Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Amino acid sequence (1)
- Blackboard (1)
- Cloud Computing (1)
- Computational biology methods (1)
- Corporate archivists (1)
-
- Cyber-physical systems (1)
- Data Hiding (1)
- Encryption (1)
- Healthcare (1)
- Intranets (Computer networks) (1)
- Mobile Computing (1)
- Neural networks (1)
- Open source software (1)
- Pliability (1)
- Protein databases (1)
- Protein structure (1)
- Publish-and-subscribe (1)
- STRIDE (1)
- Security (1)
- Software (1)
- Software Privacy (1)
- Software Security (1)
- Software architecture (1)
- Statistics as topic (1)
- Steganography (1)
- Web archiving (1)
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
A Security Analysis Of Cyber-Physical Systems Architecture For Healthcare, Darren Seifert, Hassan Reza
A Security Analysis Of Cyber-Physical Systems Architecture For Healthcare, Darren Seifert, Hassan Reza
Computer Science Faculty Publications
This paper surveys the available system architectures for cyber-physical systems. Several candidate architectures are examined using a series of essential qualities for cyber-physical systems for healthcare. Next, diagrams detailing the expected functionality of infusion pumps in two of the architectures are analyzed. The STRIDE Threat Model is then used to decompose each to determine possible security issues and how they can be addressed. Finally, a comparison of the major security issues in each architecture is presented to help determine which is most adaptable to meet the security needs of cyber-physical systems in healthcare.
Enhancing Mobile Cloud Computing Security Using Steganography, Hassan Reza, Madhuri Sonawane
Enhancing Mobile Cloud Computing Security Using Steganography, Hassan Reza, Madhuri Sonawane
Computer Science Faculty Publications
Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload data over the network to the cloud. There are some security and privacy concerns using both mobile devices to offload data to the facilities provided by the cloud providers. One of the critical threats facing cloud users is the unauthorized access by the insiders (cloud administrators) or the justification of location where the cloud providers operating. Although, there exist variety of security mechanisms to prevent unauthorized access by unauthorized …
Flexc: Protein Flexibility Prediction Using Context-Based Statistics, Predicted Structural Features, And Sequence Information, Ashraf Yaseen, Mais Nijim, Brandon Williams, Lei Qian, Min Li, Jianxin Wang, Yaohang Li
Flexc: Protein Flexibility Prediction Using Context-Based Statistics, Predicted Structural Features, And Sequence Information, Ashraf Yaseen, Mais Nijim, Brandon Williams, Lei Qian, Min Li, Jianxin Wang, Yaohang Li
Computer Science Faculty Publications
The fluctuation of atoms around their average positions in protein structures provides important information regarding protein dynamics. This flexibility of protein structures is associated with various biological processes. Predicting flexibility of residues from protein sequences is significant for analyzing the dynamic properties of proteins which will be helpful in predicting their functions.
Leveraging Heritrix And The Wayback Machine On A Corporate Intranet: A Case Study On Improving Corporate Archives, Justin F. Brunelle, Krista Ferrante, Eliot Wilczek, Michele C. Weigle, Michael L. Nelson
Leveraging Heritrix And The Wayback Machine On A Corporate Intranet: A Case Study On Improving Corporate Archives, Justin F. Brunelle, Krista Ferrante, Eliot Wilczek, Michele C. Weigle, Michael L. Nelson
Computer Science Faculty Publications
In this work, we present a case study in which we investigate using open-source, web-scale web archiving tools (i.e., Heritrix and the Wayback Machine installed on the MITRE Intranet) to automatically archive a corporate Intranet. We use this case study to outline the challenges of Intranet web archiving, identify situations in which the open source tools are not well suited for the needs of the corporate archivists, and make recommendations for future corporate archivists wishing to use such tools. We performed a crawl of 143,268 URIs (125 GB and 25 hours) to demonstrate that the crawlers are easy to set …