSN optimization framework and visualization …
Repeatability Of Reference Signal Received Power Measurements In Lte Networks, Hayder A Abdulrasool Khzaali
Repeatability Of Reference Signal Received Power Measurements In Lte Networks, Hayder A Abdulrasool Khzaali
Theses and Dissertations
No abstract provided.
Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin
Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin
Theses and Dissertations
Defending critical infrastructure assets is an important but extremely difficult and expensive task. Historically, decoys have been used very effectively to distract attackers and in some cases convince an attacker to reveal their attack strategy. Several researchers have proposed the use of honeypots to protect programmable logic controllers, specifically those used to support critical infrastructure. However, most of these honeypot designs are static systems that wait for a would-be attacker. To be effective, honeypot decoys need to be as realistic as possible. This paper introduces a proof-of-concept honeypot network traffic generator that mimics genuine control systems. Experiments are conducted using …
Development Of The Architecture Cost Effectiveness Framework And Application To Open Systems Architectures, Donald A. Barrett
Development Of The Architecture Cost Effectiveness Framework And Application To Open Systems Architectures, Donald A. Barrett
Theses and Dissertations
The Modular Open System Approach (MOSA) is an initiative to, among other things, reduce cost and schedule for acquisitions programs. While programs have experienced savings using MOSA, the majority of programs have not, in part due to a lack of a logical method for evaluating architecture alternatives. This research develops the Architecture Cost Effectiveness Framework (ACEF), which combines multi-attribute utility analysis with cost effectiveness analysis throughout the program lifecycle. Step 1 is the establishment of a business strategy that includes an Attribute Hierarchy of selected operational requirements. The business strategy also defines Lifecycle Utility Reference Profiles (LURPs) that document changing …
A Framework For Categorization Of Industrial Control System Cyber Training Environments, Evan G. Plumley
A Framework For Categorization Of Industrial Control System Cyber Training Environments, Evan G. Plumley
Theses and Dissertations
First responders and professionals in hazardous occupations undergo training and evaluations for the purpose of mitigating risk and damage. For example, helicopter pilots train with multiple categorized simulations that increase in complexity before flying a real aircraft. However in the industrial control cyber incident response domain, where incident response professionals help detect, respond and recover from cyber incidents, no official categorization of training environments exist. To address this gap, this thesis provides a categorization of industrial control training environments based on realism. Four levels of environments are proposed and mapped to Blooms Taxonomy. This categorization will help organizations determine which …
Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good
Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good
Theses and Dissertations
A file's provenance is a detailing of its origins and activities. There are tools available that are useful in maintaining the provenance of a file. Unfortunately for digital forensics, these tools require prior installation on the computer of interest while provenance generating events happen. The presented tool addresses this by reconstructing a file's provenance from several temporal artifacts. It identifies relevant temporal and user correlations between these artifacts, and presents them to the user. A variety of predefined use cases and real world data are tested against to demonstrate that this software allows examiners to draw useful conclusions about the …
Active Response Using Host-Based Intrusion Detection System And Software-Defined Networking, Jonathon S. Goodgion
Active Response Using Host-Based Intrusion Detection System And Software-Defined Networking, Jonathon S. Goodgion
Theses and Dissertations
This research proposes AHNSR: Active Host-based Network Security Response by utilizing Host-based Intrusion Detection Systems (HIDS) with Software-Defined Networking (SDN) to enhance system security by allowing dynamic active response and reconstruction from a global network topology perspective. Responses include traffic redirection, host quarantining, filtering, and more. A testable SDN-controlled network is constructed with multiple hosts, OpenFlow enabled switches, and a Floodlight controller, all linked to a custom, novel interface for the Open-Source SECurity (OSSEC) HIDS framework. OSSEC is implemented in a server-agent architecture, allowing scalability and OS independence. System effectiveness is evaluated against the following factors: alert density and a …
Small Fixed-Wing Aerial Positioning Using Inter-Vehicle Ranging Combined With Visual Odometry, Benjamin M. Fain
Small Fixed-Wing Aerial Positioning Using Inter-Vehicle Ranging Combined With Visual Odometry, Benjamin M. Fain
Theses and Dissertations
There has been increasing interest in developing the ability for small unmanned aerial systems (SUAS) to be able to operate in environments where GPS is not available. This research considers the case of a larger aircraft loitering above a smaller GPS-denied SUAS. This larger aircraft is assumed to have greater resources which can overcome the GPS jamming and provide range information to the SUAS flying a mission below. This research demonstrates that using a ranging update combined with an aircraft motion model and visual odometry can greatly improve the accuracy of a SUASs estimated position in a GPS-denied environment.
Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga
Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga
Theses and Dissertations
A cybersecurity initiative known as cyber threat intelligence (CTI) has recently been developed and deployed. The overall goal of this new technology is to help protect network infrastructures. Threat intelligence platforms (TIPs) have also been created to help facilitate CTI effectiveness within organizations. There are many benefits that both can achieve within the information technology (IT) sector. The industrial control system (ICS) sector can also benefit from these technologies as most ICS networks are connected to IT networks. CTI and TIPs become resourceful when using indicators of compromise (IOCs) from known ICS malware attacks and an open source intrusion detection …
A Framework For Understanding, Prioritizing, And Applying Systems Security Engineering Processes, Activities, And Tasks, Stephen Khou
A Framework For Understanding, Prioritizing, And Applying Systems Security Engineering Processes, Activities, And Tasks, Stephen Khou
Theses and Dissertations
Current systems security practices lack an effective approach to prioritize and tailor systems security efforts to develop and field secure systems in challenging operational environments, which results in business and mission stakeholders becoming more susceptible to an array of disruptive events. This work informs Systems Engineers on recent developments in the field of system security engineering and provides a framework for more fully understanding the application of Systems Security Engineering (SSE) processes, activities, and tasks as described in the recently released National Institute of Standards and Technology (NIST) Special Publication 800-160. This SSE framework uniquely offers a repeatable and tailorable …
Mobile Application For Shipping Goods For Individuals And Truckers In India, Sendurr Selvaraj
Mobile Application For Shipping Goods For Individuals And Truckers In India, Sendurr Selvaraj
Theses and Dissertations
India is a vast country with majority of its cities and towns connected through roads. Road transportation contributes to 86% share of the freight transport of the country with trucking companies dominating the entire space. With growing economy and demands raising, the quality of service of the trucking company remains poor. The major reasons are unorganized practice and lack of transparency. Moreover, limited access for customers to reach out to truckers to transport their goods.
This thesis aims to create a platform for customers and truckers to realize their needs with a help of a mobile application. Customers can search …
Omni-Directional Infrared 3d Reconstruction And Tracking Of Human Targets, Emrah Benli
Omni-Directional Infrared 3d Reconstruction And Tracking Of Human Targets, Emrah Benli
Theses and Dissertations
Omni-directional (O-D) infrared (IR) vision is an effective capability for mobile systems in robotics, due to its advantages: illumination invariance, wide field-of-view, ease of identifying heat-emitting objects, and long term tracking without interruption. Unfortunately, O-D IR sensors have low resolution, low frame rates, high cost, sensor noise, and an increase in tracking time. In order to overcome these disadvantages, we propose an autonomous system application in indoor scenarios including 1) Dynamic 3D Reconstruction (D3DR) of the target view in real time images, 2) Human Behavior-based Target Tracking from O-D thermal images, 3) Thermal Multisensor Fusion (TMF), and 4) Visual Perception …
Underwater Cave Mapping And Reconstruction Using Stereo Vision, Nicholas Weidner
Underwater Cave Mapping And Reconstruction Using Stereo Vision, Nicholas Weidner
Theses and Dissertations
This work presents a systematic approach for 3-D mapping and reconstruction of underwater caves. Exploration of underwater caves is very important for furthering our understanding of hydrogeology, managing efficiently water resources, and advancing our knowledge in marine archaeology. Underwater cave exploration by human divers however, is a tedious, labor intensive, extremely dangerous operation, and requires highly skilled people. As such, it is an excellent fit for robotic technology. The proposed solution employs a stereo camera and a video-light. The approach utilizes the intersection of the cone of video-light with the cave boundaries resulting in the construction of a wire frame …
A Machine Learning Approach For Enhancing Security And Quality Of Service Of Optical Burst Switching Networks, Adel Dabash A. Rajab
A Machine Learning Approach For Enhancing Security And Quality Of Service Of Optical Burst Switching Networks, Adel Dabash A. Rajab
Theses and Dissertations
The Optical Bust Switching (OBS) network has become one of the most promising switching technologies for building the next-generation of internet backbone infrastructure. However, OBS networks still face a number of security and Quality of Service (QoS) challenges, particularly from Burst Header Packet (BHP) flooding attacks. In OBS, a core switch handles requests, reserving one of the unoccupied channels for incoming data bursts (DB) through BHP. An attacker can exploit this fact and send malicious BHP without the corresponding DB. If unresolved, threats such as BHP flooding attacks can result in low bandwidth utilization, limited network performance, high burst loss …
Towards Design And Analysis For High-Performance And Reliable Ssds, Qianbin Xia
Towards Design And Analysis For High-Performance And Reliable Ssds, Qianbin Xia
Theses and Dissertations
NAND Flash-based Solid State Disks have many attractive technical merits, such as low power consumption, light weight, shock resistance, sustainability of hotter operation regimes, and extraordinarily high performance for random read access, which makes SSDs immensely popular and be widely employed in different types of environments including portable devices, personal computers, large data centers, and distributed data systems.
However, current SSDs still suffer from several critical inherent limitations, such as the inability of in-place-update, asymmetric read and write performance, slow garbage collection processes, limited endurance, and degraded write performance with the adoption of MLC and TLC techniques. To alleviate these …
Improving The Performance And Time-Predictability Of Gpus, Yijie Huangfu
Improving The Performance And Time-Predictability Of Gpus, Yijie Huangfu
Theses and Dissertations
Graphic Processing Units (GPUs) are originally mainly designed to accelerate graphic applications. Now the capability of GPUs to accelerate applications that can be parallelized into a massive number of threads makes GPUs the ideal accelerator for boosting the performance of such kind of general-purpose applications. Meanwhile it is also very promising to apply GPUs to embedded and real-time applications as well, where high throughput and intensive computation are also needed.
However, due to the different architecture and programming model of GPUs, how to fully utilize the advanced architectural features of GPUs to boost the performance and how to analyze the …
Respiratory Prediction And Image Quality Improvement Of 4d Cone Beam Ct And Mri For Lung Tumor Treatments, Seonyeong Park
Respiratory Prediction And Image Quality Improvement Of 4d Cone Beam Ct And Mri For Lung Tumor Treatments, Seonyeong Park
Theses and Dissertations
Identification of accurate tumor location and shape is highly important in lung cancer radiotherapy, to improve the treatment quality by reducing dose delivery errors. Because a lung tumor moves with the patient's respiration, breathing motion should be correctly analyzed and predicted during the treatment for prevention of tumor miss or undesirable treatment toxicity. Besides, in Image-Guided Radiation Therapy (IGRT), the tumor motion causes difficulties not only in delivering accurate dose, but also in assuring superior quality of imaging techniques such as four-dimensional (4D) Cone Beam Computed Tomography (CBCT) and 4D Magnetic Resonance Imaging (MRI). Specifically, 4D CBCT used in CBCT …
A Hierarchical Architectural Framework For Securing Unmanned Aerial Systems, Matthew Leccadito
A Hierarchical Architectural Framework For Securing Unmanned Aerial Systems, Matthew Leccadito
Theses and Dissertations
Unmanned Aerial Systems (UAS) are becoming more widely used in the new era of evolving technology; increasing performance while decreasing size, weight, and cost. A UAS equipped with a Flight Control System (FCS) that can be used to fly semi- or fully-autonomous is a prime example of a Cyber Physical and Safety Critical system. Current Cyber-Physical defenses against malicious attacks are structured around security standards for best practices involving the development of protocols and the digital software implementation. Thus far, few attempts have been made to embed security into the architecture of the system considering security as a holistic problem. …
Improving Facial Action Unit Recognition Using Convolutional Neural Networks, Shizhong Han
Improving Facial Action Unit Recognition Using Convolutional Neural Networks, Shizhong Han
Theses and Dissertations
Recognizing facial action units (AUs) from spontaneous facial expression is a challenging problem, because of subtle facial appearance changes, free head movements, occlusions, and limited AU-coded training data. Most recently, convolutional neural networks (CNNs) have shown promise on facial AU recognition. However, CNNs are often overfitted and do not generalize well to unseen subject due to limited AU-coded training images. In order to improve the performance of facial AU recognition, we developed two novel CNN frameworks, by substituting the traditional decision layer and convolutional layer with the incremental boosting layer and adaptive convolutional layer respectively, to recognize the AUs from …
Improving Peptide Identification By Considering Ordered Amino Acid Usage, Ahmed Al-Qurri
Improving Peptide Identification By Considering Ordered Amino Acid Usage, Ahmed Al-Qurri
Theses and Dissertations
Proteomics has made major progress in recent years after the sequencing of the genomes of a substantial number of organisms. A typical method for identifying peptides uses a database of peptides identified using tandem mass spectrometry (MS/MS). The profile of accurate mass and elution time (AMT) for peptides that need to be identified will be compared with this database. Restricting the search to those peptides detectable by MS will reduce processing time and more importantly increase accuracy. In addition, there are significant impacts for clinical studies. Proteotypic peptides are those peptides in a protein sequence that are most likely to …
Investigate Genomic 3d Structure Using Deep Neural Network, Yan Zhang
Investigate Genomic 3d Structure Using Deep Neural Network, Yan Zhang
Theses and Dissertations
The 3D structures of the chromosomes play fundamental roles in essential cellular functions, e.g., gene regulation, gene expression, evolution and Hi-C technique provides the interaction density between loci on chromosomes. In this dissertation, we developed multiple algorithms, focusing the deep learning approach, to study the Hi-C datasets and the genomic 3D structures.
Building 3D structure of the genome one of the most critical purpose of the Hi-C technique. Recently, several approaches have been developed to reconstruct the 3D model of the chromosomes from HiC data. However, all of the methods are based on a particular mathematical model and lack of …
Blind Change Point Detection And Regime Segmentation Using Gaussian Process Regression, Sourav Das
Blind Change Point Detection And Regime Segmentation Using Gaussian Process Regression, Sourav Das
Theses and Dissertations
Time-series analysis is used heavily in modeling and forecasting weather, economics, medical data as well as in various other fields. Change point detection (CPD) means finding abrupt changes in the time-series when the statistical property of a certain part of it starts to differ. CPD has attracted a lot of attention in the artificial intelligence, machine learning and data mining communities. In this thesis, a novel CPD algorithm is introduced for segmenting multivariate time-series data. The proposed algorithm is a general pipeline to process any high dimensional multivariate time-series data using nonlinear non-parametric dynamic system. It consists of manifold learning …