Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Accessibility (1)
- Brute force (1)
- Compiler (1)
- Cyber threat intelligence (1)
- Intermediate set (1)
-
- Internet of things (IoT) (1)
- Less-Java (1)
- MSP430 MCU (1)
- Machine learning (1)
- Mobile application (1)
- Mobility (1)
- Navigation (1)
- OSINT (1)
- Participatory design (1)
- RECKLESS (1)
- RECKLESS-Apps (1)
- Reverse engineer firmware (1)
- Route planning (1)
- Security (1)
- Shortest routes (1)
- Static analysis (1)
- Type inference (1)
- Wireless sensor networks (WSN) (1)
Articles 1 - 6 of 6
Full-Text Articles in Engineering
Redai: A Machine Learning Approach To Cyber Threat Intelligence, Luke Noel
Redai: A Machine Learning Approach To Cyber Threat Intelligence, Luke Noel
Masters Theses, 2020-current
The world is continually demanding more effective and intelligent solutions and strategies to combat adversary groups across the cyber defense landscape. Cyber Threat Intelligence (CTI) is a field within the domain of cyber security that allows for organizations to utilize threat intelligence and serves as a tool for organizations to proactively harden their defense posture. However, there is a large volume of CTI and it is often a daunting task for organizations to effectively consume, utilize, and apply it to their defense strategies. In this thesis we develop a machine learning solution, named RedAI, to investigate whether open-source intelligence (OSINT) …
Less-Java, More Type Safety: Type Inference And Static Analysis In Less-Java, Charles D. Hines
Less-Java, More Type Safety: Type Inference And Static Analysis In Less-Java, Charles D. Hines
Senior Honors Projects, 2020-current
Less-Java is an object-oriented programming language whose primary goal is to help new programmers learn programming. Some of the features of Less-Java that might make it better for beginners are static typing, implicit typing, low verbosity, and built-in support for unit testing. The primary focus of this project is on improving type inference (especially with regards to object-oriented programming) and adding static analysis in the Less-Java compiler.
Campuspartner: An Assistive Technology For Pedestrians With Mobility Impairments, Cynthia R. Zastudil
Campuspartner: An Assistive Technology For Pedestrians With Mobility Impairments, Cynthia R. Zastudil
Senior Honors Projects, 2020-current
Route-planning applications such as Google Maps and Apple Maps are used by millions of people each month. However, these mapping applications are optimized for vehicle navigation, and although they provide pedestrian routing, the route customization options aren’t sufficient for pedestrian users, especially those with mobility impairments. CampusPartner is an assistive mobile application that was designed with the purpose of supporting people with mobility impairments in planning and previewing their walking routes. By viewing routes in advance, users can see an overview and detailed information about them as well as turn-by-turn instructions. CampusPartner integrates existing services, GraphHopper, OpenStreetMap, and Mapbox, to …
Security Attacks On Reckless-Apps: "Remote Car Keyless Applications" For New Semi Autonomous Vehicles, Mohamed El-Tawab
Security Attacks On Reckless-Apps: "Remote Car Keyless Applications" For New Semi Autonomous Vehicles, Mohamed El-Tawab
Masters Theses, 2010-2019
Rapid technological advancements of vehicle manufacturing and the modern wireless technology opens the door for several new Intelligent Transportation applications. Remote Keyless system in vehicles is considered one of the famous applications that has been developed recently, which is susceptible to many cyberattacks. Remote Keyless applications on smartphones were developed in the past few years to perform the functionality of keyless fob and are expected to replace the physical keyless fobs in the next few years, which can open the door to many cyberattacks. In this research, we implemented a simulation that represents the REmote Car KeyLESS Applications (RECKLESS-apps) on …
A Comparison Of Algorithms And Heuristics For Solving The O 1 I N D 1 Shortest Route Problems, Steven D. Young
A Comparison Of Algorithms And Heuristics For Solving The O 1 I N D 1 Shortest Route Problems, Steven D. Young
Senior Honors Projects, 2010-2019
Shortest-path problems have seen a huge amount of study over the course of the last 50 years. Not surprisingly, this means the original problem of finding the shortest path from some starting location to some destination location has been thoroughly studied. However a large number of slight variations on the original problem still have yet to be thoroughly examined. In this paper we examine one of those variations, namely the problem of determining the optimal route from some source location to some destination location such that at least one location in an intermediate set is included in the route. Three …
Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava
Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava
Masters Theses, 2010-2019
With the rapid technological advancements of sensors, Wireless Sensor Networks (WSNs) have become the main technology for the Internet of Things (IoT). We investigated the security of WSNs in an environmental monitoring system with the goal to improve the overall security. We implemented a Secure Temperature Monitoring System (STMS), which served as our investigational environment. Our results revealed a security flaw found in the bootstrap loader (BSL) password used to protect firmware in the MSP430 MCU chips. We demonstrated how the BSL password could be brute forced in a matter of days. Furthermore, we illustrate how an attacker can reverse …