Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- AGC (1)
- Address Space Layout Randomization (ASLR) (1)
- Allocation/Deallocation (1)
- Archaeology (1)
- Automatic Generation Control (1)
-
- Data storage (1)
- Database (1)
- Differential privacy (1)
- Electric power (1)
- Global memory (1)
- Graphics Processing Unit (GPU) (1)
- Key control system (1)
- Memory leakage (1)
- Mysql (1)
- Networking (1)
- Pompeii (1)
- Power generation (1)
- Power system (1)
- Solid framework (1)
- User data autonomy (1)
- User privacy (1)
- Virtual reality (1)
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim
Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim
Computer Science and Computer Engineering Undergraduate Honors Theses
In today’s world where any and all activity on the internet produces data, user data privacy and autonomy are not prioritized. Companies called data brokers are able to gather data elements of personal information numbering in the billions. This data can be anything from purchase history, credit card history, downloaded applications, and service subscriptions. This information can be analyzed and inferences can be drawn from analysis, categorizing people into groups that range in sensitivity — from hobbies to race and income classes. Not only do these data brokers constantly overlook data privacy, this mass amount of data makes them extremely …
Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover
Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover
Computer Science and Computer Engineering Undergraduate Honors Theses
Graphics processing units (GPUs) have become a widely used technology for various purposes. While their intended use is accelerating graphics rendering, their parallel computing capabilities have expanded their use into other areas. They are used in computer gaming, deep learning for artificial intelligence and mining cryptocurrencies. Their rise in popularity led to research involving several security aspects, including this paper’s focus, memory vulnerabilities. Research documented many vulnerabilities, including GPUs not implementing address space layout randomization, not zeroing out memory after deallocation, and not initializing newly allocated memory. These vulnerabilities can lead to a victim’s sensitive data being leaked to an …
Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi
Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi
Computer Science and Computer Engineering Undergraduate Honors Theses
Automatic Generation Control (AGC) is a key control system utilized in electric power systems. AGC uses frequency and tie-line power flow measurements to determine the Area Control Error (ACE). ACE is then used by the AGC to adjust power generation and maintain an acceptable power system frequency. Attackers might inject false frequency and/or tie-line power flow measurements to mislead AGC into falsely adjusting power generation, which can harm power system operations. Various data forgery detection models are studied in this thesis. First, to make the use of predictive detection models easier for users, we propose a method for automated generation …
An Embarrassment Of Riches: Data Integration In Vr Pompeii, Adam Schoelz
An Embarrassment Of Riches: Data Integration In Vr Pompeii, Adam Schoelz
Computer Science and Computer Engineering Undergraduate Honors Theses
It is fair to say that Pompeii is the most studied archaeological site in the world. Beyond the extensive remains of the city itself, the timing of its rediscovery and excavation place it in a unique historiographical position. The city has been continuously studied since the 18th century, with historians and archaeologists constantly reevaluating older sources as our knowledge of the ancient world expands. While several studies have approached the city from a data driven perspective, no studies of the city have taken a quantitative holistic approach on the scale of the VR Pompeii project. Hyper-specificity has been the order …