Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Air Force Institute of Technology (152)
- California Polytechnic State University, San Luis Obispo (124)
- Old Dominion University (51)
- University of Arkansas, Fayetteville (40)
- Western University (26)
-
- The University of Akron (24)
- California State University, San Bernardino (22)
- University of Kentucky (21)
- New Jersey Institute of Technology (20)
- University of Massachusetts Amherst (20)
- Edith Cowan University (17)
- University of Tennessee, Knoxville (16)
- University of North Florida (14)
- Munster Technological University (12)
- University of New Mexico (11)
- American University in Cairo (10)
- Clemson University (10)
- West Virginia University (10)
- University of Nevada, Las Vegas (9)
- Embry-Riddle Aeronautical University (8)
- Louisiana State University (8)
- Kennesaw State University (6)
- Morehead State University (6)
- Virginia Commonwealth University (6)
- Georgia Southern University (5)
- Michigan Technological University (5)
- Singapore Management University (5)
- South Dakota State University (5)
- Southern Methodist University (5)
- Universidad de La Salle (5)
- Keyword
-
- #antcenter (25)
- Wireless communication systems (22)
- Networking (19)
- Blockchain (17)
- Computer networks--Security measures (17)
-
- Internet (17)
- Machine learning (17)
- Security (16)
- Cybersecurity (13)
- Bluetooth (12)
- Deep Learning (12)
- Routing (12)
- Android (11)
- Machine Learning (11)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (10)
- Applied sciences (10)
- IoT (10)
- Thesis; University of North Florida; UNF; Dissertations (10)
- Arduino (9)
- Mobile communication systems (9)
- Networks (9)
- Automation (8)
- Computer networks (8)
- Computer security (8)
- Internet of Things (8)
- Network (8)
- Privacy (8)
- Communication (7)
- Raspberry Pi (7)
- Simulation (7)
- Publication Year
- Publication
-
- Theses and Dissertations (165)
- Computer Engineering (56)
- Theses (36)
- Computer Science Theses & Dissertations (32)
- Master's Theses (31)
-
- Electronic Thesis and Dissertation Repository (26)
- Williams Honors College, Honors Research Projects (24)
- Doctoral Dissertations (20)
- Graduate Theses and Dissertations (20)
- Computer Science and Software Engineering (18)
- Theses Digitization Project (18)
- Electronic Theses and Dissertations (16)
- Computer Science and Computer Engineering Undergraduate Honors Theses (15)
- Masters Theses (15)
- Theses and Dissertations--Computer Science (15)
- UNF Graduate Theses and Dissertations (14)
- Theses: Doctorates and Masters (13)
- Electrical & Computer Engineering Theses & Dissertations (11)
- Graduate Theses, Dissertations, and Problem Reports (10)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (9)
- Doctoral Dissertations and Master's Theses (8)
- Electrical Engineering (8)
- Mechanical Engineering (7)
- All Dissertations (6)
- Honors Theses (6)
- Morehead State Theses and Dissertations (6)
- Archived Theses and Dissertations (5)
- Dissertations, Master's Theses and Master's Reports (5)
- Electrical and Computer Engineering ETDs (5)
- LSU Master's Theses (5)
Articles 1 - 30 of 770
Full-Text Articles in Engineering
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
LSU Master's Theses
Industrial Control Systems (ICS) are the foundation of our critical infrastructure, and allow for the manufacturing of the products we need. These systems monitor and control power plants, water treatment plants, manufacturing plants, and much more. The security of these systems is crucial to our everyday lives and to the safety of those working with ICS. In this thesis we examined how an attacker can take control of these systems using a power plant simulator in the Applied Cybersecurity Lab at LSU. Running experiments on a live environment can be costly and dangerous, so using a simulated environment is the …
Fair Fault-Tolerant Approach For Access Point Failures In Networked Control System Greenhouses, Mohammed Ali Yaslam Ba Humaish
Fair Fault-Tolerant Approach For Access Point Failures In Networked Control System Greenhouses, Mohammed Ali Yaslam Ba Humaish
Theses and Dissertations
Greenhouse Networked Control Systems (NCS) are popular applications in modern agriculture due to their ability to monitor and control various environmental factors that can affect crop growth and quality. However, designing and operating a greenhouse in the context of NCS could be challenging due to the need for highly available and cost-efficient systems. This thesis presents a design methodology for greenhouse NCS that addresses these challenges, offering a framework to optimize crop productivity, minimize costs, and improve system availability and reliability. It contributes several innovations to the field of greenhouse NCS design. For example, it recommends using the 2.4GHz frequency …
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Undergraduate Honors Theses
Satellite communication is essential for the exploration and study of space. Satellites allow communications with many devices and systems residing in space and on the surface of celestial bodies from ground stations on Earth. However, with the rise of Ground Station as a Service (GsaaS), the ability to efficiently send action commands to distant satellites must ensure non-repudiation such that an attacker is unable to send malicious commands to distant satellites. Distant satellites are also constrained devices and rely on limited power, meaning security on these devices is minimal. Therefore, this study attempted to propose a novel algorithm to allow …
Brunet: Disruption-Tolerant Tcp And Decentralized Wi-Fi For Small Systems Of Vehicles, Nicholas Brunet
Brunet: Disruption-Tolerant Tcp And Decentralized Wi-Fi For Small Systems Of Vehicles, Nicholas Brunet
Master's Theses
Reliable wireless communication is essential for small systems of vehicles. However, for small-scale robotics projects where communication is not the primary goal, programmers frequently choose to use TCP with Wi-Fi because of their familiarity with the sockets API and the widespread availability of Wi-Fi hardware. However, neither of these technologies are suitable in their default configurations for highly mobile vehicles that experience frequent, extended disruptions. BRUNET (BRUNET Really Useful NETwork) provides a two-tier software solution that enhances the communication capabilities for Linux-based systems. An ad-hoc Wi-Fi network permits decentralized peer-to-peer and multi-hop connectivity without the need for dedicated network infrastructure. …
Decentralized Machine Learning On Blockchain: Developing A Federated Learning Based System, Nikhil Sridhar
Decentralized Machine Learning On Blockchain: Developing A Federated Learning Based System, Nikhil Sridhar
Master's Theses
Traditional Machine Learning (ML) methods usually rely on a central server to per-
form ML tasks. However, these methods have problems like security risks, data
storage issues, and high computational demands. Federated Learning (FL), on the
other hand, spreads out the ML process. It trains models on local devices and then
combines them centrally. While FL improves computing and customization, it still
faces the same challenges as centralized ML in security and data storage.
This thesis introduces a new approach combining Federated Learning and Decen-
tralized Machine Learning (DML), which operates on an Ethereum Virtual Machine
(EVM) compatible blockchain. The …
Cybersecurity In Critical Infrastructure Systems: Emulated Protection Relay, Mitchell Bylak
Cybersecurity In Critical Infrastructure Systems: Emulated Protection Relay, Mitchell Bylak
Computer Science and Computer Engineering Undergraduate Honors Theses
Cyber-attacks on Critical Systems Infrastructure have been steadily increasing across the world as the capabilities of and reliance on technology have grown throughout the 21st century, and despite the influx of new cybersecurity practices and technologies, the industry faces challenges in its cooperation between the government that regulates law practices and the private sector that owns and operates critical infrastructure and security, which has directly led to an absence of eas- ily accessible information and learning resources on cybersecurity for use in public environments and educational settings. This honors research thesis addresses these challenges by submitting the development of an …
Enabling Intelligent Network Management Through Multi-Agent Systems: An Implementation Of Autonomous Network System, Petro Mushidi Tshakwanda
Enabling Intelligent Network Management Through Multi-Agent Systems: An Implementation Of Autonomous Network System, Petro Mushidi Tshakwanda
Electrical and Computer Engineering ETDs
This Ph.D. dissertation presents a pioneering Multi-Agent System (MAS) approach for intelligent network management, particularly suited for next-generation networks like 5G and 6G. The thesis is segmented into four critical parts. Firstly, it contrasts the benefits of agent-based design over traditional micro-service architectures. Secondly, it elaborates on the implementation of network service agents in Python Agent Development Environment (PADE), employing machine learning and deep learning algorithms for performance evaluation. Thirdly, a new scalable approach, Scalable and Efficient DevOps (SE-DO), is introduced to optimize agent performance in resource-constrained settings. Fourthly, the dissertation delves into Quality of Service (QoS) and Radio Resource …
Designing Tomorrow's Reality: The Development And Validation Of An Augmented And Mixed Reality Heuristic Checklist, Jessyca Derby
Designing Tomorrow's Reality: The Development And Validation Of An Augmented And Mixed Reality Heuristic Checklist, Jessyca Derby
Doctoral Dissertations and Master's Theses
Augmented (AR) and Mixed Reality (MR) are new and currently developing technologies. They have been used and shown promise and popularity in the domains of education, training, enterprise, retail, consumer products, and more. However, there is a lack of consistency and standards in AR and MR devices and applications. Interactions and standards in one application may drastically differ from another. This may make it difficult for users, especially those new to these technologies, to learn and feel comfortable using the devices or applications. It may also hinder the usability of the applications as designers may not follow proven techniques to …
Toward Building An Intelligent And Secure Network: An Internet Traffic Forecasting Perspective, Sajal Saha
Toward Building An Intelligent And Secure Network: An Internet Traffic Forecasting Perspective, Sajal Saha
Electronic Thesis and Dissertation Repository
Internet traffic forecast is a crucial component for the proactive management of self-organizing networks (SON) to ensure better Quality of Service (QoS) and Quality of Experience (QoE). Given the volatile and random nature of traffic data, this forecasting influences strategic development and investment decisions in the Internet Service Provider (ISP) industry. Modern machine learning algorithms have shown potential in dealing with complex Internet traffic prediction tasks, yet challenges persist. This thesis systematically explores these issues over five empirical studies conducted in the past three years, focusing on four key research questions: How do outlier data samples impact prediction accuracy for …
Watch: A Distributed Clock Time Offset Estimation Tool On The Platform For Open Wireless Data-Driven Experimental Research, Cassie Jeng
McKelvey School of Engineering Theses & Dissertations
The synchronization of the clocks used at different devices across space is of critical importance in wireless communications networks. Each device’s local clock differs slightly, affecting the times at which packets are transmitted from different nodes in the network. This thesis provides experimentation and software development on POWDER, the Platform for Open, Wireless Data-driven Experimental Research, an open wireless testbed across the University of Utah campus. We build upon Shout, a suite of Python scripts that allow devices to iteratively transmit and receive with each other and save the collected data. We introduce WATCH, an experimental method to estimate clock …
Classification Of Ddos Attack With Machine Learning Architectures And Exploratory Analysis, Amreen Anbar
Classification Of Ddos Attack With Machine Learning Architectures And Exploratory Analysis, Amreen Anbar
Electronic Thesis and Dissertation Repository
The ever-increasing frequency of occurrence and sophistication of DDoS attacks pose a serious threat to network security. Accurate classification of DDoS attacks with efficiency is crucial in order to develop effective defense mechanisms. In this thesis, we propose a novel approach for DDoS classification using the CatBoost algorithm, on CICDDoS2019, a benchmark dataset containing 12 variations of DDoS attacks and legitimate traffic using real-world traffic traces. With a developed ensemble feature selection method and feature engineering, our model proves to be a good fit for DDoS attack type prediction. Our experimental results demonstrate that our proposed approach achieves high classification …
Transforming Large-Scale Virtualized Networks: Advancements In Latency Reduction, Availability Enhancement, And Security Fortification, Ibrahim Tamim
Transforming Large-Scale Virtualized Networks: Advancements In Latency Reduction, Availability Enhancement, And Security Fortification, Ibrahim Tamim
Electronic Thesis and Dissertation Repository
In today’s digital age, the increasing demand for networks, driven by the proliferation of connected devices, data-intensive applications, and transformative technologies, necessitates robust and efficient network infrastructure. This thesis addresses the challenges posed by virtualization in 5G networking and focuses on enhancing next-generation Radio Access Networks (RANs), particularly Open-RAN (O-RAN). The objective is to transform virtualized networks into highly reliable, secure, and latency-aware systems. To achieve this, the thesis proposes novel strategies for virtual function placement, traffic steering, and virtual function security within O-RAN. These solutions utilize optimization techniques such as binary integer programming, mixed integer binary programming, column generation, …
Design And Analysis Of Content Caching Systems, Anirudh Sabnis
Design And Analysis Of Content Caching Systems, Anirudh Sabnis
Doctoral Dissertations
Caching is a simple yet powerful technique that has had a significant impact on improving the performance of various computer systems. From internet content delivery to CPUs, domain name systems, and database systems, caching has played a pivotal role in making these systems faster and more efficient. The basic idea behind caching is to store frequently accessed data locally, so that future requests for that data can be served more quickly. For example, a Content Delivery Network (CDN) like Akamai deploys thousands of edge caches across the globe, so that end-user requests can be served from a nearby cache, rather …
Generalizable Deep-Learning-Based Wireless Indoor Localization, Ali Owfi
Generalizable Deep-Learning-Based Wireless Indoor Localization, Ali Owfi
All Theses
The growing interest in indoor localization has been driven by its wide range of applications in areas such as smart homes, industrial automation, and healthcare. With the increasing reliance on wireless devices for location-based services, accurate estimation of device positions within indoor environments has become crucial. Deep learning approaches have shown promise in leveraging wireless parameters like Channel State Information (CSI) and Received Signal Strength Indicator (RSSI) to achieve precise localization. However, despite their success in achieving high accuracy, these deep learning models suffer from limited generalizability, making them unsuitable for deployment in new or dynamic environments without retraining. To …
A Study Of 5g Cellular Connectivity To Unmanned Aerial Vehicles, Jackson Murrin
A Study Of 5g Cellular Connectivity To Unmanned Aerial Vehicles, Jackson Murrin
All Theses
The market of unmanned aerial vehicles (UAVs) has seen significant growth in the past ten years on both the commercial and military sides. The applications for UAVs are endless and options by manufacturers allow users to modify their drones for their specific goals. This industry has opened up the excitement of piloting vehicles in the air, photography, videography, exploration of nature from a different point of view and many other hobbies assisted by the emergence of UAVs. The growth of this industry coincides with the roll out of new 5G cellular network technology. This upgrade in cellular network infrastructure allows …
Designing Intelligent Energy Efficient Scheduling Algorithm To Support Massive Iot Communication In Lora Networks, Jui Mhatre
Master of Science in Computer Science Theses
We are about to enter a new world with sixth sense ability – “Network as a sensor -6G”. The driving force behind digital sensing abilities is IoT. Due to their capacity to work in high frequency, 6G devices have voracious energy demand. Hence there is a growing need to work on green solutions to support the underlying 6G network by making it more energy efficient. Low cost, low energy, and long-range communication capability make LoRa the most adopted and promising network for IoT devices. Since LoRaWAN uses ALOHA for multi-access of channels, collision management is an important task. Moreover, in …
Interactive Architecture - Intervention Of Virtual Business On Commercial Space, Yihao George Xu
Interactive Architecture - Intervention Of Virtual Business On Commercial Space, Yihao George Xu
Masters Theses
Traditional mall-based restaurants, such as P.F. Chang’s in the Providence Place Mall, have primarily focused on site-based dining and bar services. However, the food provided by this chain restaurant often lacks depth, and customers seldom learn the story behind the dishes. This thesis explores the integration of mixed reality technology within the physical environment of P.F. Chang’s, an American Chinese restaurant chain with over 300 locations, aiming to transform it into an authentic Shanghai food culture experience. This experience combines virtual and physical stimuli to evoke various periods of Chinese history, providing a unique encounter for customers.
The proposed transformation …
Enabling Security Analysis And Education Of The Ethereum Platform: A Network Traffic Dissection Tool, Joshua Mason Kemp
Enabling Security Analysis And Education Of The Ethereum Platform: A Network Traffic Dissection Tool, Joshua Mason Kemp
Masters Theses, 2020-current
Ethereum, the decentralized global software platform powered by blockchain technology known for its native cryptocurrency, Ether (ETH), provides a technology stack for building apps, holding assets, transacting, and communicating without control by a central authority. At the core of Ethereum’s network is a suite of purpose-built protocols known as DEVP2P, which provides the underlying nodes in an Ethereum network the ability to discover, authenticate and communicate confidentiality. This document discusses the creation of a new Wireshark dissector for DEVP2P’s discovery protocols, DiscoveryV4 and DiscoveryV5, and a dissector for RLPx, an extensible TCP transport protocol for a range of Ethereum node …
Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii
Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii
Electronic Theses and Dissertations
This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.
Sensor Module Network For Monitoring Trace Gases In The International Space Station, Aaron Beck, Drake Provost, Christopher English, Kamrin Gustave
Sensor Module Network For Monitoring Trace Gases In The International Space Station, Aaron Beck, Drake Provost, Christopher English, Kamrin Gustave
Honors Capstones
The Jet Propulsion Laboratory (JPL) of the National Aeronautics and Space Administration (NASA) aims to develop a sensor network for the International Space Station (ISS) to ensure a comprehensive understanding of air quality within the station. The accumulation of carbon dioxide (CO2) can lead to cognitive impairment, headaches, and potentially dangerous situations at high concentrations. Monitoring air content at the ISS is critical to maintaining a healthy environment for crew onboard. Exposure to harmful gases causes negative side effects that make crew sick, which may interfere with their responsibilities. CO2 is a gas that should be monitored …
Enhanced Mobile Networking Using Multi-Connectivity And Packet Duplication In Next-Generation Cellular Networks, Prabodh Mishra
Enhanced Mobile Networking Using Multi-Connectivity And Packet Duplication In Next-Generation Cellular Networks, Prabodh Mishra
All Dissertations
Modern cellular communication systems need to handle an enormous number of users and large amounts of data, including both users as well as system-oriented data. 5G is the fifth-generation mobile network and a new global wireless standard that follows 4G/LTE networks. The uptake of 5G is expected to be faster than any previous cellular generation, with high expectations of its future impact on the global economy. The next-generation 5G networks are designed to be flexible enough to adapt to modern use cases and be highly modular such that operators would have the flexibility to provide selective features based on user …
Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim
Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim
Computer Science and Computer Engineering Undergraduate Honors Theses
In today’s world where any and all activity on the internet produces data, user data privacy and autonomy are not prioritized. Companies called data brokers are able to gather data elements of personal information numbering in the billions. This data can be anything from purchase history, credit card history, downloaded applications, and service subscriptions. This information can be analyzed and inferences can be drawn from analysis, categorizing people into groups that range in sensitivity — from hobbies to race and income classes. Not only do these data brokers constantly overlook data privacy, this mass amount of data makes them extremely …
Critical Infrastructure Workforce Development Pods For Teaching Cybersecurity Using Netlab+, Gideon Sutterfield
Critical Infrastructure Workforce Development Pods For Teaching Cybersecurity Using Netlab+, Gideon Sutterfield
Computer Science and Computer Engineering Undergraduate Honors Theses
As digital automation for Industrial Control Systems has grown, so has its
vulnerability to cyberattacks. The world of industry has responded effectively to this, but the world of academia is still lagging as its emphasis is still almost entirely on information technology. Considering this, we created a workforce development pod that serves as a hands-on learning module for teaching students key cybersecurity ideas surrounding operational technology using the NETLAB+ platform. A pod serves as the virtual environment where the learning exercise takes place. This project’s implementation involved the creation of a segmented network within the pod where a student starts …
Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant
Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant
Theses/Capstones/Creative Projects
The Michigan Army National Guard DCOE is hoping to increase their understanding of the physical, electrical, protocol, and logical topography of internet service. In order to understand the infrastructure of the internet, information must be collected on its pieces. By studying, describing, and illustrating the infrastructure of the global internet we can develop hardening tactics, improve user training, and develop contingency plans in the case of an attack. The research is focused on where data lives, locating data centers in the region, identifying global infrastructure and who owns it, and potential for hardening. An interactive map has been created in …
Vanet Applications Under Loss Scenarios & Evolving Wireless Technology, Adil Alsuhaim
Vanet Applications Under Loss Scenarios & Evolving Wireless Technology, Adil Alsuhaim
All Dissertations
In this work we study the impact of wireless network impairment on the performance of VANET applications such as Cooperative Adaptive Cruise Control (CACC), and other VANET applications that periodically broadcast messages. We also study the future of VANET application in light of the evolution of radio access technologies (RAT) that are used to exchange messages. Previous work in the literature proposed fallback strategies that utilizes on-board sensors to recover in case of wireless network impairment, those methods assume a fixed time headway value, and do not achieve string stability. In this work, we study the string stability of a …
Enabling High Throughput And Reliable Low Latency Communication Over Vehicular Mobility In Next-Generation Cellular Networks, Snigdhaswin Kar
Enabling High Throughput And Reliable Low Latency Communication Over Vehicular Mobility In Next-Generation Cellular Networks, Snigdhaswin Kar
All Dissertations
The fifth-generation (5G) networks and beyond need paradigm shifts to realize the exponentially increasing demands of next-generation services for high throughputs, low latencies, and reliable communication under various mobility scenarios. However, these promising features have critical gaps that need to be filled before they can be fully implemented for mobile applications in complex environments like smart cities. Although the sub-6 GHz bands can provide reliable and larger coverage, they cannot provide high data rates with low latencies due to a scarcity of spectrum available in these bands. Millimeter wave (mmWave) communication is a key enabler for a significant increase in …
Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros
Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros
Electronic Theses, Projects, and Dissertations
Cyberattacks are a major problem for public organizations across the nation, and unfortunately for them, the frequency of these attacks is constantly growing. This project used a case study approach to explore the types of cybersecurity public organization agencies face and how those crimes can be mitigated. The goal of this paper is to understand how public organization agencies have prepared for cyberattacks and discuss additional suggestions to improve their current systems with the current research available This research provides an analysis of current cyber security systems, new technologies that can be implemented, roadblocks public agencies face before and during …
Enhancing Cyberspace Monitoring In The United States Aviation Industry: A Multi-Layered Approach For Addressing Emerging Threats, Matthew Janson
Enhancing Cyberspace Monitoring In The United States Aviation Industry: A Multi-Layered Approach For Addressing Emerging Threats, Matthew Janson
Doctoral Dissertations and Master's Theses
This research project examined the cyberspace domain in the United States (U.S.) aviation industry from many different angles. The research involved learning about the U.S. aviation cyberspace environment, the landscape of cyber threats, new technologies like 5G and smart airports, cybersecurity frameworks and best practices, and the use of aviation cyberspace monitoring capabilities. The research looked at how vulnerable the aviation industry is from cyber-attacks, analyzed the possible effects of cyber-attacks on the industry, and suggests ways to improve the industry's cybersecurity posture. The project's main goal was to protect against possible cyber-attacks and make sure that the aviation industry …
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman
Doctoral Dissertations and Master's Theses
This study provides a synopsis of the following topics: the prospective limiters levied on cyber-warfare by present–day international legislation; significant complexities and contentions brought up in the rendering & utilization of International Humanitarian Legislation against cyber-warfare; feasible repercussions of cyber-warfare on humanitarian causes. It is also to be contended and outlined in this research study that non–state actors can be held accountable for breaches of international humanitarian legislation committed using cyber–ordnance if sufficient resources and skill are made available. It details the factors that prosecutors and investigators must take into account when organizing investigations into major breaches of humanitarian legislation …
Phone Microwave, Khanh Kim Hoang, Emily Zhou
Phone Microwave, Khanh Kim Hoang, Emily Zhou
Computer Engineering
This project involves the installation of remote-control capabilities in an antique 1980s microwave, effectively turning the microwave into a “smart” device. While preserving the original functionality of the microwave, a combination of software and hardware components allows for remote microwave operations. The microwave can be remotely operated by calling the built-in number, and more advanced settings and options can be utilized by texting. The microwave is also secured against unauthorized use with the addition of a PIN code that is required to operate the device.