Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
A Forensics Software Toolkit For Dna Steganalysis., Marc Bjoern Beck
A Forensics Software Toolkit For Dna Steganalysis., Marc Bjoern Beck
Electronic Theses and Dissertations
Recent advances in genetic engineering have allowed the insertion of artificial DNA strands into the living cells of organisms. Several methods have been developed to insert information into a DNA sequence for the purpose of data storage, watermarking, or communication of secret messages. The ability to detect, extract, and decode messages from DNA is important for forensic data collection and for data security. We have developed a software toolkit that is able to detect the presence of a hidden message within a DNA sequence, extract that message, and then decode it. The toolkit is able to detect, extract, and decode …
Privacy Protection In Context Aware Systems., Anala Aniruddha Pandit
Privacy Protection In Context Aware Systems., Anala Aniruddha Pandit
Electronic Theses and Dissertations
Smartphones, loaded with users’ personal information, are a primary computing device for many. Advent of 4G networks, IPV6 and increased number of subscribers to these has triggered a host of application developers to develop softwares that are easy to install on the mobile devices. During the application download process, users accept the terms and conditions that permit revelation of private information. The free application markets are sustainable as the revenue model for most of these service providers is through profiling of users and pushing advertisements to the users. This creates a serious threat to users privacy and hence it is …
A Water Distribution And Treatment Simulation For Testing Cyber Security Enhancements For Water Sector Scada Systems., Justin Robert Adams
A Water Distribution And Treatment Simulation For Testing Cyber Security Enhancements For Water Sector Scada Systems., Justin Robert Adams
Electronic Theses and Dissertations
Supervisory control and data acquisition (SCADA) systems are used by many critical infrastructures including electric power production and distribution, water and waste water treatment, rail transportation, and gas and oil distribution. Originally isolated proprietary systems, SCADA systems are increasingly connected to enterprise networks and the Internet and today use commercial hardware and software. As a result SCADA systems now face serious cyber-security threats. The need for testing and evaluation of developed cyber-security solutions presents a challenge since evaluation on actual systems is usually not possible and building complete physical testbeds is costly. This thesis presents the design and development of …
Intrusion Detection And Response Model For Mobile Ad Hoc Networks., Sathishkumar Alampalayam 1974-
Intrusion Detection And Response Model For Mobile Ad Hoc Networks., Sathishkumar Alampalayam 1974-
Electronic Theses and Dissertations
This dissertation presents a research whose objective is to design and develop an intrusion detection and response model for Mobile Ad hoc NETworks (MANET). Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without any centralized authority. These unique MANET characteristics present several changes to secure them. The proposed security model is called the Intrusion Detection and Response for Mobile Ad hoc Networks (IDRMAN). The goal of the proposed model is to provide a security framework that will detect various attacks and take appropriate measures to control the attack automatically. This model is based on identifying critical system …