Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (5)
- Computer Sciences (3)
- Physical Sciences and Mathematics (3)
- Systems and Communications (3)
- Controls and Control Theory (2)
-
- Electrical and Electronics (2)
- Signal Processing (2)
- Applied Mathematics (1)
- Artificial Intelligence and Robotics (1)
- Business (1)
- Business Analytics (1)
- Business Intelligence (1)
- Business and Corporate Communications (1)
- Computational Engineering (1)
- Computer and Systems Architecture (1)
- Corporate Finance (1)
- Data Science (1)
- Finance and Financial Management (1)
- Hardware Systems (1)
- Longitudinal Data Analysis and Time Series (1)
- Multivariate Analysis (1)
- Programming Languages and Compilers (1)
- Risk Analysis (1)
- Statistics and Probability (1)
- Institution
- Keyword
-
- Bluetooth (2)
- Machine learning (2)
- Ad hoc on-demand distance vector (1)
- Attacker Model Ontology (1)
- Attacker Modeling (1)
-
- Autoencoders (1)
- BLE (1)
- Bitcoin (1)
- Blockchain (1)
- CUDA (1)
- Cellular networks (1)
- Cryptocurrency (1)
- Cyber-Physical Systems (1)
- Delay Tolerant Networks (1)
- Distance estimation (1)
- Hong-Ou-Mandel (1)
- IEEE 802.15.4 (Standard) (1)
- IPeR (1)
- Integration Framework (1)
- Interest-Aware Forwarding (1)
- Internet of things (1)
- Julia (Programming language) (1)
- Lightning network (1)
- MIPeR (1)
- Mobile Networks (1)
- Mobile mesh network (1)
- Network controller (1)
- Off-chain transactions (1)
- Opportunistic Networks (1)
- Packet sniffing (1)
Articles 1 - 10 of 10
Full-Text Articles in Digital Communications and Networking
Network Management, Optimization And Security With Machine Learning Applications In Wireless Networks, Mariam Nabil
Network Management, Optimization And Security With Machine Learning Applications In Wireless Networks, Mariam Nabil
Theses and Dissertations
Wireless communication networks are emerging fast with a lot of challenges and ambitions. Requirements that are expected to be delivered by modern wireless networks are complex, multi-dimensional, and sometimes contradicting. In this thesis, we investigate several types of emerging wireless networks and tackle some challenges of these various networks. We focus on three main challenges. Those are Resource Optimization, Network Management, and Cyber Security. We present multiple views of these three aspects and propose solutions to probable scenarios. The first challenge (Resource Optimization) is studied in Wireless Powered Communication Networks (WPCNs). WPCNs are considered a very promising approach towards sustainable, …
Approaches To Improve The Execution Time Of A Quantum Network Simulation, Joseph B. Tippit
Approaches To Improve The Execution Time Of A Quantum Network Simulation, Joseph B. Tippit
Theses and Dissertations
Evaluating quantum networks is an expensive and time-consuming task that benefits from simulation. A potential improvement is to utilize GPUs, namely by leveraging NVIDIA's programming framework, CUDA. To avoid performance pitfalls of higher level languages and programming models such as the so called "two language problem," the Julia Programming Language provides the basis for the development effort. This research develops a two module prototype quantum network simulation framework using GPUs and Julia. Performance of the software is measured and compared against other languages such as MATLAB.
Evaluating Testing Procedures For Openflow Controller Network Re-Provisioning Time, Steven J. Jensen
Evaluating Testing Procedures For Openflow Controller Network Re-Provisioning Time, Steven J. Jensen
Theses and Dissertations
Software-Defined Networking promises several advantages over traditional networking architectures, but has seen little adoption. Recently codified controller evaluation methodologies have seen little validation without strong statistical analysis of the results. The research developed an environment testing implementing a published Network Re-provisioning Time methodology to evaluate five OpenFlow controllers. The methodology is strong with required parameters but had issues with some edge cases. Further refinement and adding a convergence metric may close the gaps.
Off-Chain Transaction Routing In Payment Channel Networks: A Machine Learning Approach, Heba Kadry
Off-Chain Transaction Routing In Payment Channel Networks: A Machine Learning Approach, Heba Kadry
Theses and Dissertations
Blockchain is a foundational technology that has the potential to create new prospects for our economic and social systems. However, the scalability problem limits the capability to deliver a target throughput and latency, compared to the traditional financial systems, with increasing workload. Layer-two is a collective term for solutions designed to help solve the scalability by handling transactions off the main chain, also known as layer one. These solutions have the capability to achieve high throughput, fast settlement, and cost efficiency without sacrificing network security. For example, bidirectional payment channels are utilized to allow the execution of fast transactions between …
Stock Markets Performance During A Pandemic: How Contagious Is Covid-19?, Yara Abushahba
Stock Markets Performance During A Pandemic: How Contagious Is Covid-19?, Yara Abushahba
Theses and Dissertations
Background and Motivation: The coronavirus (“COVID-19”) pandemic, the subsequent policies and lockdowns have unarguably led to an unprecedented fluid circumstance worldwide. The panic and fluctuations in the stock markets were unparalleled. It is inarguable that real-time availability of news and social media platforms like Twitter played a vital role in driving the investors’ sentiment during such global shock.
Purpose:The purpose of this thesis is to study how the investor sentiment in relation to COVID-19 pandemic influenced stock markets globally and how stock markets globally are integrated and contagious. We analyze COVID-19 sentiment through the Twitter posts and investigate its …
Enumerating And Locating Bluetooth Devices For Casualty Recovery In A First-Responder Environment, Justin M. Durham
Enumerating And Locating Bluetooth Devices For Casualty Recovery In A First-Responder Environment, Justin M. Durham
Theses and Dissertations
It is difficult for first-responders to quickly locate casualties in an emergency environment such as an explosion or natural disaster. In order to provide another tool to locate individuals, this research attempts to identify and estimate the location of devices that would likely be located on or with a person. A variety of devices, such as phones, smartwatches, and Bluetooth-enabled locks, are tested in multiple environments and at various heights to determine the impact that placement and interference played in locating the devices. The hypothesis is that most Bluetooth devices can be successfully enumerated quickly, but cannot be accurately located …
Simulating A Mobile Wireless Sensor Network Monitoring The Air Force Marathon, Matthew D. Eilertson
Simulating A Mobile Wireless Sensor Network Monitoring The Air Force Marathon, Matthew D. Eilertson
Theses and Dissertations
This thesis explores the feasibility of deploying a mobile Wireless Sensor Networks (WSN) to the Air Force (AF) Marathon in support of Air Force Research Laboratory (AFRL) research of sensor and networking infrastructure in denied or degraded environments. A simulation called MarathonSim is developed in the Objective Modular Network Testbed in C++ (OMNeT++) Discrete Event Simulator to test the performance of a mobile WSN. A full factorial design using numbers of runners, transmission powers, and routing protocols is executed to measure Packet Delivery Ratio (PDR) to a central database, average end-to-end delay of application packets, and average power consumed per …
Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long
Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long
Theses and Dissertations
In the past decade, embedded technology, known as the Internet of Things, has expanded for many uses. The smart home infrastructure has drastically grown to include networked refrigerators, lighting systems, speakers, watches, and more. This increase in the use of wireless protocols provides a larger attack surface for cyber actors than ever before. Wireless loT traffic is susceptible for sniffing by an attacker. The attack platform skypie is upgraded to incorporate Bluetooth Low Energy (BLE) beacon collection for pattern-of-life data, as well as device characteristic enumeration and potential characteristic modification. This platform allows an attacker to mount the skypie to …
Enhanced Interest Aware Peoplerank For Opportunistic Mobile Social Networks, Yosra Saad Shahin
Enhanced Interest Aware Peoplerank For Opportunistic Mobile Social Networks, Yosra Saad Shahin
Theses and Dissertations
Network infrastructures are being continuously challenged by increased demand, resource-hungry applications, and at times of crisis when people need to work from homes such as the current Covid-19 epidemic situation, where most of the countries applied partial or complete lockdown and most of the people worked from home. Opportunistic Mobile Social Networks (OMSN) prove to be a great candidate to support existing network infrastructures. However, OMSNs have copious challenges comprising frequent disconnections and long delays. we aim to enhance the performance of OMSNs including delivery ratio and delay. We build upon an interest-aware social forwarding algorithm, namely Interest Aware PeopleRank …
A General Framework For Characterizing And Evaluating Attacker Models For Cps Security Assessment, Christopher S. Deloglos, Christopher Deloglos
A General Framework For Characterizing And Evaluating Attacker Models For Cps Security Assessment, Christopher S. Deloglos, Christopher Deloglos
Theses and Dissertations
Characterizing the attacker’s perspective is essential to assessing the security posture and resilience of cyber-physical systems. The attacker’s perspective is most often achieved by cyber-security experts (e.g., red teams) who critically challenge and analyze the system from an adversarial stance. Unfortunately, the knowledge and experience of cyber-security experts can be inconsistent leading to situations where there are gaps in the security assessment of a given system. Structured security review processes (such as TAM, Mission Aware, STPA-SEC, and STPA-SafeSec) attempt to standardize the review processes to impart consistency across an organization or application domain. However, with most security review processes, the …