Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

California Polytechnic State University, San Luis Obispo

Theses/Dissertations

2017

Security

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Modeling Autonomous Vehicles Through Radio Controlled Cars, Eva S. Chen Jun 2017

Modeling Autonomous Vehicles Through Radio Controlled Cars, Eva S. Chen

Computer Engineering

Autonomous vehicles have a lot of potential in improving people’s everyday lives. They could reduce congestion, reduce collisions, enhance mobility, and more. But with these benefits come security and privacy risks. In order to research and test some of these risks, we are building a set of scale autonomous cars that can model autonomous and collaborative behaviors. One such behaviour would be platooning, where a group of vehicles can travel closely together at high speeds by following a lead car. We are doing this with various sensors and control algorithms to allow for future modularity.


Rules Based Analysis Engine For Application Layer Ids, David Scrobonia May 2017

Rules Based Analysis Engine For Application Layer Ids, David Scrobonia

Master's Theses

Web application attack volume, complexity, and costs have risen as people, companies, and entire industries move online. Solutions implemented to defend web applications against malicious activity have traditionally been implemented at the network or host layer. While this is helpful for detecting some attacks, it does not provide the gran- ularity to see malicious behavior occurring at the application layer. The AppSensor project, an application level intrusion detection system (IDS), is an example of a tool that operates in this layer. AppSensor monitors users within the application by observing activity in suspicious areas not able to be seen by traditional …