Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 802.11s (1)
- Airtime (1)
- Authentication (1)
- Cloud Computing (1)
- DNA Sequencing (1)
-
- Deep Learning (1)
- Drone-assisted Networks (1)
- FANET (1)
- Friis Propagation Loss Model (1)
- Genomics (1)
- HWMP (1)
- Hilbert Curve (1)
- Homomorphic Encryption (1)
- Image Analysis (1)
- IoT (1)
- Itu-R1411 Propagation Loss Model (1)
- Link Quality Metric (1)
- Link flooding attack (1)
- MANET (1)
- MapReduce (1)
- Mesh Congestion Control (1)
- Metagenomics (1)
- Microbiome (1)
- Moving target defense (1)
- NS-3 (1)
- Network Simulator (1)
- Network Throughput (1)
- Neural Networks (1)
- Privacy (1)
- Routing Metric (1)
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Mitigating Stealthy Link Flooding Ddos Attacks Using Sdn-Based Moving Target Defense, Abdullah Aydeger
Mitigating Stealthy Link Flooding Ddos Attacks Using Sdn-Based Moving Target Defense, Abdullah Aydeger
FIU Electronic Theses and Dissertations
With the increasing diversity and complication of Distributed Denial-of-Service (DDoS) attacks, it has become extremely challenging to design a fully protected network. For instance, recently, a new type of attack called Stealthy Link Flooding Attack (SLFA) has been shown to cause critical network disconnection problems, where the attacker targets the communication links in the surrounding area of a server. The existing defense mechanisms for this type of attack are based on the detection of some unusual traffic patterns; however, this might be too late as some severe damage might already be done. These mechanisms also do not consider countermeasures during …
Privacy-Aware Security Applications In The Era Of Internet Of Things, Abbas Acar
Privacy-Aware Security Applications In The Era Of Internet Of Things, Abbas Acar
FIU Electronic Theses and Dissertations
In this dissertation, we introduce several novel privacy-aware security applications. We split these contributions into three main categories: First, to strengthen the current authentication mechanisms, we designed two novel privacy-aware alternative complementary authentication mechanisms, Continuous Authentication (CA) and Multi-factor Authentication (MFA). Our first system is Wearable-assisted Continuous Authentication (WACA), where we used the sensor data collected from a wrist-worn device to authenticate users continuously. Then, we improved WACA by integrating a noise-tolerant template matching technique called NTT-Sec to make it privacy-aware as the collected data can be sensitive. We also designed a novel, lightweight, Privacy-aware Continuous Authentication (PACA) protocol. PACA …
Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes
Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes
FIU Electronic Theses and Dissertations
Metagenomics is the study of the combined genetic material found in microbiome samples, and it serves as an instrument for studying microbial communities, their biodiversities, and the relationships to their host environments. Creating, interpreting, and understanding microbial community profiles produced from microbiome samples is a challenging task as it requires large computational resources along with innovative techniques to process and analyze datasets that can contain terabytes of information.
The community profiles are critical because they provide information about what microorganisms are present in the sample, and in what proportions. This is particularly important as many human diseases and environmental disasters …
Customized Wireless Mesh Routing Metric For Swarm Of Drones Applications, Oscar G. Bautista Chia
Customized Wireless Mesh Routing Metric For Swarm Of Drones Applications, Oscar G. Bautista Chia
FIU Electronic Theses and Dissertations
With the proliferation of drones applications, there is an increasing need for handling their numerous challenges. One of such challenges arises when a swarm-of-drones is deployed to accomplish a specific task which requires coordination and communication. While this swarm-of-drones is essentially a special form of mobile ad hoc networks (MANETs) which has been studied for many years, there are still some unique requirements of drone applications that necessitates re-visiting MANET approaches. These challenges stem from 3-D environments the drones are deployed in, and their specific way of mobility which adds to the wireless link management challenges. In this thesis, we …