Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Computer Engineering
Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana
Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana
KSU Proceedings on Cybersecurity Education, Research and Practice
The economic impact of Mobile IP, the standard that allows IP sessions to be maintained even when switching between different cellular towers or networks, has been staggering in terms of both scale and acceleration (Doherty, 2016). As voice communications transition to all-digital, all-IP networks such as 4G, there will be an increase in risk due to vulnerabilities, malware, and hacks that exist for PC-based systems and applications (Harwood, 2011). According to Gostev (2006), in June, 2004, a well-known Spanish virus collector known as VirusBuster, emailed the first known mobile phone virus to Kaspersky Lab, Moscow. Targeting the Symbian OS, the …
Comparative Study Of Dimension Reduction Approaches With Respect To Visualization In 3-Dimensional Space, Pooja Chenna
Comparative Study Of Dimension Reduction Approaches With Respect To Visualization In 3-Dimensional Space, Pooja Chenna
Master of Science in Computer Science Theses
In the present big data era, there is a need to process large amounts of unlabeled data and find some patterns in the data to use it further. If data has many dimensions, it is very hard to get any insight of it. It is possible to convert high-dimensional data to low-dimensional data using different techniques, this dimension reduction is important and makes tasks such as classification, visualization, communication and storage much easier. The loss of information should be less while mapping data from high-dimensional space to low-dimensional space. Dimension reduction has been a significant problem in many fields as …
Ultrasonic Data Transmission And Steganography, Hunter Young
Ultrasonic Data Transmission And Steganography, Hunter Young
KSU Journey Honors College Capstones and Theses
This project discusses the feasibility of using ultrasound to transmit data between computer systems, particularly computer systems that have been intentionally cut off from traditional networks for increased security. The goal of this project is to provide a synthesis of the current research that has been done into the use of ultrasonic data transmission, and to conduct a series of tests determining the validity of certain claims made in regards to ultrasonic data transmission within the information security community. All research, experiments, results, and inferences have been discussed in the context of how they relate to the realm of information …