Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Modeling Damage Spread, Assessment, And Recovery Of Critical Systems, Justin Burns May 2022

Modeling Damage Spread, Assessment, And Recovery Of Critical Systems, Justin Burns

Graduate Theses and Dissertations

Critical infrastructure systems have recently become more vulnerable to attacks on their data systems through internet connectivity. If an attacker is successful in breaching a system’s defenses, it is imperative that operations are restored to the system as quickly as possible. This thesis focuses on damage assessment and recovery following an attack. A literature review is first conducted on work done in both database protection and critical infrastructure protection, then the thesis defines how damage affects the relationships between data and software. Then, the thesis proposes a model using a graph construction to show the cascading affects within a system …


Development Of A Reference Design For Intrusion Detection Using Neural Networks For A Smart Inverter, Ammar Mohammad Khan Jan 2021

Development Of A Reference Design For Intrusion Detection Using Neural Networks For A Smart Inverter, Ammar Mohammad Khan

Graduate Theses and Dissertations

The purpose of this thesis is to develop a reference design for a base level implementation of an intrusion detection module using artificial neural networks that is deployed onto an inverter and runs on live data for cybersecurity purposes, leveraging the latest deep learning algorithms and tools. Cybersecurity in the smart grid industry focuses on maintaining optimal standards of security in the system and a key component of this is being able to detect cyberattacks. Although researchers and engineers aim to design such devices with embedded security, attacks can and do still occur. The foundation for eventually mitigating these attacks …


Evaluation Of Tracking Regimes For, And Security Of, Pli Systems, Shayan Taheri May 2015

Evaluation Of Tracking Regimes For, And Security Of, Pli Systems, Shayan Taheri

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

In recent years, the researchers and engineers have realized that the trustiness of computer and networking devices and hardware can no longer be examined properly using the existing identification and security checking methods that operate based on the digital representation of data. As an example, since the digital identifiers can be copied, it is difficult to tie a digital identity to a device for sure. Also, the new or present created cyber attacks can manipulate the used digital data in a network easily. Due to these issues, the trend in development of new identification and security checking methods has moved …