Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Engineering

Redai: A Machine Learning Approach To Cyber Threat Intelligence, Luke Noel May 2021

Redai: A Machine Learning Approach To Cyber Threat Intelligence, Luke Noel

Masters Theses, 2020-current

The world is continually demanding more effective and intelligent solutions and strategies to combat adversary groups across the cyber defense landscape. Cyber Threat Intelligence (CTI) is a field within the domain of cyber security that allows for organizations to utilize threat intelligence and serves as a tool for organizations to proactively harden their defense posture. However, there is a large volume of CTI and it is often a daunting task for organizations to effectively consume, utilize, and apply it to their defense strategies. In this thesis we develop a machine learning solution, named RedAI, to investigate whether open-source intelligence (OSINT) …


Less-Java, More Type Safety: Type Inference And Static Analysis In Less-Java, Charles D. Hines May 2020

Less-Java, More Type Safety: Type Inference And Static Analysis In Less-Java, Charles D. Hines

Senior Honors Projects, 2020-current

Less-Java is an object-oriented programming language whose primary goal is to help new programmers learn programming. Some of the features of Less-Java that might make it better for beginners are static typing, implicit typing, low verbosity, and built-in support for unit testing. The primary focus of this project is on improving type inference (especially with regards to object-oriented programming) and adding static analysis in the Less-Java compiler.


Campuspartner: An Assistive Technology For Pedestrians With Mobility Impairments, Cynthia R. Zastudil May 2020

Campuspartner: An Assistive Technology For Pedestrians With Mobility Impairments, Cynthia R. Zastudil

Senior Honors Projects, 2020-current

Route-planning applications such as Google Maps and Apple Maps are used by millions of people each month. However, these mapping applications are optimized for vehicle navigation, and although they provide pedestrian routing, the route customization options aren’t sufficient for pedestrian users, especially those with mobility impairments. CampusPartner is an assistive mobile application that was designed with the purpose of supporting people with mobility impairments in planning and previewing their walking routes. By viewing routes in advance, users can see an overview and detailed information about them as well as turn-by-turn instructions. CampusPartner integrates existing services, GraphHopper, OpenStreetMap, and Mapbox, to …


Security Attacks On Reckless-Apps: "Remote Car Keyless Applications" For New Semi Autonomous Vehicles, Mohamed El-Tawab May 2018

Security Attacks On Reckless-Apps: "Remote Car Keyless Applications" For New Semi Autonomous Vehicles, Mohamed El-Tawab

Masters Theses, 2010-2019

Rapid technological advancements of vehicle manufacturing and the modern wireless technology opens the door for several new Intelligent Transportation applications. Remote Keyless system in vehicles is considered one of the famous applications that has been developed recently, which is susceptible to many cyberattacks. Remote Keyless applications on smartphones were developed in the past few years to perform the functionality of keyless fob and are expected to replace the physical keyless fobs in the next few years, which can open the door to many cyberattacks. In this research, we implemented a simulation that represents the REmote Car KeyLESS Applications (RECKLESS-apps) on …


A Comparison Of Algorithms And Heuristics For Solving The O 1 I N D 1 Shortest Route Problems, Steven D. Young May 2016

A Comparison Of Algorithms And Heuristics For Solving The O 1 I N D 1 Shortest Route Problems, Steven D. Young

Senior Honors Projects, 2010-2019

Shortest-path problems have seen a huge amount of study over the course of the last 50 years. Not surprisingly, this means the original problem of finding the shortest path from some starting location to some destination location has been thoroughly studied. However a large number of slight variations on the original problem still have yet to be thoroughly examined. In this paper we examine one of those variations, namely the problem of determining the optimal route from some source location to some destination location such that at least one location in an intermediate set is included in the route. Three …


Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava May 2016

Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava

Masters Theses, 2010-2019

With the rapid technological advancements of sensors, Wireless Sensor Networks (WSNs) have become the main technology for the Internet of Things (IoT). We investigated the security of WSNs in an environmental monitoring system with the goal to improve the overall security. We implemented a Secure Temperature Monitoring System (STMS), which served as our investigational environment. Our results revealed a security flaw found in the bootstrap loader (BSL) password used to protect firmware in the MSP430 MCU chips. We demonstrated how the BSL password could be brute forced in a matter of days. Furthermore, we illustrate how an attacker can reverse …