Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

You Kind Of Have To Prove It: Gender Microaggressions Within The Lived Experiences Of Women In Engineering, Crystal Rose Diaz-Espinoza Dec 2015

You Kind Of Have To Prove It: Gender Microaggressions Within The Lived Experiences Of Women In Engineering, Crystal Rose Diaz-Espinoza

Doctoral Dissertations

This intrinsic case study explored the lived experiences of women within three engineering majors at a mid-sized institution in the Mid-Atlantic using gender microaggressions (Nadal, 2010; Sue, 2007) as a theoretical lens. Data included individual interviews with 28 participants as well as document review from Web pages and observations from physical spaces within the campus engineering building. Data analysis resulted in seven themes in congruence with Sue’s (2007) taxonomy of gender microaggressions and further established the three levels of gender microaggressions distinguished by Nadal (2010). Findings also revealed that barriers within engineering were less visible or outwardly sexist, and that …


Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev Jul 2015

Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev

Doctoral Dissertations

Industrial Control Systems (ICSs) are designed, implemented, and deployed in most major spheres of production, business, and entertainment. ICSs are commonly split into two subsystems - Programmable Logic Controllers (PLCs) and Supervisory Control And Data Acquisition (SCADA) systems - to achieve high safety, allow engineers to observe states of an ICS, and perform various configuration updates. Before wide adoption of the Internet, ICSs used "air-gap" security measures, where the ICS network was isolated from other networks, including the Internet, by a physical disconnect [1]. This level of security allowed ICS protocol designers to concentrate on the availability and safety of …