Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Electronic Theses and Dissertations

Theses/Dissertations

Computer networks--Security measures

Publication Year

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

A Forensics Software Toolkit For Dna Steganalysis., Marc Bjoern Beck May 2015

A Forensics Software Toolkit For Dna Steganalysis., Marc Bjoern Beck

Electronic Theses and Dissertations

Recent advances in genetic engineering have allowed the insertion of artificial DNA strands into the living cells of organisms. Several methods have been developed to insert information into a DNA sequence for the purpose of data storage, watermarking, or communication of secret messages. The ability to detect, extract, and decode messages from DNA is important for forensic data collection and for data security. We have developed a software toolkit that is able to detect the presence of a hidden message within a DNA sequence, extract that message, and then decode it. The toolkit is able to detect, extract, and decode …


Privacy Protection In Context Aware Systems., Anala Aniruddha Pandit May 2014

Privacy Protection In Context Aware Systems., Anala Aniruddha Pandit

Electronic Theses and Dissertations

Smartphones, loaded with users’ personal information, are a primary computing device for many. Advent of 4G networks, IPV6 and increased number of subscribers to these has triggered a host of application developers to develop softwares that are easy to install on the mobile devices. During the application download process, users accept the terms and conditions that permit revelation of private information. The free application markets are sustainable as the revenue model for most of these service providers is through profiling of users and pushing advertisements to the users. This creates a serious threat to users privacy and hence it is …


A Water Distribution And Treatment Simulation For Testing Cyber Security Enhancements For Water Sector Scada Systems., Justin Robert Adams Jul 2011

A Water Distribution And Treatment Simulation For Testing Cyber Security Enhancements For Water Sector Scada Systems., Justin Robert Adams

Electronic Theses and Dissertations

Supervisory control and data acquisition (SCADA) systems are used by many critical infrastructures including electric power production and distribution, water and waste water treatment, rail transportation, and gas and oil distribution. Originally isolated proprietary systems, SCADA systems are increasingly connected to enterprise networks and the Internet and today use commercial hardware and software. As a result SCADA systems now face serious cyber-security threats. The need for testing and evaluation of developed cyber-security solutions presents a challenge since evaluation on actual systems is usually not possible and building complete physical testbeds is costly. This thesis presents the design and development of …


Intrusion Detection And Response Model For Mobile Ad Hoc Networks., Sathishkumar Alampalayam 1974- May 2007

Intrusion Detection And Response Model For Mobile Ad Hoc Networks., Sathishkumar Alampalayam 1974-

Electronic Theses and Dissertations

This dissertation presents a research whose objective is to design and develop an intrusion detection and response model for Mobile Ad hoc NETworks (MANET). Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without any centralized authority. These unique MANET characteristics present several changes to secure them. The proposed security model is called the Intrusion Detection and Response for Mobile Ad hoc Networks (IDRMAN). The goal of the proposed model is to provide a security framework that will detect various attacks and take appropriate measures to control the attack automatically. This model is based on identifying critical system …