Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild Apr 2023

Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild

Symposium of Student Scholars

The research project aims to find ways to detect malicious packets inside encrypted network traffic. In addition to this goal maintaining user privacy is a priority. As encryption has become less expensive to implement more and more network traffic is encrypted. Currently, 90% of all network traffic is encrypted, and this trend is expected to increase. The creators of malware areemploying various methods to ensure delivery of their malware, including encryption. One proposed method to combat this suggests implementing machine learning with various algorithms to analyze packet attributes to determine if they contain malware, without actually knowing what's inside …


Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes Jan 2023

Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes

Capstone Showcase

Our program collects vehicle data using an OBD-II device called Carloop that is plugged into the vehicle's diagnostic port. The device executes our code which then communicates with the vehicle's onboard computer to collect data such as engine RPM, vehicle speed, fuel level, and other diagnostic information. This data is then sent over WiFi to Particle’s Cloud, which is a platform for managing IoT devices.

Integrations set up on Particle take care of sending data to our InfluxDB Database, which is hosted on our own cloud-based machine. InfluxDB is a high-performance time-series database that is optimized for storing and querying …


Performance Of Lambda@Edge Vs. Lambda Environment, Sam Dotson, Wei Hao Oct 2019

Performance Of Lambda@Edge Vs. Lambda Environment, Sam Dotson, Wei Hao

Posters-at-the-Capitol

Abstract

The purpose of this research has been to observe how performance of the Lambda@EDGE environment compares to the base Lambda environment. This is in an effort to determine viability of the EDGE environment. 15 tests were conducted over a matter of days in each environment whereby the Fibonacci sequence was calculated to 20 terms. Performance metrics including RAM usage and response time were measured. Lambda@EDGE was determined to have not only a slightly higher average response time but also an average RAM usage of 1MB more in the aggregate tests.


Automated Segmentation Of Brain Ventricles Using 3d U-Net, Robert Sandor, Anish P. Dalal Apr 2019

Automated Segmentation Of Brain Ventricles Using 3d U-Net, Robert Sandor, Anish P. Dalal

Creative Activity and Research Day - CARD

Neuro-radiologists currently use qualitative volumetric change of brain ventricles after surgery to assess the safety of removing a ventriculoperitoneal (VP) shunt which is a medical device that relieves pressure on the brain caused by fluid accumulation. Following safe removal of the VP shunt, patients can be released from the hospital. The need for accurate and quick measurement of brain ventricular volumetric change makes automatic 3D segmentation software an ideal candidate to aid decisions after surgery. In this paper, we propose an approach to estimate the ventricular volume variation using segmentation in brain MRI and CT images. Our approach consists of …


Forecast For The Future: Emerging Legal Technologies, Carol A. Watson Mar 2010

Forecast For The Future: Emerging Legal Technologies, Carol A. Watson

Continuing Legal Education Presentations

Begins by discussing technologies that are currently available on the web that can reduce office overhead. Also highlights current general technology trends and still-developing technologies. Concludes with a list of frivolous gadgets to provide food for thought about the coming prospects of technology.