Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Computer Engineering

Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu May 2023

Types Of Cyber Attacks And Incident Responses, Kaung Myat Thu

Publications and Research

Cyber-attacks are increasingly prevalent in today's digital age, and their impact can be severe for individuals, organizations, and governments. To effectively protect against these threats, it is essential to understand the different types of attacks and have an incident response plan in place to minimize damage and restore normal operations quickly.

This research aims to contribute to the field by addressing the following questions: What are the main types of cyber-attacks, and how can organizations effectively respond to these incidents? How can the incident response process be improved through post-incident activities?

The study examines various cyber-attack types, including malware, phishing, …


Resource Management In Mobile Edge Computing For Compute-Intensive Application, Xiaojie Zhang Feb 2023

Resource Management In Mobile Edge Computing For Compute-Intensive Application, Xiaojie Zhang

Dissertations, Theses, and Capstone Projects

With current and future mobile applications (e.g., healthcare, connected vehicles, and smart grids) becoming increasingly compute-intensive for many mission-critical use cases, the energy and computing capacities of embedded mobile devices are proving to be insufficient to handle all in-device computation. To address the energy and computing shortages of mobile devices, mobile edge computing (MEC) has emerged as a major distributed computing paradigm. Compared to traditional cloud-based computing, MEC integrates network control, distributed computing, and storage to customizable, fast, reliable, and secure edge services that are closer to the user and data sites. However, the diversity of applications and a variety …


Blockchain-Based Architecture For Secured Cyberattack Signatures And Features Distribution, Oluwaseyi J. Ajayi Jan 2021

Blockchain-Based Architecture For Secured Cyberattack Signatures And Features Distribution, Oluwaseyi J. Ajayi

Dissertations and Theses

One effective way of detecting malicious traffic in computer networks is intrusion detection systems (IDS). Despite the increased accuracy of IDSs, distributed or coordinated attacks can still go undetected because of the single vantage point of the IDSs. Due to this reason, there is a need for attack characteristics' exchange among different IDS nodes. Another reason for IDS coordination is that a zero-day attack (an attack without a known signature) experienced in organizations located in different regions is not the same. Collaborative efforts of the participating IDS nodes can stop more attack threats if IDS nodes exchange these attack characteristics …


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


Adaptive Effort Classifiers: A System Design For Partitioned Edge/Cloud Inference, Divya Sankar Jan 2020

Adaptive Effort Classifiers: A System Design For Partitioned Edge/Cloud Inference, Divya Sankar

Dissertations and Theses

The massive growth in availability of real-world data from connected devices and the overwhelming success of Deep Neural Networks (DNNs) in many ArtificialIntelligence (AI) tasks have enabled AI-based applications and services to become commonplace across the spectrum of computing devices from edge/Internet-of-Things (IoT) devices to data centers and the cloud. However, DNNs incur high computational cost (compute operations, memory footprint and bandwidth),which far outstrip the capabilities of modern computing platforms. Therefore improving the computational efficiency of DNNs wide-spread commercial deployment and success.In this thesis, we address the computational efficiency challenge in the context ofAI inference applications executing on edge/cloud systems, …


Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera Jun 2019

Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera

Student Theses

In today’s world, the Blockchain technology is used for different purposes has brought an increment in the development of different Blockchain platforms, services, and utilities for storing data securely and efficiently. Quorum Blockchain, an Ethereum fork created by JPMorgan Chase, has placed itself in one of the widely used, efficient and trustful Blockchain platforms available today. Because of the importance which Quorum is contributing to the world, it is important to test and measure different aspects of the platform, not only to prove how efficient the software can be but as well as to have a clear view on what …


Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht Dec 2018

Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht

Publications and Research

Spatial Decision Support Systems (SDSS) were a hot topic in the 1990s, when researchers tried to imbue GIS with additional decision support features. Successful practical developments such as HAZUS or CommunityViz have since been built, based on commercial desktop software and without much heed for theory other than what underlies their process models. Others, like UrbanSim, have been completely overhauled twice but without much external scrutiny. Both the practical and the theoretical foundations of decision support systems have developed considerably over the past 20 years. This article presents an overview of these developments and then looks at what corresponding tools …


Week 4 Lab: Counterlist, Michelle Shu, David Soon, Nyc Tech-In-Residence Corps Apr 2018

Week 4 Lab: Counterlist, Michelle Shu, David Soon, Nyc Tech-In-Residence Corps

Open Educational Resources

Syllabus and materials for the course "CSC 59940: Front-End Web Application Development" delivered at the City College of New York in Spring 2018 by Michelle Shu and David Moon as part of the Tech-in-Residence Corps program.


Promoting Information Resources To Students: Using Wordpress To Maintain Library Data Sets, Derek Stadler Jan 2017

Promoting Information Resources To Students: Using Wordpress To Maintain Library Data Sets, Derek Stadler

Publications and Research

Although it began as a blog tool, WordPress has grown into a complete content management system with thousands of interactive themes available. Since it uses the MySQL database management system, the open-source software suits the needs of library websites by aggregating a college library’s complete database inventory. Rather than update several HTML pages within a site when new vendors are added or a URL is changed, information from vendors can be maintained in a database table and then displayed to students, highlighting available resources and information. The presentation highlights the use of some simple WordPress plugins to manage many aggregators …


Development Of A Wireless Environmental Data Acquisition Prototype Adopting Agile Practices: An Experience Report, Paul Celicourt, Richard Sam, Michael Piasecki Oct 2016

Development Of A Wireless Environmental Data Acquisition Prototype Adopting Agile Practices: An Experience Report, Paul Celicourt, Richard Sam, Michael Piasecki

Publications and Research

The traditional software development model commonly named “waterfall” is unable to cope with the increasing functionality and complexity of modern embedded systems. In addition, it is unable to support the ability for businesses to quickly respond to new market opportunities due to changing requirements. As a response, the software development community developed the Agile Methodologies (e.g., extreme Programming, Scrum) which were also adopted by the Embedded System community. However, failures and bad experiences in applying Agile Methodologies to the development of embedded systems have not been reported in the literature. Therefore, this paper contributes a detailed account of our first-time …


Application Planning, Jochen Albrecht, Clare Davies Jan 2010

Application Planning, Jochen Albrecht, Clare Davies

Publications and Research

No abstract provided.