Open Access. Powered by Scholars. Published by Universities.®
- Keyword
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Towards Characterizing Adversarial Opportunity And Behavior In Critical Infrastructure Network, Md Sharif Ullah
Towards Characterizing Adversarial Opportunity And Behavior In Critical Infrastructure Network, Md Sharif Ullah
Electrical & Computer Engineering Theses & Dissertations
The growth of information and communication technology is constantly revolutionizing various domains, e.g., energy utility systems, healthcare, the internet of things, etc. This inception of widespread cyber technology enables reliability and first operability of the system, yet simultaneously imposed a risk of significant impact due to disruption of safe and secure operation. The attack surface is expanding, creating a cyber exposure gap which indicates a higher threat landscape and increased risk of compromise. Motivated by this increased threat exposure, this dissertation investigates the attack surface as a static and dynamic indicator of adversary propagation, seeking an efficient modeling paradigm to …
Data-Driven Operational And Safety Analysis Of Emerging Shared Electric Scooter Systems, Qingyu Ma
Data-Driven Operational And Safety Analysis Of Emerging Shared Electric Scooter Systems, Qingyu Ma
Computational Modeling & Simulation Engineering Theses & Dissertations
The rapid rise of shared electric scooter (E-Scooter) systems offers many urban areas a new micro-mobility solution. The portable and flexible characteristics have made E-Scooters a competitive mode for short-distance trips. Compared to other modes such as bikes, E-Scooters allow riders to freely ride on different facilities such as streets, sidewalks, and bike lanes. However, sharing lanes with vehicles and other users tends to cause safety issues for riding E-Scooters. Conventional methods are often not applicable for analyzing such safety issues because well-archived historical crash records are not commonly available for emerging E-Scooters.
Perceiving the growth of such a micro-mobility …
Move: Mobile Observers Variants And Extensions, Ryan Florin
Move: Mobile Observers Variants And Extensions, Ryan Florin
Computer Science Theses & Dissertations
Traffic state estimation is a fundamental task of Intelligent Transportation Systems. Recent advances in sensor technology and emerging computer and vehicular communications paradigms have brought the task of estimating traffic state parameters in real-time within reach.
This has led to the main research question of this thesis: Can a vehicle accurately estimate traffic parameters using onboard resources shared through CV technology in a lightweight manner without utilizing centralized or roadside infrastructure?
In 1954 Wardrop and Charlesworth proposed the Moving Observer method to measure traffic parameters based on an observed number of vehicle passes. We start by proposing methods for detecting …
Authentication Schemes' Impact On Working Memory, Janine D. Mator
Authentication Schemes' Impact On Working Memory, Janine D. Mator
Psychology Theses & Dissertations
Authentication is the process by which a computing system validates a user’s identity. Although this process is necessary for system security, users view authentication as a frequent disruption to their primary tasks. During this disruption, primary task information must be actively maintained in working memory. As a result, primary task information stored in working memory is at risk of being lost or corrupted while users authenticate. For over two decades, researchers have focused on developing more memorable passwords by replacing alphanumeric text with visual graphics (Biddle et al., 2012). However, very little attention has been given to the impact authentication …