Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Network Management, Optimization And Security With Machine Learning Applications In Wireless Networks, Mariam Nabil Dec 2021

Network Management, Optimization And Security With Machine Learning Applications In Wireless Networks, Mariam Nabil

Theses and Dissertations

Wireless communication networks are emerging fast with a lot of challenges and ambitions. Requirements that are expected to be delivered by modern wireless networks are complex, multi-dimensional, and sometimes contradicting. In this thesis, we investigate several types of emerging wireless networks and tackle some challenges of these various networks. We focus on three main challenges. Those are Resource Optimization, Network Management, and Cyber Security. We present multiple views of these three aspects and propose solutions to probable scenarios. The first challenge (Resource Optimization) is studied in Wireless Powered Communication Networks (WPCNs). WPCNs are considered a very promising approach towards sustainable, …


Enhanced Interest Aware Peoplerank For Opportunistic Mobile Social Networks, Yosra Saad Shahin Jan 2021

Enhanced Interest Aware Peoplerank For Opportunistic Mobile Social Networks, Yosra Saad Shahin

Theses and Dissertations

Network infrastructures are being continuously challenged by increased demand, resource-hungry applications, and at times of crisis when people need to work from homes such as the current Covid-19 epidemic situation, where most of the countries applied partial or complete lockdown and most of the people worked from home. Opportunistic Mobile Social Networks (OMSN) prove to be a great candidate to support existing network infrastructures. However, OMSNs have copious challenges comprising frequent disconnections and long delays. we aim to enhance the performance of OMSNs including delivery ratio and delay. We build upon an interest-aware social forwarding algorithm, namely Interest Aware PeopleRank …


A General Framework For Characterizing And Evaluating Attacker Models For Cps Security Assessment, Christopher S. Deloglos, Christopher Deloglos Jan 2021

A General Framework For Characterizing And Evaluating Attacker Models For Cps Security Assessment, Christopher S. Deloglos, Christopher Deloglos

Theses and Dissertations

Characterizing the attacker’s perspective is essential to assessing the security posture and resilience of cyber-physical systems. The attacker’s perspective is most often achieved by cyber-security experts (e.g., red teams) who critically challenge and analyze the system from an adversarial stance. Unfortunately, the knowledge and experience of cyber-security experts can be inconsistent leading to situations where there are gaps in the security assessment of a given system. Structured security review processes (such as TAM, Mission Aware, STPA-SEC, and STPA-SafeSec) attempt to standardize the review processes to impart consistency across an organization or application domain. However, with most security review processes, the …