Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Knowledge Discovery And Analysis In Manufacturing, Mark Polczynski, Andzrej Kochanski Jun 2010

Knowledge Discovery And Analysis In Manufacturing, Mark Polczynski, Andzrej Kochanski

Electrical and Computer Engineering Faculty Research and Publications

The quality and reliability requirements for next-generation manufacturing are reviewed, and current approaches are cited. The potential for augmenting current quality/reliability technology is described, and characteristics of potential future directions are postulated. Methods based on knowledge discovery and analysis in manufacturing (KDAM) are reviewed, and related successful applications in business and social fields are discussed. Typical KDAM applications are noted, along with general functions and specific KDAM-related technologies. A systematic knowledge discovery process model is reviewed, and examples of current work are given, including description of successful applications of KDAM to creation of rules for optimizing gas porosity in sand …


Dynamic Application Level Security Sensors, Christopher Thomas Rathgeb May 2010

Dynamic Application Level Security Sensors, Christopher Thomas Rathgeb

Masters Theses

The battle for cyber supremacy is a cat and mouse game: evolving threats from internal and external sources make it difficult to protect critical systems. With the diverse and high risk nature of these threats, there is a need for robust techniques that can quickly adapt and address this evolution. Existing tools such as Splunk, Snort, and Bro help IT administrators defend their networks by actively parsing through network traffic or system log data. These tools have been thoroughly developed and have proven to be a formidable defense against many cyberattacks. However, they are vulnerable to zero-day attacks, slow attacks, …