Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (13)
- University of Nebraska - Lincoln (7)
- Old Dominion University (6)
- University of Kentucky (6)
- Technological University Dublin (4)
-
- City University of New York (CUNY) (2)
- University of New Mexico (2)
- University of Pennsylvania Carey Law School (2)
- Air Force Institute of Technology (1)
- Edith Cowan University (1)
- Florida International University (1)
- Liberty University (1)
- Montclair State University (1)
- Seattle Pacific University (1)
- Keyword
-
- Automation (2)
- Biometrics (2)
- Chaos (2)
- Cloud computing (2)
- Content analysis (2)
-
- Internet (2)
- Noise (2)
- Academic Libraries (1)
- Academic social network (1)
- Accountant (1)
- Accuracy (1)
- Activity Recognition (1)
- Air Traffic Controller (1)
- Air Traffic Data (1)
- Algorithm (1)
- Android (1)
- Angle of arrival (1)
- Anomaly detection (1)
- Atmospheric measurements (1)
- Audit (1)
- Authentication (1)
- Autonomous (1)
- BIM (1)
- Backdoors (1)
- Behavioral Finance (1)
- Bike (1)
- Blockchain (1)
- Broadcasting (1)
- CAN (1)
- Cable (1)
- Publication
-
- Research Collection School Of Computing and Information Systems (12)
- Information Science Faculty Publications (5)
- Conference papers (4)
- All Faculty Scholarship (2)
- Branch Mathematics and Statistics Faculty and Staff Publications (2)
-
- CSE Technical Reports (2)
- Computational Modeling & Simulation Engineering Faculty Publications (2)
- Information Technology & Decision Sciences Faculty Publications (2)
- Publications and Research (2)
- AFIT Patents (1)
- Community & Leadership Development Faculty Publications (1)
- Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research (1)
- Department of Computer Science Faculty Scholarship and Creative Works (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research (1)
- Electrical & Computer Engineering Faculty Publications (1)
- Engineering Technology Faculty Publications (1)
- FIU Electronic Theses and Dissertations (1)
- Information Technology Services: Publications (1)
- Library Philosophy and Practice (e-journal) (1)
- Research Collection School Of Accountancy (1)
- Research outputs 2014 to 2021 (1)
- SPU Works (1)
- Senior Honors Theses (1)
Articles 31 - 48 of 48
Full-Text Articles in Computer Engineering
Co-Design Of Security Aware Power System Distribution Architecture As Cyber Physical System, Tarek Youssef
Co-Design Of Security Aware Power System Distribution Architecture As Cyber Physical System, Tarek Youssef
FIU Electronic Theses and Dissertations
The modern smart grid would involve deep integration between measurement nodes, communication systems, artificial intelligence, power electronics and distributed resources. On one hand, this type of integration can dramatically improve the grid performance and efficiency, but on the other, it can also introduce new types of vulnerabilities to the grid. To obtain the best performance, while minimizing the risk of vulnerabilities, the physical power system must be designed as a security aware system.
In this dissertation, an interoperability and communication framework for microgrid control and Cyber Physical system enhancements is designed and implemented taking into account cyber and physical security …
The Design And Implementation Of A Pcie-Based Less Label Switch, Amy C. Williams
The Design And Implementation Of A Pcie-Based Less Label Switch, Amy C. Williams
Senior Honors Theses
With the explosion of the Internet of Things, the number of smart, embedded devices has grown exponentially in the last decade, with growth projected at a commiserate rate. These devices create strain on the existing infrastructure of the Internet, creating challenges with scalability of routing tables and reliability of packet delivery. Various schemes based on Location-Based Forwarding and ID-based routing have been proposed to solve the aforementioned problems, but thus far, no solution has completely been achieved. This thesis seeks to improve current proposed LORIF routers by designing, implementing, and testing and a PCIe-based LESS switch to process unrouteable packets …
Lightweight Three-Factor Authentication And Key Agreement Protocol For Internet-Integrated Wireless Sensor Networks, Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He
Lightweight Three-Factor Authentication And Key Agreement Protocol For Internet-Integrated Wireless Sensor Networks, Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He
Information Science Faculty Publications
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the Internet. Despite the great potential of this integration, it also brings new threats, such as the exposure of sensor nodes to attacks originating from the Internet. In this context, lightweight authentication and key agreement protocols must be in place to enable end-to-end secure communication. Recently, Amin et al. proposed a three-factor mutual authentication protocol for WSNs. However, we identified several flaws in their protocol. We found that their …
Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li
Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li
Information Science Faculty Publications
Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity-based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will …
Isbord: Internet Searching Based On Resource Description, Zhiwei Yan, Sherali Zeadally, Guanggang Geng
Isbord: Internet Searching Based On Resource Description, Zhiwei Yan, Sherali Zeadally, Guanggang Geng
Information Science Faculty Publications
Based on the Information-Centric Networking (ICN) concept and the mature model of the current TCP/IP-based Internet, we propose content searching based on universal and scalable resource description, namely ISBORD (Internet Searching based on Resource Description). This novel concept aims to improve the efficiency of content searching and simplifies the end-user functionality to support the evolution of the content-centric Internet.
On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge
On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge
Conference papers
Cloud computing security issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National Security Agency causing confidence in public encryption to drop even further. Our solution allows the end-user to add a layer of unbreakable security by encrypting the data locally with a random number generator prior to uploading data to the Cloud. The prototype one-time pad generator is impervious to cryptanalysis because it generates unbreakable random binary sequences from chaos sources initiated from a natural noise. …
Promoting Information Resources To Students: Using Wordpress To Maintain Library Data Sets, Derek Stadler
Promoting Information Resources To Students: Using Wordpress To Maintain Library Data Sets, Derek Stadler
Publications and Research
Although it began as a blog tool, WordPress has grown into a complete content management system with thousands of interactive themes available. Since it uses the MySQL database management system, the open-source software suits the needs of library websites by aggregating a college library’s complete database inventory. Rather than update several HTML pages within a site when new vendors are added or a URL is changed, information from vendors can be maintained in a database table and then displayed to students, highlighting available resources and information. The presentation highlights the use of some simple WordPress plugins to manage many aggregators …
Smart Underground Antenna Arrays: A Soil Moisture Adaptive Beamforming Approach, Abdul Salam, Mehmet C. Vuran
Smart Underground Antenna Arrays: A Soil Moisture Adaptive Beamforming Approach, Abdul Salam, Mehmet C. Vuran
CSE Technical Reports
In this paper, a novel framework for underground beamforming using adaptive antenna arrays is presented. Based on the analysis of propagation in wireless underground channel, a theoretical model is developed which uses soil moisture information and feedback mechanism to improve performance wireless underground communications. Array element in soil has been analyzed empirically and impacts of soil type and soil moisture on return loss and resonant frequency are investigated. Beam patterns are investigated to communicate with both underground and above ground devices. Depending on the incident angle, refraction from soil-air interface has the adverse effects in the UG communications. It is …
Analysing The Behaviour Of Online Investors In Times Of Geopolitical Distress: A Case Study On War Stocks, James Usher, Pierpaolo Dondio
Analysing The Behaviour Of Online Investors In Times Of Geopolitical Distress: A Case Study On War Stocks, James Usher, Pierpaolo Dondio
Conference papers
In this paper we analyse how the behavior of an online financial community in time of geopolitical crises. In particular, we studied the behaviour, composition and communication patterns of online investors before and after a military geopolitical event. We selected a set of 23 key-events belonging to the 2003 US-led invasion of Iraq, the Arab Spring and the first period of the Ukraine crisis. We restricted our study to a set of eight so called military stocks, which are US-manufacturing companies active in the defence sector. We studied the resilience of the community to information shocks by comparing the community …
Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan
Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan
Information Technology & Decision Sciences Faculty Publications
The industrial wireless sensor network (IWSN) is the next frontier in the Industrial Internet of Things (IIoT), which is able to help industrial organizations to gain competitive advantages in industrial manufacturing markets by increasing productivity, reducing the costs, developing new products and services, and deploying new business models.
Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai
Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai
Information Technology & Decision Sciences Faculty Publications
As cloud computing becomes increasingly popular, cloud providers compete to offer the same or similar services over the Internet. Quality of service (QoS), which describes how well a service is performed, is an important differentiator among functionally equivalent services. It can help a firm to satisfy and win its customers. As a result, how to assist cloud providers to promote their services and cloud consumers to identify services that meet their QoS requirements becomes an important problem. In this paper, we argue for QoS-based cloud service recommendation, and propose a collaborative filtering approach using the Spearman coefficient to recommend cloud …
Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry
Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry
Computational Modeling & Simulation Engineering Faculty Publications
This paper investigates the secrecy rates and optimal power allocation schemes for a decode-and-forward wiretap relay channel where the transmission from a source to a destination is aided by a relay operating in a full-duplex (FD) mode under practical residual self-interference. By first considering static channels, we address the non-convex optimal power allocation problems between the source and relay nodes under individual and joint power constraints to establish closed-form solutions. An asymptotic analysis is then given to provide important insights on the derived power allocation solutions. Specifically, by using the method of dominant balance, it is demonstrated that full power …
Hoeffding Tree Algorithms For Anomaly Detection In Streaming Datasets: A Survey, Asmah Muallem, Sachin Shetty, Jan W. Pan, Juan Zhao, Biswajit Biswal
Hoeffding Tree Algorithms For Anomaly Detection In Streaming Datasets: A Survey, Asmah Muallem, Sachin Shetty, Jan W. Pan, Juan Zhao, Biswajit Biswal
Computational Modeling & Simulation Engineering Faculty Publications
This survey aims to deliver an extensive and well-constructed overview of using machine learning for the problem of detecting anomalies in streaming datasets. The objective is to provide the effectiveness of using Hoeffding Trees as a machine learning algorithm solution for the problem of detecting anomalies in streaming cyber datasets. In this survey we categorize the existing research works of Hoeffding Trees which can be feasible for this type of study into the following: surveying distributed Hoeffding Trees, surveying ensembles of Hoeffding Trees and surveying existing techniques using Hoeffding Trees for anomaly detection. These categories are referred to as compositions …
Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey
Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey
All Faculty Scholarship
This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity to the …
Computation Of Shortest Path Problem In A Network With Sv-Triangular Neutrosophic Numbers, Florentin Smarandache, Said Broumi, Assia Bakali, Mohamed Talea
Computation Of Shortest Path Problem In A Network With Sv-Triangular Neutrosophic Numbers, Florentin Smarandache, Said Broumi, Assia Bakali, Mohamed Talea
Branch Mathematics and Statistics Faculty and Staff Publications
In this article, we present an algorithm method for finding the shortest path length between a paired nodes on a network where the edge weights are characterized by single valued triangular neutrosophic numbers. The proposed algorithm gives the shortest shortest path length from source node to destination node based on a ranking method. Finally, a numerical example is also presented to illustrate the efficiency of the proposed approach.
The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp
The Discrete Spring Transform: An Innovative Steganographic Attack, Aaron T. Sharp
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Digital Steganography continues to evolve today, where steganographers are constantly discovering new methodologies to hide information effectively. Despite this, steganographic attacks, which seek to defeat these techniques, have continually lagged behind. The reason for this is simple: it is exceptionally difficult to defeat the unknown. Most attacks require prior knowledge or study of existing techniques in order to defeat them, and are often highly specific to certain cover media. These constraints are impractical and unrealistic to defeat steganography in modern communication networks. It follows, an effective steganographic attack must not require prior knowledge or study of techniques, and must be …
An Operational View In Computational Construction Of Information, Florentin Smarandache, Stefan Vladutescu, Constantin Dima, Valeriu Voinea
An Operational View In Computational Construction Of Information, Florentin Smarandache, Stefan Vladutescu, Constantin Dima, Valeriu Voinea
Branch Mathematics and Statistics Faculty and Staff Publications
The paper aims to explain the technology of emergence of information. Our research proves that information as communicational product is the result of processing within some operations, actions, mechanisms and strategies of informational material meanings. Are determined eight computational-communicative operations of building information. Information occurs in two communication phases, syncretic and the segregation-synthetic. The syncretic phase consists of four operations: referral of significant field, primary delimitation of information, detection-looking information and an anticipative-draft constitution (feedforward). The segregation-synthetic phase also includes four operations: discrimination, identification, interpretation and confrontation (feedback). In the future we will investigate informational actions, mechanisms and strategies.
A Mobile Platform Using Software Defined Radios For Wireless Communication Systems Experimentation, Otilia Popescu, Shiny Abraham, Samy El-Tawab
A Mobile Platform Using Software Defined Radios For Wireless Communication Systems Experimentation, Otilia Popescu, Shiny Abraham, Samy El-Tawab
Engineering Technology Faculty Publications
A distinctive feature of wireless communication systems is implied by the fact that there is no physical connection between the transmitter and its corresponding receiver, which enables user mobility. However, experimenting with wireless communication systems is mostly done in the lab, where transmitters and receivers are setup on benches, in stationary settings. This prevents students from experiencing fading and other propagation effects associated with mobile wireless channels. This paper describes a mobile platform for wireless communication experimentation that enables students to run experiments beyond the confines of a traditional lab, in realistic settings that cover indoor and outdoor scenarios with …