Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Air Force Institute of Technology (21)
- Institute of Business Administration (9)
- Selected Works (9)
- Old Dominion University (5)
- SelectedWorks (5)
-
- California Polytechnic State University, San Luis Obispo (4)
- Technological University Dublin (4)
- Cleveland State University (3)
- Edith Cowan University (3)
- University of Pennsylvania Carey Law School (3)
- Johnson County Community College (2)
- Morehead State University (2)
- San Jose State University (2)
- University of Georgia School of Law (2)
- California State University, San Bernardino (1)
- Eastern Michigan University (1)
- Embry-Riddle Aeronautical University (1)
- Florida International University (1)
- Grand Valley State University (1)
- University of Massachusetts Amherst (1)
- University of Nebraska - Lincoln (1)
- University of Nevada, Las Vegas (1)
- University of Wollongong (1)
- Keyword
-
- Computer networks--Security measures (8)
- Internet (4)
- #antcenter (3)
- Bandwidth (3)
- Routing protocols (3)
-
- Wireless sensor networks (3)
- Ad hoc networks (Computer networks) (2)
- Authentication (2)
- Clustering (2)
- Computer networks (2)
- Computer networks--Management (2)
- Computer security (2)
- Data protection (2)
- Delay (2)
- Internet telephony (2)
- Multicast (2)
- Networking (2)
- Node capture attacks (2)
- Proactive routing (2)
- Security (2)
- Wireless networks (2)
- AFDMA (1)
- Adaptive control systems (1)
- Adaptive multicast (1)
- Adaptive optics (1)
- Adversary models (1)
- Air defenses--United States (1)
- Air warfare (1)
- Algorithms (1)
- Antenna arrays (1)
- Publication
-
- Theses and Dissertations (20)
- International Conference on Information and Communication Technologies (9)
- vijay singh (5)
- All Faculty Scholarship (3)
- Electrical and Computer Engineering Faculty Publications (3)
-
- Master's Theses (3)
- Patrick Tague (3)
- Articles (2)
- Australian Information Warfare and Security Conference (2)
- Computer Science Faculty Publications (2)
- Conference papers (2)
- Electrical & Computer Engineering Theses & Dissertations (2)
- Morehead State Theses and Dissertations (2)
- Presentations (2)
- Ray Bareiss (2)
- Robert Henry Morelos-Zaragoza (2)
- SIDLIT Conference Proceedings (2)
- Computer Science Presentations (1)
- Computer Science and Software Engineering (1)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (1)
- Culminating Experience Projects (1)
- FIU Electronic Theses and Dissertations (1)
- Faculty Publications (1)
- Faculty of Informatics - Papers (Archive) (1)
- Hong-Ning Dai (1)
- Master's Theses and Doctoral Dissertations (1)
- Masters Theses 1911 - February 2014 (1)
- Publications (1)
- Robert P. Minch (1)
- Theses Digitization Project (1)
- Publication Type
- File Type
Articles 31 - 60 of 83
Full-Text Articles in Computer Engineering
Using Timed-Release Cryptography To Mitigate The Preservation Risk Of Embargo Periods, Rabia Haq, Michael L. Nelson
Using Timed-Release Cryptography To Mitigate The Preservation Risk Of Embargo Periods, Rabia Haq, Michael L. Nelson
Computer Science Presentations
PDF of a powerpoint presentation from the 2009 ACM/IEEE Joint Conference on Digital Libraries, Austin, Texas, June 15-19, 2009. Also available on Slideshare.
Internet-Scale Reactive Routing And Mobility, Daniel B. Nelson
Internet-Scale Reactive Routing And Mobility, Daniel B. Nelson
Master's Theses
Since its commercialization, the Internet has grown exponentially. A large variety of devices can communicate creating advanced services for a diverse ecosystem of applications. However, as the number of Internet hosts has grown, the size of routing tables required to correctly route data between them has also increased exponentially. This growth rate necessitates increasingly frequent upgrades to routing device hardware, providing them with additional memory for fast-access storage of route information. These upgrades are both physically and fiscally untenable, and a new Internet routing solution is necessary for future growth.
This research focuses around an incrementally deployable, reactive routing system …
General Direction Routing Protocol, Sean Michael Lydon
General Direction Routing Protocol, Sean Michael Lydon
Master's Theses
The General Direction Routing Protocol (GDRP) is a Wireless Sensor Network (WSN)
multi-path routing protocol which abstracts localization information (commonly GPS
coordinates) into relative direction information in order to perform routing decisions. By
generating relative direction information GDRP is able to operate with fewer precision
requirements than other protocols. This abstraction also allows the integration of other emerging
hardware-based localization techniques, for example, Beamforming Sensor Arrays.
GDRP does not specifically address the next hop a packet should take, but instead specifies a
direction it should travel. This direction abstraction allows for multiple paths to be taken through
the network thus …
Store And Forward Routing For Sparse Pico-Satellite Sensor Networks With Data-Mules, Trevor Joseph Koritza
Store And Forward Routing For Sparse Pico-Satellite Sensor Networks With Data-Mules, Trevor Joseph Koritza
Master's Theses
Satellites are playing an increasingly important role in collecting scientific information, providing communication services, and revolutionizing navigation. Until recently satellites were large and very expensive, creating a high barrier to entry that only large corporations and government agencies could overcome. In the past few years the CubeSat project at California Polytechnic University in San Luis Obispo (Cal Poly) has worked to refine the design and launching of small, lightweight, and less expensive satellites called pico-satellites, opening space up to a wider audience. Now that Cal Poly has the launch logistics and hardware under control, a new problem has arisen. These …
An Adaptive Adjacent Channel Interference Cancellation Technique, Robert H. Morelos-Zaragoza, Shobha Kuruba
An Adaptive Adjacent Channel Interference Cancellation Technique, Robert H. Morelos-Zaragoza, Shobha Kuruba
Robert Henry Morelos-Zaragoza
In this paper, an adaptive adjacent channel interference (ACI) technique is proposed. Results for BPSK modulation with rectangular and square-root raised-cosine pulse shaping, under AWGN conditions, are obtained showing the proposed method to be effective in improving performance under high levels of interference. Basically, the idea is to send pilot signals and then to use them in estimating the amount of ACI in the frequency domain. The estimated spectral error is used to modify tap weights of an adaptive frequency-domain filter. Our simulation results reported suggest that ACI can be effectively reduced with the proposed technique. At the system level, …
Adding Escience Assets To The Data Web, Herbert H. Van De Sompel, Carl Lagoze, Michael L. Nelson, Simeon Warner, Robert Sanderson, Pete Johnston
Adding Escience Assets To The Data Web, Herbert H. Van De Sompel, Carl Lagoze, Michael L. Nelson, Simeon Warner, Robert Sanderson, Pete Johnston
Computer Science Faculty Publications
Aggregations of Web resources are increasingly important in scholarship as it adopts new methods that are data-centric, collaborative, and networked-based. The same notion of aggregations of resources is common to the mashed-up, socially networked information environment of Web 2.0. We present a mechanism to identify and describe aggregations of Web resources that has resulted from the Open Archives Initiative - Object Reuse and Exchange (OAI-ORE) project. The OAI-ORE specifications are based on the principles of the Architecture of the World Wide Web, the Semantic Web, and the Linked Data effort. Therefore, their incorporation into the cyberinfrastructure that supports eScholarship will …
From General Technology Familiarity To Anti-Spyware Program Adoption: Comparison Between The U.S. And South Korea, Dong-Heon Kwak
From General Technology Familiarity To Anti-Spyware Program Adoption: Comparison Between The U.S. And South Korea, Dong-Heon Kwak
Morehead State Theses and Dissertations
A thesis presented to the faculty of the College of Business at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Dong-Heon Kwak on April 7, 2009.
Selecting The Best Network For The Labview Remote Control System To Achieve Better Performance, Sivakrishna Nannapaneni
Selecting The Best Network For The Labview Remote Control System To Achieve Better Performance, Sivakrishna Nannapaneni
Morehead State Theses and Dissertations
A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for Degree of Masters of Science by Sivakrishna Nannapaneni on April 6, 2009.
Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang
Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang
Electrical and Computer Engineering Faculty Publications
A proactive recovery scheme based on service migration for long-running Byzantine fault-tolerant systems is described. Proactive recovery is an essential method for ensuring the long-term reliability of fault-tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window under normal operation. This is achieved in two ways. First, the time-consuming reboot step is removed from the critical path of proactive recovery. Second, the response time and the service migration latency are continuously profiled and an optimal service migration interval is dynamically determined during runtime based on the observed …
Evaluating The Vulnerability Of Network Traffic Using Joint Security And Routing Analysis, Patrick Tague, David Slater, Jason Rogers, Radha Poovendran
Evaluating The Vulnerability Of Network Traffic Using Joint Security And Routing Analysis, Patrick Tague, David Slater, Jason Rogers, Radha Poovendran
Patrick Tague
Joint analysis of security and routing protocols in wireless networks reveals vulnerabilities of secure network traffic that remain undetected when security and routing protocols are analyzed independently. We formulate a class of continuous metrics to evaluate the vulnerability of network traffic as a function of security and routing protocols used in wireless networks. We develop two complementary vulnerability definitions using set theoretic and circuit theoretic interpretations of the security of network traffic, allowing a network analyst or an adversary to determine weaknesses in the secure network. We formalize node capture attacks using the vulnerability metric as a nonlinear integer programming …
Just The Facts, Ma’Am: Make The Web Your Investigative Partner, Anne Burnett
Just The Facts, Ma’Am: Make The Web Your Investigative Partner, Anne Burnett
Presentations
The web is a handy investigative tool, allowing a researcher to obtain information about persons, property and things. One can find email addresses, home addresses, telephone numbers, criminal records, military service information, property records, vital statistics information, photographs and more. This information may help locate a missing heir, reveal useful information about a potential expert witness, confirm the legitimacy of a business, determine who owns a piece of property or expose the litigious nature of a potential client. The focus in these program materials is on free resources, but I also cover a few fee-based services that can be accessed …
Anticipating Technological Change: Predictions, Trends And Gadgets, Carol A. Watson
Anticipating Technological Change: Predictions, Trends And Gadgets, Carol A. Watson
Presentations
With the current economic downtown, today's business environment is more competitive than ever. Businesses that distinguish themselves in any small way and provide cost-savings, can gain a significant advantage over their rivals. To emphasize the point, note that the ABA Techshow 2009 has a session titled: If You’re Not Serving Your Clients Online, Someone Else Will Be. It is, therefore, essential that attorneys harness technology and remain up-to-date on the latest computer developments . In this paper, I will begin by discussing technologies that are currently available on the web that will increase your abilities to collaborate, reduce your office …
A Taxonomy For And Analysis Of Anonymous Communications Networks, Douglas J. Kelly
A Taxonomy For And Analysis Of Anonymous Communications Networks, Douglas J. Kelly
Theses and Dissertations
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intended to gather intelligence and disrupt communications rapidly replacing the threat of conventional and nuclear attacks, a new age of warfare is at hand. In 2003, the United States acknowledged that the speed and anonymity of cyber attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult. Even President Obama’s Cybersecurity Chief-elect recognizes the challenge of increasingly sophisticated cyber attacks. Now through April 2009, the White House is reviewing federal cyber initiatives to protect US citizen privacy rights. Indeed, the rising quantity and ubiquity …
Decisive Routing And Admission Control According To Quality Of Service Constraints, Cindy C. Reese
Decisive Routing And Admission Control According To Quality Of Service Constraints, Cindy C. Reese
Theses and Dissertations
This research effort examines, models, and proposes options to enhance command and control for decision makers when applied to the communications network. My goal is to research the viability of combining three students’ past research efforts and expanding and enhancing those efforts. The area of this research is predicting a snapshot of the communications network, context-aware routing between network nodes, and Quality of Service-based routing optimization in order to create an intelligent routing protocol platform. It will consolidate efforts from an Intelligent Agent Based Framework to Maximize Information Utility by Captain John Pecarina, Dialable Cryptography for Wireless Networks by Major …
Using A Multiobjective Approach To Balance Mission And Network Goals Within A Delay Tolerant Network Topology, Anthony L. Larweck
Using A Multiobjective Approach To Balance Mission And Network Goals Within A Delay Tolerant Network Topology, Anthony L. Larweck
Theses and Dissertations
This thesis investigates how to incorporate aspects of an Air Tasking Order (ATO), a Communications Tasking Order (CTO), and a Network Tasking Order (NTO) within a cognitive network framework. This was done in an effort to aid the commander and or network operator by providing automation for battlespace management to improve response time and potential inconsistent problem resolution. In particular, autonomous weapon systems such as unmanned aerial vehicles (UAVs) were the focus of this research This work implemented a simple cognitive process by incorporating aspects of behavior based robotic control principles to solve the multi-objective optimization problem of balancing both …
The Benefits Of A Network Tasking Order In Combat Search And Rescue Missions, Murat Gocmen
The Benefits Of A Network Tasking Order In Combat Search And Rescue Missions, Murat Gocmen
Theses and Dissertations
Networked communications play a crucial role in United States Armed Forces operations. As the military moves towards more network centric (Net-Centric) operations, it becomes increasingly important to use the network as effectively as possible with respect to the overall mission. This thesis advocates the use of a Network Tasking Order (NTO), which allows operators to reason about the network based on asset movement, capabilities, and communication requirements. These requirements are likely to be derived from the Air Tasking Order (ATO), which gives insight into the plan for physical assets in a military mission. In this research we illustrate the benefit …
Using Covert Means To Establish Cybercraft Command And Control, Bradley D. Sevy
Using Covert Means To Establish Cybercraft Command And Control, Bradley D. Sevy
Theses and Dissertations
With the increase in speed and availability of computers, our nation's computer and information systems are being attacked with increased sophistication. The Air Force Research Laboratory (AFRL) Information Directorate (RI) is researching a next generation network defense architecture, called Cybercraft, that provides automated and trusted cyber defense capabilities for AF network assets. This research we consider the issues to protect or obfuscate command and control aspects of Cybercraft. In particular, we present a methodology to hide aspects of Cybercraft platform initialization in context to formation of hierarchical, peer-to-peer groups that collectively form the Cybercraft network. Because malicious code networks (known …
Evaluation Of An Opnet Model For Unmanned Aerial Vehicle Networks, Clifton M. Durham
Evaluation Of An Opnet Model For Unmanned Aerial Vehicle Networks, Clifton M. Durham
Theses and Dissertations
The concept of Unmanned Aerial Vehicles (UAVs) was first used as early as the American Civil War, when the North and the South unsuccessfully attempted to launch balloons with explosive devices. Since the American Civil War, the UAV concept has been used in all subsequent military operations. Over the last few years, there has been an explosion in the use of UAVs in military operations, as well as civilian and commercial applications. UAV Mobile Ad Hoc Networks (MANETs) are fast becoming essential to conducting Network-Centric Warfare (NCW). As of October 2006, coalition UAVs, exclusive of hand-launched systems, had flown almost …
Low Probability Of Intercept Waveforms Via Intersymbol Dither Performance Under Multipath Conditions, Jonathan K. Keen
Low Probability Of Intercept Waveforms Via Intersymbol Dither Performance Under Multipath Conditions, Jonathan K. Keen
Theses and Dissertations
This thesis examines the effects of multipath interference on Low Probability of Intercept (LPI) waveforms generated using intersymbol dither. LPI waveforms are designed to be difficult for non-cooperative receivers to detect and manipulate, and have many uses in secure communications applications. In prior research, such a waveform was designed using a dither algorithm to vary the time between the transmission of data symbols in a communication system. This work showed that such a method can be used to frustrate attempts to use non-cooperative receiver algorithms to recover the data. This thesis expands on prior work by examining the effects of …
The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis
The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis
Theses and Dissertations
This thesis examines the problem in initializing communications whereby cognitive radios need to find common spectrum with other cognitive radios, a process known as frequency rendezvous. It examines the rendezvous problem as it exists in a dynamic spectrum access cognitive network. Specifically, it addresses the problem of rendezvous in an infrastructureless environment. A new algorithm, the modular clock algorithm, is developed and analyzed as a solution for the simple rendezvous environment model, coupled with a modified version for environment models with less information. The thesis includes a taxonomy of commonly used environment models, and analysis of previous efforts to solve …
A Nsdv Approach For Channel Allocation Under Hybrid Mode Of Mobile Computing, Vijay Singh
A Nsdv Approach For Channel Allocation Under Hybrid Mode Of Mobile Computing, Vijay Singh
vijay singh
No abstract provided.
Biologically Inspired Metaheuristic Algorithm For Solving Symmetric Tsp, Vijay Singh
Biologically Inspired Metaheuristic Algorithm For Solving Symmetric Tsp, Vijay Singh
vijay singh
No abstract provided.
A Proposed Dsm-Secure Fair Allocation Cooperative Transactional Model For Manet., Vijay Singh
A Proposed Dsm-Secure Fair Allocation Cooperative Transactional Model For Manet., Vijay Singh
vijay singh
No abstract provided.
Numerical Analysis For Relevant Features In Intrusion Detection (Narfid), Jose Andres Gonzalez
Numerical Analysis For Relevant Features In Intrusion Detection (Narfid), Jose Andres Gonzalez
Theses and Dissertations
Identification of cyber attacks and network services is a robust field of study in the machine learning community. Less effort has been focused on understanding the domain space of real network data in identifying important features for cyber attack and network service classification. Motivations for such work allow for anomaly detection systems with less requirements on data “sniffed” off the network, extraction of features from the traffic, reduced learning time of algorithms, and ideally increased classification performance of anomalous behavior. This thesis evaluates the usefulness of a good feature subset for the general classification task of identifying cyber attacks and …
Voice Traffic Over Mobile Ad Hoc Networks: A Performance Analysis Of The Optimized Link State Routing Protocol, Lady Noreen P. Santos
Voice Traffic Over Mobile Ad Hoc Networks: A Performance Analysis Of The Optimized Link State Routing Protocol, Lady Noreen P. Santos
Theses and Dissertations
This thesis investigates the performance of the Optimized Link State Routing (OLSR) protocol on Voice over Internet Protocol (VoIP) applications in Mobile Ad hoc Networks (MANETs). Using VoIP over MANETs takes advantage of the mobility and versatility of a MANET environment and the flexibility and interoperability a digital voice format affords. Research shows that VoIP-like traffic can be routed through an ad hoc network using the Ad hoc On-demand Distance Vector routing protocol. This research determines the suitability of OLSR as a routing protocol for MANETs running VoIP applications. Representative VoIP traffic is submitted to a MANET and end-to-end delay …
Dynamic Interactions For Network Visualization And Simulation, Cigdem Yetisti
Dynamic Interactions For Network Visualization And Simulation, Cigdem Yetisti
Theses and Dissertations
Most network visualization suites do not interact with a simulator, as it executes. Nor do they provide an effective user interface that includes multiple visualization functions. The subject of this research is to improve the network visualization presented in the previous research [5] adding these capabilities to the framework. The previous network visualization did not have the capability of altering specific visualization characteristics, especially when detailed observations needed to be made for a small part of a large network. Searching for a network event in this topology might cause large delays leading to lower quality user interface. In addition to …
Stochastic Estimation And Control Of Queues Within A Computer Network, Mingook Kim
Stochastic Estimation And Control Of Queues Within A Computer Network, Mingook Kim
Theses and Dissertations
Captain Nathan C. Stuckey implemented the idea of the stochastic estimation and control for network in OPNET simulator. He used extended Kalman filter to estimate packet size and packet arrival rate of network queue to regulate queue size. To validate stochastic theory, network estimator and controller is designed by OPNET model. These models validated the transient queue behavior in OPNET and work of Kalman filter by predicting the queue size and arrival rate. However, it was not enough to verify a theory by experiment. So, it needed to validate the stochastic control theory with other tools to get high validity. …
Optimized Robust Adaptive Networks In Supervisory Control And Data Acquisition Systems, Luis A. Oquendo Class
Optimized Robust Adaptive Networks In Supervisory Control And Data Acquisition Systems, Luis A. Oquendo Class
Theses and Dissertations
This thesis investigates the application of a Exponential Weighted Moving Average (EWMA) to be used as a memory buffer in conjunction with Special Protection Schemes (SPS) using the Electric Power and Communication Synchronizing Simulator (EPOCHS). It is proposed that using an SPS incorporating EWMA can compensate for the network layer lack of guarantee of packet delivery and provide for the stability and integrity of the power grid under a catastrophic event. The performance of the proposed SPS is evaluated using a discrete event computer simulation developed using the NS2 network simulator and the Power System Simulator for Engineering (PSS/E) power …
The Evaluation Of Rekeying Protocols Within The Hubenko Architecture As Applied To Wireless Sensor Networks, Cory J. Antosh
The Evaluation Of Rekeying Protocols Within The Hubenko Architecture As Applied To Wireless Sensor Networks, Cory J. Antosh
Theses and Dissertations
This thesis investigates the impact of using three different rekeying protocols–pair-wise, hierarchical, and Secure Lock within a wireless sensor network (WSN) under the Hubenko architecture. Using a Matlab computer simulation, the impact of the three rekeying protocols on the number of bits transmitted across the network and the amount of battery power consumed in WSN nodes during rekey operations is investigated. Baseline pair-wise rekeying performance can be improved by using either Secure Lock or hierarchical rekeying. The best choice depends on the size of the WSN and the size of the key used. Hierarchical rekeying is the best choice for …
Chip To Chip Optical Interconnection Using Mems Mirrors, Tod V. Laurvick
Chip To Chip Optical Interconnection Using Mems Mirrors, Tod V. Laurvick
Theses and Dissertations
This experiment explores the use of MEMS mirrors to direct subsurface optical signals to another device and reception of those signals for use in chip to chip communications. Devices were built in PolyMUMPs to control horizontal and vertical beam direction and tilting in the outgoing signal and MEMS beam splitters for the incoming signal. Several elements of the outgoing beam path were successful and those which needed improvement indicate a high probability of success with limited trials needed and currently successful design elements could still be improved within the scope of PolyMUMPs. The incoming beam path elements were not successful …