Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Generalized Scattering-Based Stabilization Of Nonlinear Interconnected Systems, Anastasiia Usova Oct 2018

Generalized Scattering-Based Stabilization Of Nonlinear Interconnected Systems, Anastasiia Usova

Electronic Thesis and Dissertation Repository

The research presented in this thesis is aimed at development of new methods and techniques for stability analysis and stabilization of interconnections of nonlinear systems, in particular, in the presence of communication delays. Based on the conic systems' formalism, we extend the notion of conicity for the non-planar case where the dimension of the cone's central subspace may be greater than one. One of the advantages of the notion of non-planar conicity is that any dissipative system with a quadratic supply rate can be represented as a non-planar conic system; specifically, its central subspace and radius can be calculated using …


Optimization And Management Techniques For Geo-Distributed Sdn-Enabled Cloud Datacenters' Provisioning, Khaled M. Alhazmi Aug 2018

Optimization And Management Techniques For Geo-Distributed Sdn-Enabled Cloud Datacenters' Provisioning, Khaled M. Alhazmi

Electronic Thesis and Dissertation Repository

Cloud computing has become a business reality that impacts technology users around the world. It has become a cornerstone for emerging technologies and an enabler of future Internet services as it provides on-demand IT services delivery via geographically distributed data centers. At the core of cloud computing, virtualization technology has played a crucial role by allowing resource sharing, which in turn allows cloud service providers to offer computing services without discrepancies in platform compatibility.

At the same time, a trend has emerged in which enterprises are adopting a software-based network infrastructure with paradigms, such as software-defined networking, gaining further attention …


Recurrent Neural Network Architectures Toward Intrusion Detection, Wafaa Anani Aug 2018

Recurrent Neural Network Architectures Toward Intrusion Detection, Wafaa Anani

Electronic Thesis and Dissertation Repository

Recurrent Neural Networks (RNN) show a remarkable result in sequence learning, particularly in architectures with gated unit structures such as Long Short-term Memory (LSTM). In recent years, several permutations of LSTM architecture have been proposed mainly to overcome the computational complexity of LSTM. In this dissertation, a novel study is presented that will empirically investigate and evaluate LSTM architecture variants such as Gated Recurrent Unit (GRU), Bi-Directional LSTM, and Dynamic-RNN for LSTM and GRU specifically on detecting network intrusions. The investigation is designed to identify the learning time required for each architecture algorithm and to measure the intrusion prediction accuracy. …


Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan Aug 2018

Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan

Electronic Thesis and Dissertation Repository

A network intrusion is any unauthorized activity on a computer network. There are host-based and network-based Intrusion Detection Systems (IDS's), of which there are each signature-based and anomaly-based detection methods. An anomalous network behavior can be defined as an intentional violation of the expected sequence of packets. In a real-time network-based IDS, incoming packets are treated as a stream of data. A stream processor takes any stream of data or events and extracts interesting patterns on the fly. This representation allows applying statistical anomaly detection using sequence prediction algorithms as well as using a stream processor to perform signature-based intrusion …