Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Agile (1)
- Android (1)
- Android vulnerability (1)
- Anomaly Detection (1)
- Computer crimes (1)
-
- Computer networks Security measures (1)
- Evaluation (1)
- Galaxy S2 (1)
- Hackers (1)
- Higher Education (1)
- Intrusion Detection (1)
- JSON (1)
- Literacy (1)
- Malware injection (1)
- Mobile malware (1)
- N-gram analysis (1)
- Privacy (1)
- Random Forest (1)
- Routers (Computer networks) Security measures (1)
- Security systems (1)
- Shannon Entropy (1)
- TCP/IP (Computer network protocol) Security measures (1)
- The Sword of the Spirit (1)
- Web Application Security (1)
- Web Service Security (1)
- World wide web (1)
- Zitmo (1)
Articles 1 - 9 of 9
Full-Text Articles in Computer Engineering
Arkhe - Unmanned Detection Robot, Hannah Klooster
Arkhe - Unmanned Detection Robot, Hannah Klooster
Senior Honors Theses and Projects
Our project is an Unmanned Thermal Detection Robot. Our robot contains a visual camera, a sonar sensor, and a thermal sensor. This project involves hardware building and coding of the sensors and robot itself. The purpose of this project is to create an accessible and affordable unmanned robot with sensors capable of being able to detect human life forms in disaster areas, or areas inaccessible to humans, and to protect the lives of rescuers, find people in disaster areas quicker, and to help save lives. Our project has successfully created an affordable robot that uses sensors to detect and avoid …
The Influence Of Employee's Perceptions Of Top Management Support, Information Technology Competence, Technology Strategy, Organizational Climate, And Organization's Nationality On Information Systems Security, And Quality Success, Saud Fawwaz Alsahli
Master's Theses and Doctoral Dissertations
This research investigated the relationship between levels of top management, information technology, competence, technology strategy, and organizational climate within an organization and organization’s success of information systems. The study conducted a quantitative study of 120 employees working for two organizations within the Ministry of Interior in Saudi Arabia and determine whether organizational attributes affect changes in information systems success. In addition, an American organization (40 employees) was used as a comparison. The analysis of the study found that top management support, information technology competence, technology strategy, and organizational climate were strongly correlated with information systems success in Saudi organizations. In …
Developing A Website For The Sword Of The Spirit Using An Agile Development Approach, James Smith
Developing A Website For The Sword Of The Spirit Using An Agile Development Approach, James Smith
Senior Honors Theses and Projects
This creative project was created using an agile development process. Working in coordination with an organization called the Sword of the Spirit, a website was developed for their use. Using the agile approach, multiple iterations of the project were created and brought back to the organization for testing and feedback. The website was developed and is currently working here: https://sites.google.com/view/sosovemight/home.
For this project, a website, administrative email, and data collection and storage process were created. Security was added to ensure only registered profile holders would be able to view the information on the website. This was developed solely for the …
Detection Of Malicious Content In Json Structured Data Using Multiple Concurrent Anomaly Detection Methods, Brett N. Miller
Detection Of Malicious Content In Json Structured Data Using Multiple Concurrent Anomaly Detection Methods, Brett N. Miller
Master's Theses and Doctoral Dissertations
Web applications and Web services often use a data format known as JavaScript Object Notation (JSON) to exchange information. An attacker can tamper with these exchanges to cause the Web service or application to malfunction in a way that is detrimental to the interests of the owners of the Web application or service. Many such applications or services are involved in processes critical to safety or are vital to business interests. Unfortunately, such critical applications cannot always be relied upon to validate the data sent to them. This creates a need for protection external to the applications themselves. This need …
Information And Communication Technology (Ict) Literacy: Refining A Construct For Assessment, Louis Michael Verdusco
Information And Communication Technology (Ict) Literacy: Refining A Construct For Assessment, Louis Michael Verdusco
Master's Theses and Doctoral Dissertations
This research effort conceptualized, developed, implemented, and examined the psychometric properties of an Information & Communication Technology (ICT) literacy assessment instrument designed for students entering college. This process began with the development of a working definition of the ICT literacy based on the literature and the input of a panel of experts regarding the proposed literacy sub-constructs and the individual test items. A pilot test was conducted to identify areas for improvement. Once these improvements were incorporated, the final assessment instrument was administered to the freshmen class at a private Midwestern comprehensive university with religious affiliation.
The psychometric aspects of …
Mobile Device Vulnerabilities & Securities, Luke Rondeau
Mobile Device Vulnerabilities & Securities, Luke Rondeau
Senior Honors Theses and Projects
An investigation on current mobile vulnerabilities and research into security. Also, a proof of concept to show the ease of injecting an Android phone with a virus.
Eastern Michigan University Honors College Application Online System, Andrew Greiner
Eastern Michigan University Honors College Application Online System, Andrew Greiner
Senior Honors Theses and Projects
No abstract provided.
A Novel Defense Mechanism Against Web Crawler Intrusion, Alireza Aghamohammadi
A Novel Defense Mechanism Against Web Crawler Intrusion, Alireza Aghamohammadi
Master's Theses and Doctoral Dissertations
Web robots also known as crawlers or spiders are used by search engines, hackers and spammers to gather information about web pages. Timely detection and prevention of unwanted crawlers increases privacy and security of websites. In this research, a novel method to identify web crawlers is proposed to prevent unwanted crawler to access websites. The proposed method suggests a five-factor identification process to detect unwanted crawlers. This study provides the pretest and posttest results along with a systematic evaluation of web pages with the proposed identification technique versus web pages without the proposed identification process. An experiment was performed with …
A Model To Study Cyber Attack Mechanics And Denial-Of-Service Exploits Over The Internet's Router Infrastructure Using Colored Petri Nets, Lawrence M. Healy
A Model To Study Cyber Attack Mechanics And Denial-Of-Service Exploits Over The Internet's Router Infrastructure Using Colored Petri Nets, Lawrence M. Healy
Master's Theses and Doctoral Dissertations
The Internet‟s router infrastructure, a scale-free computer network, is vulnerable to targeted denial-of-service (DoS) attacks. Protecting this infrastructure‟s stability is a vital national interest because of the dependence of economic and national security transactions on the Internet. Current defensive countermeasures that rely on monitoring specific router traffic have been shown to be costly, inefficient, impractical, and reactive rather than anticipatory.
To address these issues, this research investigation considers a new paradigm that relies on the systemic changes that occur during a cyber attack, rather than individual router traffic anomalies. It has been hypothesized in the literature that systemic knowledge of …