Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson Apr 2020

Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson

Electrical & Computer Engineering Theses & Dissertations

The current naval strategy is based on a distributed force, networked together with high-speed communications that enable operations as an intelligent, fast maneuvering force. Satellites, the existing network connector, are weak and vulnerable to attack. HF is an alternative, but it does not have the information throughput to meet the distributed warfighting need. The US Navy does not have a solution to reduce dependency on space-based communication systems while providing the warfighter with the required information speed.

Virtual SATCOM is a solution that can match satellite communications (SATCOM) data speed without the vulnerable satellite. It is wireless communication on a …


A Multi-Agent Systems Approach For Analysis Of Stepping Stone Attacks, Marco Antonio Gamarra Oct 2019

A Multi-Agent Systems Approach For Analysis Of Stepping Stone Attacks, Marco Antonio Gamarra

Electrical & Computer Engineering Theses & Dissertations

Stepping stone attacks are one of the most sophisticated cyber-attacks, in which attackers make a chain of compromised hosts to reach a victim target. In this Dissertation, an analytic model with Multi-Agent systems approach has been proposed to analyze the propagation of stepping stones attacks in dynamic vulnerability graphs. Because the vulnerability configuration in a network is inherently dynamic, in this Dissertation a biased min-consensus technique for dynamic graphs with fixed and switching topology is proposed as a distributed technique to calculate the most vulnerable path for stepping stones attacks in dynamic vulnerability graphs. We use min-plus algebra to analyze …


Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi Jan 2018

Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi

Electrical & Computer Engineering Theses & Dissertations

In a wireless system, transmitted electromagnetic waves can propagate in all directions and can be received by other users in the system. The signals received by unintended receivers pose two problems; increased interference causing lower system throughput or successful decoding of the information which removes secrecy of the communication. Radio frequency spectrum is a scarce resource and it is allocated by technologies already in use. As a result, many communication systems use the spectrum opportunistically whenever it is available in cognitive radio setting or use unlicensed bands. Hence, efficient use of spectrum by sharing users is crucial to increase maximize …