Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Engineering

Federated Agentless Detection Of Endpoints Using Behavioral And Characteristic Modeling, Hansaka Angel Dias Edirisinghe Kodituwakku Dec 2021

Federated Agentless Detection Of Endpoints Using Behavioral And Characteristic Modeling, Hansaka Angel Dias Edirisinghe Kodituwakku

Doctoral Dissertations

During the past two decades computer networks and security have evolved that, even though we use the same TCP/IP stack, network traffic behaviors and security needs have significantly changed. To secure modern computer networks, complete and accurate data must be gathered in a structured manner pertaining to the network and endpoint behavior. Security operations teams struggle to keep up with the ever-increasing number of devices and network attacks daily. Often the security aspect of networks gets managed reactively instead of providing proactive protection. Data collected at the backbone are becoming inadequate during security incidents. Incident response teams require data that …


Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li May 2021

Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li

Doctoral Dissertations

In recent years, deep neural networks (DNNs) are increasingly investigated in the literature to be employed in cyber-physical systems (CPSs). DNNs own inherent advantages in complex pattern identifying and achieve state-of-the-art performances in many important CPS applications. However, DNN-based systems usually require large datasets for model training, which introduces new data management issues. Meanwhile, research in the computer vision domain demonstrated that the DNNs are highly vulnerable to adversarial examples. Therefore, the security risks of employing DNNs in CPSs applications are of concern.

In this dissertation, we study the security of employing DNNs in CPSs from both the data domain …


Utility Scale Building Energy Modeling And Climate Impacts, Brett C. Bass May 2021

Utility Scale Building Energy Modeling And Climate Impacts, Brett C. Bass

Doctoral Dissertations

Energy consumption is steadily increasing year over year in the United States (US). Climate change and anthropogenically forced shifts in weather have a significant impact on energy use as well as the resilience of the built environment and the electric grid. With buildings accounting for about 40% of total energy use in the US, building energy modeling (BEM) at a large scale is critical. This work advances that effort in a number of ways. First, current BEM approaches, their ability to scale to large geographical areas, and global climate models are reviewed. Next, a methodology for large-scale BEM is illustrated, …


An Analysis Of Modern Password Manager Security And Usage On Desktop And Mobile Devices, Timothy Oesch May 2021

An Analysis Of Modern Password Manager Security And Usage On Desktop And Mobile Devices, Timothy Oesch

Doctoral Dissertations

Security experts recommend password managers to help users generate, store, and enter strong, unique passwords. Prior research confirms that managers do help users move towards these objectives, but it also identified usability and security issues that had the potential to leak user data or prevent users from making full use of their manager. In this dissertation, I set out to measure to what extent modern managers have addressed these security issues on both desktop and mobile environments. Additionally, I have interviewed individuals to understand their password management behavior.

I begin my analysis by conducting the first security evaluation of the …


A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner May 2021

A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner

Masters Theses

The advent of the Internet of Things has brought about a staggering level of inter-connectivity between common devices used every day. Unfortunately, security is not a high priority for developers designing these IoT devices. Often times the trade-off of security comes at too high of a cost in other areas, such as performance or power consumption. This is especially prevalent in resource-constrained devices, which make up a large number of IoT devices. However, a lack of security could lead to a cascade of security breaches rippling through connected devices. One of the most common attacks used by hackers is return …


Analysis Of Hardware Accelerated Deep Learning And The Effects Of Degradation On Performance, Samuel C. Leach May 2021

Analysis Of Hardware Accelerated Deep Learning And The Effects Of Degradation On Performance, Samuel C. Leach

Masters Theses

As convolutional neural networks become more prevalent in research and real world applications, the need for them to be faster and more robust will be a constant battle. This thesis investigates the effect of degradation being introduced to an image prior to object recognition with a convolutional neural network. As well as experimenting with methods to reduce the degradation and improve performance. Gaussian smoothing and additive Gaussian noise are both analyzed degradation models within this thesis and are reduced with Gaussian and Butterworth masks using unsharp masking and smoothing, respectively. The results show that each degradation is disruptive to the …