Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
Articles 1 - 16 of 16
Full-Text Articles in Engineering
Exploring The Efficiency Of Software-Defined Radios In 3d Heat Mapping, Andrew Scott Thomas
Exploring The Efficiency Of Software-Defined Radios In 3d Heat Mapping, Andrew Scott Thomas
Theses and Dissertations
A common method of connecting to the internet is a wireless network. These networks can be monitored to discover the area of their coverage, but commercial receivers don't always provide the most accurate results. A software-defined radio was programmed to sniff wireless signals and tested against a commercial receiver and the results were compared. The results suggest that the software-defined radio performs at least as well as the commercial receiver in distance measurements and significantly better in samples taken per minute. It was determined that the software-defined radio is a viable replacement for a commercial receiver in 3D heat mapping.
A Study On Controlling Power Supply Ramp-Up Time In Sram Pufs, Harshavardhan Ramanna
A Study On Controlling Power Supply Ramp-Up Time In Sram Pufs, Harshavardhan Ramanna
Masters Theses
With growing connectivity in the modern era, the risk of encrypted data stored in hardware being exposed to third-party adversaries is higher than ever. The security of encrypted data depends on the secrecy of the stored key. Conventional methods of storing keys in Non-Volatile Memory have been shown to be susceptible to physical attacks. Physically Unclonable Functions provide a unique alternative to conventional key storage. SRAM PUFs utilize inherent process variation caused during manufacturing to derive secret keys from the power-up values of SRAM memory cells.
This thesis analyzes the effect of supply ramp-up times on the reliability of SRAM …
Challenges In Large-Scale Machine Learning Systems: Security And Correctness, Emad Alsuwat
Challenges In Large-Scale Machine Learning Systems: Security And Correctness, Emad Alsuwat
Theses and Dissertations
In this research, we address the impact of data integrity on machine learning algorithms. We study how an adversary could corrupt Bayesian network structure learning algorithms by inserting contaminated data items. We investigate the resilience of two commonly used Bayesian network structure learning algorithms, namely the PC and LCD algorithms, against data poisoning attacks that aim to corrupt the learned Bayesian network model.
Data poisoning attacks are one of the most important emerging security threats against machine learning systems. These attacks aim to corrupt machine learning models by con- taminating datasets in the training phase. The lack of resilience of …
Inferences From Interactions With Smart Devices: Security Leaks And Defenses, Diksha Shukla
Inferences From Interactions With Smart Devices: Security Leaks And Defenses, Diksha Shukla
Dissertations - ALL
We unlock our smart devices such as smartphone several times every day using a pin, password, or graphical pattern if the device is secured by one. The scope and usage of smart devices' are expanding day by day in our everyday life and hence the need to make them more secure. In the near future, we may need to authenticate ourselves on emerging smart devices such as electronic doors, exercise equipment, power tools, medical devices, and smart TV remote control. While recent research focuses on developing new behavior-based methods to authenticate these smart devices, pin and password still remain primary …
Intrusion Detection For Cyber-Physical Attacks In Cyber-Manufacturing System, Mingtao Wu
Intrusion Detection For Cyber-Physical Attacks In Cyber-Manufacturing System, Mingtao Wu
Dissertations - ALL
In the vision of Cyber-Manufacturing System (CMS) , the physical components such as products, machines, and tools are connected, identifiable and can communicate via the industrial network and the Internet. This integration of connectivity enables manufacturing systems access to computational resources, such as cloud computing, digital twin, and blockchain. The connected manufacturing systems are expected to be more efficient, sustainable and cost-effective.
However, the extensive connectivity also increases the vulnerability of physical components. The attack surface of a connected manufacturing environment is greatly enlarged. Machines, products and tools could be targeted by cyber-physical attacks via the network. Among many emerging …
Robust Resource Allocation To Secure Physical Layer Using Uav-Assisted Mobile Relay Communications In 5g Technology, Shakil Ahmed
Robust Resource Allocation To Secure Physical Layer Using Uav-Assisted Mobile Relay Communications In 5g Technology, Shakil Ahmed
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
The unmanned aerial vehicles (UAVs) are also known as drones. Recently, UAVs have attracted the next generation researchers due to their flexible, dynamic, and cost-effective deployment, etc. Moreover, the UAVs have a wide range of application domains, such as rescue operation in the remote area, military surveillance, emergency application, etc. Given the UAVs are appropriately deployed, the UAVs provide continuous and reliable connectivity, on-demand, and cost-effective features to the desired destination in the wireless communication system. Thus, the UAVs can be a great choice to deploy as a mobile relay in co-existence with the base stations (BSs) on the ground …
The Performance Cost Of Security, Lucy R. Bowen
The Performance Cost Of Security, Lucy R. Bowen
Master's Theses
Historically, performance has been the most important feature when optimizing computer hardware. Modern processors are so highly optimized that every cycle of computation time matters. However, this practice of optimizing for performance at all costs has been called into question by new microarchitectural attacks, e.g. Meltdown and Spectre. Microarchitectural attacks exploit the effects of microarchitectural components or optimizations in order to leak data to an attacker. These attacks have caused processor manufacturers to introduce performance impacting mitigations in both software and silicon.
To investigate the performance impact of the various mitigations, a test suite of forty-seven different tests was created. …
Security Of Vehicular Platooning, Soodeh Dadras
Security Of Vehicular Platooning, Soodeh Dadras
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Platooning concept involves a group of vehicles acting as a single unit through coordination of movements. While Platooning as an evolving trend in mobility and transportation diminishes the individual and manual driving concerns, it creates new risks. New technologies and passenger’s safety and security further complicate matters and make platooning attractive target for the malicious minds. To improve the security of the vehicular platooning, threats and their potential impacts on vehicular platooning should be identified to protect the system against security risks. Furthermore, algorithms should be proposed to detect intrusions and mitigate the effects in case of attack. This dissertation …
Different Approaches To Blurring Digital Images And Their Effect On Facial Detection, Erich-Matthew Pulfer
Different Approaches To Blurring Digital Images And Their Effect On Facial Detection, Erich-Matthew Pulfer
Computer Science and Computer Engineering Undergraduate Honors Theses
The purpose of this thesis is to analyze the usage of multiple image blurring techniques and determine their effectiveness in combatting facial detection algorithms. This type of analysis is anticipated to reveal potential flaws in the privacy expected from blurring images or, rather, portions of images. Three different blurring algorithms were designed and implemented: a box blurring method, a Gaussian blurring method, and a differential privacy-based pixilation method. Datasets of images were collected from multiple sources, including the AT&T Database of Faces. Each of these three methods were implemented via their own original method, but, because of how common they …
Compliance Of Open Source Ehr Applications With Hipaa And Onc Security And Privacy Requirements, Maryam Farhadi, Hisham Haddad, Hossain Shahriar
Compliance Of Open Source Ehr Applications With Hipaa And Onc Security And Privacy Requirements, Maryam Farhadi, Hisham Haddad, Hossain Shahriar
Master of Science in Computer Science Theses
Electronic Health Records (EHRs) are digital versions of paper-based patient's health information. EHR applications are increasingly being adopted in many countries. They have resulted in improved quality in healthcare, convenient access to histories of patient medication and clinic visits, easier follow up of patient treatment plans, and precise medical decision-making process. EHR applications are guided by measures of the Health Insurance Portability and Accountability Act (HIPAA) to ensure confidentiality, integrity, and availability. However, there have been reported breaches of Protected Health Identifier (PHI) data stored by EHR applications. In many reported breaches, improper use of EHRs has resulted in disclosure …
Cyber Security- A New Secured Password Generation Algorithm With Graphical Authentication And Alphanumeric Passwords Along With Encryption, Akash Rao
Electrical & Computer Engineering Theses & Dissertations
Graphical passwords are always considered as an alternative of alphanumeric passwords for their better memorability and usability [1]. Alphanumeric passwords provide an adequate amount of satisfaction, but they do not offer better memorability compared to graphical passwords [1].
On the other hand, graphical passwords are considered less secured and provide better memorability [1]. Therefore many researchers have researched on graphical passwords to overcome the vulnerability. One of the most significant weaknesses of the graphical passwords is "Shoulder Surfing Attack," which means, sneaking into a victim's computer to learn the whole password or part of password or some confidential information. Such …
The Sap Link: A Controller Architecture For Secure Industrial Control Systems, Matthew Cody Wyman
The Sap Link: A Controller Architecture For Secure Industrial Control Systems, Matthew Cody Wyman
Theses and Dissertations
Industrial Control Systems are essential to modern life. They are utilized in hundreds of processes including power distribution, water treatment, manufacturing, traffic management, and amusement park ride control. These systems are an essential part of modern life and if compromised, could result in significant economic loss, safety impacts, damage to the environment, and even loss of life. Unfortunately, many of these systems are not properly secured from a cyber attack. It is likely that a well-funded and motivated attack from a nation-state will successfully compromise an industrial control system's network. As cyber war becomes more prevalent, it is becoming more …
Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle
Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle
CCE Theses and Dissertations
Medical literature identifies a number of technology-driven improvements in disease management such as implantable medical devices (IMDs) that are a standard treatment for candidates with specific diseases. Among patients using implantable cardiac defibrillators (ICD), for example, problems and issues are being discovered faster compared to patients without monitoring, improving safety. What is not known is why patients report not feeling safer, creating a safety paradox, and why patients identify privacy concerns in ICD monitoring.
There is a major gap in the literature regarding the factors that contribute to perceived safety and privacy in remote patient monitoring (RPM). To address this …
High Security Cognitive Radio Network Via Instantaneous Channel Information, Kaiyu Huang
High Security Cognitive Radio Network Via Instantaneous Channel Information, Kaiyu Huang
Browse all Theses and Dissertations
The cognitive radio network has been considered one of the most promising communication technologies for next generation wireless communication. One important aspect of cognitive radio network research is the so-called Primary User Authentication. Naturally, the primary user authentication in the cognitive radio network requires strong encryption. For the primary user identification, this dissertation provides a method which hides the user information in the header of the data frames with an underlay waveform. It is important to note that the underlay waveform will not bring redundancy data to the communication system. Using the synchronizing frequency as the underlay waveform carrier also …
Disrupting Complex Systems With Emerging Technologies: A Study On United States Airport Operations, Emily J. Grone
Disrupting Complex Systems With Emerging Technologies: A Study On United States Airport Operations, Emily J. Grone
Honors Theses and Capstones
The number of United States domestic commercial flight passengers are growing every year, which means the number of people checking-in, dropping off their bags, and going through TSA within airports is equally growing. With the increasing number of passengers and aging airports, there are several areas of pain points within airports where passengers hit a bottleneck due to the current systems that airports have in place. There are three main areas that we are going to reference. First the check-in process, where customers have to get their tickets, input identification information, and check-in for their flight. Second, baggage-drop off, where …
Securing Modern Cyberspace Using A Multi-Faceted Approach, Yu Li
Securing Modern Cyberspace Using A Multi-Faceted Approach, Yu Li
Browse all Theses and Dissertations
Security has become one of the most significant concerns for our cyberspace. Securing the cyberspace, however, becomes increasingly challenging. This can be attributed to the rapidly growing diversities and complexity of the modern cyberspace. Specifically, it is not any more dominated by connected personal computers (PCs); instead, it is greatly characterized by cyber-physical systems (CPS), embedded systems, dynamic services, and human-computer interactions. Securing modern cyberspace therefore calls for a multi-faceted approach capable of systematically integrating these emerging characteristics. This dissertation presents our novel and significant solutions towards this direction. Specifically, we have devised automated, systematic security solutions to three critical …