Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (54)
- Electrical and Computer Engineering (51)
- Systems and Communications (40)
- Computer Sciences (32)
- Computer and Systems Architecture (32)
-
- Social and Behavioral Sciences (32)
- Business (24)
- Data Storage Systems (21)
- Environmental Sciences (21)
- Library and Information Science (19)
- Sustainability (19)
- Communication (17)
- Communication Technology and New Media (17)
- Technology and Innovation (17)
- Science and Technology Studies (15)
- Water Resource Management (15)
- Earth Sciences (14)
- Management Information Systems (13)
- Operations Research, Systems Engineering and Industrial Engineering (13)
- Soil Science (13)
- Signal Processing (11)
- Social Media (11)
- E-Commerce (10)
- Law (10)
- Other Computer Engineering (10)
- Arts and Humanities (9)
- Information Literacy (9)
- Institution
-
- Purdue University (24)
- Old Dominion University (12)
- California State University, San Bernardino (11)
- University of Nebraska - Lincoln (8)
- Embry-Riddle Aeronautical University (7)
-
- The University of Akron (7)
- Singapore Management University (6)
- University of New Mexico (6)
- Air Force Institute of Technology (5)
- California Polytechnic State University, San Luis Obispo (5)
- Technological University Dublin (5)
- Chulalongkorn University (4)
- Florida International University (4)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (4)
- University of Massachusetts Amherst (4)
- City University of New York (CUNY) (3)
- Kennesaw State University (3)
- Southern Methodist University (3)
- Louisiana State University (2)
- SIT Graduate Institute/SIT Study Abroad (2)
- Syracuse University (2)
- Tashkent State Technical University (2)
- University of South Florida (2)
- University of Tennessee, Knoxville (2)
- Association of Arab Universities (1)
- Bentley University (1)
- Boise State University (1)
- Brigham Young University (1)
- Chapman University (1)
- Claremont Colleges (1)
- Keyword
-
- Internet of Things (12)
- IoT (12)
- Sustainability (9)
- Agriculture (8)
- Broadband antennas (8)
-
- Dielectric (8)
- Dipole antennas (8)
- Moisture (8)
- Permittivity (8)
- Soil (8)
- Underground communication (8)
- Internet of Underground Things (7)
- Underground Communications (7)
- Wireless Underground Channel (7)
- Privacy (6)
- Cybersecurity (5)
- Deep learning (5)
- 5G (4)
- Energy issues (4)
- Increasing global temperatures (4)
- Power (4)
- SDN (4)
- Security (4)
- Water and food scarcity (4)
- Blockchain (3)
- Deep Learning (3)
- Digital Agriculture (3)
- Networking (3)
- Networks (3)
- ToC (3)
- Publication
-
- Faculty Publications (24)
- Journal of International Technology and Information Management (11)
- Williams Honors College, Honors Research Projects (7)
- Doctoral Dissertations (5)
- Library Philosophy and Practice (e-journal) (5)
-
- Publications (5)
- Research Collection School Of Computing and Information Systems (5)
- Theses and Dissertations (5)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (4)
- FIU Electronic Theses and Dissertations (4)
- African Conference on Information Systems and Technology (3)
- Conference papers (3)
- Cybersecurity Undergraduate Research Showcase (3)
- Articles (2)
- Branch Mathematics and Statistics Faculty and Staff Publications (2)
- Chemical Technology, Control and Management (2)
- Computer Engineering (2)
- Computer Science ETDs (2)
- Doctoral Dissertations and Master's Theses (2)
- Electrical & Computer Engineering Theses & Dissertations (2)
- English Language Institute (2)
- Independent Study Project (ISP) Collection (2)
- LSU Master's Theses (2)
- Master's Theses (2)
- Military Cyber Affairs (2)
- Open Educational Resources (2)
- 2020 (1)
- AFIT Patents (1)
- ART 108: Introduction to Games Studies (1)
- Acta of Turin Polytechnic University in Tashkent (1)
- Publication Type
Articles 31 - 60 of 161
Full-Text Articles in Digital Communications and Networking
A Study Of Static And Dynamic Characteristics Of Multifunctional Signal Converters, Akmal Abdumalikov
A Study Of Static And Dynamic Characteristics Of Multifunctional Signal Converters, Akmal Abdumalikov
Chemical Technology, Control and Management
The issues of continuity, accuracy, speed and reliability of signal conversion, which are the main problems of quality control and management of production processes, remain relevant. Research shows that in practice there are different signal variables, the study of which is highly formalized in a number of modeling tasks and basic classification studies, in particular transients in converters, its sources and elements requires a unified mathematical approach, that is, visual, highly formalized modeling and research based on it. The paper presents a graph model of multifunctional signal converters that provide microprocessor and electronic devices with signals in the form of …
A Fortran-Keras Deep Learning Bridge For Scientific Computing, Jordan Ott, Mike Pritchard, Natalie Best, Erik Linstead, Milan Curcic, Pierre Baldi
A Fortran-Keras Deep Learning Bridge For Scientific Computing, Jordan Ott, Mike Pritchard, Natalie Best, Erik Linstead, Milan Curcic, Pierre Baldi
Engineering Faculty Articles and Research
Implementing artificial neural networks is commonly achieved via high-level programming languages such as Python and easy-to-use deep learning libraries such as Keras. These software libraries come preloaded with a variety of network architectures, provide autodifferentiation, and support GPUs for fast and efficient computation. As a result, a deep learning practitioner will favor training a neural network model in Python, where these tools are readily available. However, many large-scale scientific computation projects are written in Fortran, making it difficult to integrate with modern deep learning methods. To alleviate this problem, we introduce a software library, the Fortran-Keras Bridge (FKB). This two-way …
Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming
Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming
Publications
The Internet of Things (IoT) provides applications and services that would otherwise not be possible. However, the open nature of IoT makes it vulnerable to cybersecurity threats. Especially, identity spoofing attacks, where an adversary passively listens to the existing radio communications and then mimic the identity of legitimate devices to conduct malicious activities. Existing solutions employ cryptographic signatures to verify the trustworthiness of received information. In prevalent IoT, secret keys for cryptography can potentially be disclosed and disable the verification mechanism. Noncryptographic device verification is needed to ensure trustworthy IoT. In this article, we propose an enhanced deep learning framework …
Decision Agriculture, Abdul Salam, Usman Raza
Decision Agriculture, Abdul Salam, Usman Raza
Faculty Publications
In this chapter, the latest developments in the field of decision agriculture are discussed. The practice of management zones in digital agriculture is described for efficient and smart faming. Accordingly, the methodology for delineating management zones is presented. Modeling of decision support systems is explained along with discussion of the issues and challenges in this area. Moreover, the precision agriculture technology is also considered. Moreover, the chapter surveys the state of the decision agriculture technologies in the countries such as Bulgaria, Denmark, France, Israel, Malaysia, Pakistan, United Kingdom, Ukraine, and Sweden. Finally, different field factors such as GPS accuracy and …
Underground Phased Arrays And Beamforming Applications, Abdul Salam, Usman Raza
Underground Phased Arrays And Beamforming Applications, Abdul Salam, Usman Raza
Faculty Publications
This chapter presents a framework for adaptive beamforming in underground communication. The wireless propagation is thoroughly analyzed to develop a model using the soil moisture as an input parameter to provide feedback mechanism while enhancing the system performance. The working of array element in the soil is analyzed. Moreover, the effect of soil texture and soil moisture on the resonant frequency and return loss is studied in detail. The wave refraction from the soil–air interface highly degrades the performance of the system. Furthermore, to beam steering is done to achieve high gain for lateral component improving the UG communication. The …
Signals In The Soil: An Introduction To Wireless Underground Communications, Abdul Salam, Usman Raza
Signals In The Soil: An Introduction To Wireless Underground Communications, Abdul Salam, Usman Raza
Faculty Publications
In this chapter, wireless underground (UG) communications are introduced. A detailed overview of WUC is given. A comprehensive review of research challenges in WUC is presented. The evolution of underground wireless is also discussed. Moreover, different component of UG communications is wireless. The WUC system architecture is explained with a detailed discussion of the anatomy of an underground mote. The examples of UG wireless communication systems are explored. Furthermore, the differences of UG wireless and over-the-air wireless are debated. Different types of wireless underground channel (e.g., In-Soil, Soil-to-Air, and Air-to-Soil) are reported as well.
Underground Wireless Channel Bandwidth And Capacity, Abdul Salam, Usman Raza
Underground Wireless Channel Bandwidth And Capacity, Abdul Salam, Usman Raza
Faculty Publications
The UG channel bandwidth and capacity are vital parameters in wireless underground communication system design. In this chapter, a comprehensive analysis of the wireless underground channel capacity is presented. The impact of soil on return loss, bandwidth, and path loss is discussed. The results of underground multi-carrier modulation capacity are also outlined. Moreover, the single user capacity and multi-carrier capacity are also introduced with an in-depth treatment of soil texture, soil moisture, and distance effects on channel capacity. Finally, the chapter is concluded with a discussion of challenges and open research issues.
Signals In The Soil: Underground Antennas, Abdul Salam, Usman Raza
Signals In The Soil: Underground Antennas, Abdul Salam, Usman Raza
Faculty Publications
Antenna is a major design component of Internet of Underground Things (IOUT) communication system. The use of antenna, in IOUT, differs from traditional communication in that it is buried in the soil. Therefore, one of the main challenges, in IOUT applications, is to establish a reliable communication. To that end, there is a need of designing an underground-specific antenna. Three major factors that can impact the performance of a buried antenna are: (1) effect of high soil permittivity changes the wavelength of EM waves, (2) variations in soil moisture with time affecting the permittivity of the soil, and (3) difference …
Soil Moisture And Permittivity Estimation, Abdul Salam, Usman Raza
Soil Moisture And Permittivity Estimation, Abdul Salam, Usman Raza
Faculty Publications
The soil moisture and permittivity estimation is vital for the success of the variable rate approaches in the field of the decision agriculture. In this chapter, the development of a novel permittivity estimation and soil moisture sensing approach is presented. The empirical setup and experimental methodology for the power delay measurements used in model are introduced. Moreover, the performance analysis is explained that includes the model validation and error analysis. The transfer functions are reported as well for soil moisture and permittivity estimation. Furthermore, the potential applications of the developed approach in different disciplines are also examined.
Current Advances In Internet Of Underground Things, Abdul Salam, Usman Raza
Current Advances In Internet Of Underground Things, Abdul Salam, Usman Raza
Faculty Publications
The latest developments in Internet of Underground Things are covered in this chapter. First, the IOUT Architecture is discussed followed by the explanation of the challenges being faced in this paradigm. Moreover, a comprehensive coverage of the different IOUT components is presented that includes communications, sensing, and system integration with the cloud. An in-depth coverage of the applications of the IOUT in various disciplines is also surveyed. These applications include areas such as decision agriculture, pipeline monitoring, border control, and oil wells.
Signals In The Soil: Subsurface Sensing, Abdul Salam, Usman Raza
Signals In The Soil: Subsurface Sensing, Abdul Salam, Usman Raza
Faculty Publications
In this chapter, novel subsurface soil sensing approaches are presented for monitoring and real-time decision support system applications. The methods, materials, and operational feasibility aspects of soil sensors are explored. The soil sensing techniques covered in this chapter include aerial sensing, in-situ, proximal sensing, and remote sensing. The underlying mechanism used for sensing is also examined as well. The sensor selection and calibration techniques are described in detail. The chapter concludes with discussion of soil sensing challenges.
Autonomous Irrigation Management In Decision Agriculture, Abdul Salam, Usman Raza
Autonomous Irrigation Management In Decision Agriculture, Abdul Salam, Usman Raza
Faculty Publications
In this chapter, the important application of autonomous irrigation management in the field decision agriculture is discussed. The different types of sensor-guided irrigation systems are presented that includes center pivot systems and drip irrigation systems. Their sensing and actuator components are with detailed focus on real-time decision-making and integration to the cloud. This chapter also presents irrigation control systems which takes, as an input, soil moisture and temperature from IOUT and weather data from Internet and communicate with center pivot based irrigation systems. Moreover, the system architecture is explored where development of the nodes including sensing and actuators is presented. …
Variable Rate Applications In Decision Agriculture, Abdul Salam, Usman Raza
Variable Rate Applications In Decision Agriculture, Abdul Salam, Usman Raza
Faculty Publications
In this chapter, the variable rate applications (VRA) are presented for the field of decision agriculture. The characteristics of VRA control systems are described along with control hardware. Different types of VRA systems are discussed (e.g., liquid VRA systems and dry VRA systems). A case study is also explored in this regard. Moreover, recent advances and future trends are also outlined. Accordingly, a sustainable variable-rate irrigation scheduling is studied where different hardware and software component of the cyber-physical system are considered. Finally, chapter is concluded with a novel sensor deployment methodology.
Blockchain And Its Transformational Impact To Global Business, Mohammed Qaudeer
Blockchain And Its Transformational Impact To Global Business, Mohammed Qaudeer
Operations Research and Engineering Management Theses and Dissertations
The advent of internet to the public back in 1994 resulted in the 4th industrial revolution disrupting and transforming business and communication models. As much as the transformation changed our lives and experiences, it has resulted in centralized models like Amazon and Facebook. It also resulted in exponential growth of Fraud, Identity theft, and lack of trust. Blockchain is considered an emerging technology of this era, which will trigger the 5th industrial revolution enabling another massive storm of disruptive transformation completely changing the current business models based on trust, security, collaboration and crypto currency. As the evolution of blockchain technology …
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.
A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman
A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman
Library Philosophy and Practice (e-journal)
Data mining is characterized as searching for useful information through very large data sets. Some of the key and most common techniques for data mining are association rules, classification, clustering, prediction, and sequential models. For a wide range of applications, data mining techniques are used. Data mining plays a significant role in disease detection in the health care industry. The patient should be needed to detect a number of tests for the disease. However, the number of tests should be reduced by using data mining techniques. In time and performance, this reduced test plays an important role. Heart disease is …
How Can 5g Make Our Lives Better?, Firas Slewa Dawod
How Can 5g Make Our Lives Better?, Firas Slewa Dawod
English Language Institute
Our lives will be significantly improved with the advent of the new cellular wireless technology due to all its new features and applications. This Poster discusses the main features and application of 5G technology and its positive impact on society, in particular facilitating interactive and smart communities.
Indonesian Library User Behaviour During Covid 19 Pandemic On Digital Library Platform, Irhamni
Indonesian Library User Behaviour During Covid 19 Pandemic On Digital Library Platform, Irhamni
English Language Institute
COVID-19 pandemic has significantly changed library user behavior, workplaces, and some public areas including in the library. During the COVID 19 pandemics, the digital library with a mobile app like ipusnas has facilitated to accessing library resources. The ipusnas has increased people's accessibility to library materials. This research focuses on the use of the digital library has a significant impact on library users behavior; it can influence how they read, access the library, and their interaction with the library resources.
Leveraging Conventional Internet Routing Protocol Behavior To Defeat Ddos And Adverse Networking Conditions, Jared M. Smith
Leveraging Conventional Internet Routing Protocol Behavior To Defeat Ddos And Adverse Networking Conditions, Jared M. Smith
Doctoral Dissertations
The Internet is a cornerstone of modern society. Yet increasingly devastating attacks against the Internet threaten to undermine the Internet's success at connecting the unconnected. Of all the adversarial campaigns waged against the Internet and the organizations that rely on it, distributed denial of service, or DDoS, tops the list of the most volatile attacks. In recent years, DDoS attacks have been responsible for large swaths of the Internet blacking out, while other attacks have completely overwhelmed key Internet services and websites. Core to the Internet's functionality is the way in which traffic on the Internet gets from one destination …
Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore
Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore
Cybersecurity Undergraduate Research Showcase
The future of smart homes is filled with excitement and ample opportunity to live in an environment that features extraordinary convenience and energy efficiency. Devices such as Amazon Alexa and Roku Smart TV’s feature voice interaction options that provide the user with enhanced functionality. While voice-activated devices are accommodating, it is imperative to acknowledge how they work on the backend. The problem is that these devices collect and share a large amount of data from users who are oftentimes unaware that it’s even happening. The Snitch App is being developed in order to inform the user of what exactly is …
Traffic Privacy Study On Internet Of Things – Smart Home Applications, Ayan Patel
Traffic Privacy Study On Internet Of Things – Smart Home Applications, Ayan Patel
Master's Theses
Internet of Things (IoT) devices have been widely adopted in many different applications in recent years, such as smart home applications. An adversary can capture the network traffic of IoT devices and analyze it to reveal user activities even if the traffic is encrypted. Therefore, traffic privacy is a major concern, especially in smart home applications. Traffic shaping can be used to obfuscate the traffic so that no meaningful predictions can be drawn through traffic analysis. Current traffic shaping methods have many tunable variables that are difficult to optimize to balance bandwidth overheads and latencies. In this thesis, we study …
Intelligent Algorithm For Trapezoidal Interval Valued Neutrosophic Network Analysis, Florentin Smarandache, Said Broumi, Deivanayagampillai Nagarajan, Malayalan Lathamaheswari, Mohamed Talea, Assia Bakali
Intelligent Algorithm For Trapezoidal Interval Valued Neutrosophic Network Analysis, Florentin Smarandache, Said Broumi, Deivanayagampillai Nagarajan, Malayalan Lathamaheswari, Mohamed Talea, Assia Bakali
Branch Mathematics and Statistics Faculty and Staff Publications
The shortest path problem has been one of the most fundamental practical problems in network analysis. One of the good algorithms is Bellman-Ford, which has been applied in network, for the last some years. Due to complexity in the decision-making process, the decision makers face complications to express their view and judgment with an exact number for single valued membership degrees under neutrosophic environment. Though the interval number is a special situation of the neutrosophic, it did not solve the shortest path problems in an absolute manner. Hence, in this work, the authors have introduced the score function and accuracy …
A Novel Path Loss Forecast Model To Support Digital Twins For High Frequency Communications Networks, James Marvin Taylor Jr
A Novel Path Loss Forecast Model To Support Digital Twins For High Frequency Communications Networks, James Marvin Taylor Jr
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
The need for long-distance High Frequency (HF) communications in the 3-30 MHz frequency range seemed to diminish at the end of the 20th century with the advent of space-based communications and the spread of fiber optic-connected digital networks. Renewed interest in HF has emerged as an enabler for operations in austere locations and for its ability to serve as a redundant link when space-based and terrestrial communication channels fail. Communications system designers can create a “digital twin” system to explore the operational advantages and constraints of the new capability. Existing wireless channel models can adequately simulate communication channel conditions with …
Improving Computer Network Operations Through Automated Interpretation Of State, Abhishek Dwaraki
Improving Computer Network Operations Through Automated Interpretation Of State, Abhishek Dwaraki
Doctoral Dissertations
Networked systems today are hyper-scaled entities that provide core functionality for distributed services and applications spanning personal, business, and government use. It is critical to maintain correct operation of these networks to avoid adverse business outcomes. The advent of programmable networks has provided much needed fine-grained network control, enabling providers and operators alike to build some innovative networking architectures and solutions. At the same time, they have given rise to new challenges in network management. These architectures, coupled with a multitude of devices, protocols, virtual overlays on top of physical data-plane etc. make network management a highly challenging task. Existing …
Occ Future And Obstacles Under 5g Requirements, Noor Jihad, Sinan Abdul Satar
Occ Future And Obstacles Under 5g Requirements, Noor Jihad, Sinan Abdul Satar
Emirates Journal for Engineering Research
Telecommunications specifications of the fifth-generation (5 G) are being established to satisfy the rising demands of high-speed broadband networks (i.e., a few tens of Gigabits every second). The 5 G standard derives primarily from a rising number of subscribers and a multitude of various apps, commonly referred to as smart devices, communicating as part of Internet-of-Things (IoT) network For 5 G, a few possible developments such as millimeter waves, large multiple-input multiple-output, and small cell connectivity have appeared. While such technologies will meet 5 G specifications, attention is being given to a complementary potential wireless optical wireless communication (OWC) system. …
Usability And Accessibility Model For E-Government Websites In Ethiopia, Yoseph Zeleke
Usability And Accessibility Model For E-Government Websites In Ethiopia, Yoseph Zeleke
African Conference on Information Systems and Technology
The development of websites and portals are main components of the e-Government strategy implementations for the last nine years in Ethiopia. However, services optimizations with usability and accessibility are key issues of Ethiopia e-Government services development.
Therefore, the ultimate goal of this study is creation of usable, accessible and sustainable Ethiopian eGovernment websites with four stage of research analysis, through proposed model. The investigations results are used to provide a clear picture of what needs to be improves from management and user point of views and also from other stakeholders of e-Government services. This study applies mixed methods of data …
Artificial Intelligence Towards Future Industrial Opportunities And Challenges, Gizealew Dagnaw
Artificial Intelligence Towards Future Industrial Opportunities And Challenges, Gizealew Dagnaw
African Conference on Information Systems and Technology
The industry 4.0 will bring reflective changes to our society, including an important digital shift in the manufacturing sector. At present, several manufacturing firms are trying to adopt the practices of industry 4.0 throughout their supply chain. The Fourth Industrial Revolution and the artificial intelligence at its core are fundamentally changing the way we live, work and interact as citizens. The complexity of this transformation may look overwhelming and to many threatening. Recently, the dramatic growth of new generation information technologies has prompted several countries to seek new strategies for industrial revolution. The globalization and the competitiveness are forcing companies …
Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle
Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle
African Conference on Information Systems and Technology
Most researches have been conducted to develop models, algorithms and systems to detect intrusions. However, they are not plausible as intruders began to attack systems by masking their features. While researches continued to various techniques to overcome these challenges, little attention was given to use data mining techniques, for development of intrusion detection. Recently there has been much interest in applying data mining to computer network intrusion detection, specifically as intruders began to cheat by masking some detection features to attack systems. This work is an attempt to propose a model that works based on semi-supervised collective classification algorithm. For …
Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke
Identification Of Users Via Ssh Timing Attack, Thomas J. Flucke
Master's Theses
Secure Shell, a tool to securely access and run programs on a remote machine, is an important tool for both system administrators and developers alike. The technology landscape is becoming increasingly distributed and reliant on tools such as Secure Shell to protect information as a user works on a system remotely. While Secure Shell accounts for the abuses the security of older tools such as telnet overlook, it still has fundamental vulnerabilities which leak information about both the user and their activities through timing attacks. The OpenSSH client, the implementation included in all Linux, Mac, and Windows computers, sends each …