Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Privacy-Preserving Non-Participatory Surveillance System For Covid-19-Like Pandemics, Mahmoud Nabil, Ahmed Sherif, Mohamed Mahmoud, Waleed Alsmary, Maazen Alsabaan Jan 2021

Privacy-Preserving Non-Participatory Surveillance System For Covid-19-Like Pandemics, Mahmoud Nabil, Ahmed Sherif, Mohamed Mahmoud, Waleed Alsmary, Maazen Alsabaan

Faculty Publications

COVID-19 pandemic has revealed a pressing need for an effective surveillance system to control the spread of infection. However, the existing systems are run by the people’s smartphones and without a strong participation from the people, the systems become ineffective. Moreover, these systems can be misused to spy on people and breach their privacy. Due to recent privacy breaches, people became anxious about their privacy, and without privacy reassurance, the people may not accept the systems. In this paper, we propose a non-participatory privacy-preserving surveillance system for COVID-19-like pandemics. The system aims to control the spread of COVID-19 infection without …


A Survey On Ddos Attacks In Edge Servers, Iftakhar Ahmad Dec 2020

A Survey On Ddos Attacks In Edge Servers, Iftakhar Ahmad

Computer Science and Engineering Theses

In modern times, the need for latency sensitive applications is growing rapidly. Cloud computing infrastructure is unable to provide support to such delay sensitive applications. Therefore, a new paradigm called edge computing has emerged. In edge computing various paradigms like Fog, Cloudlet, Mobile Edge Computing, etc. provide real-time, location aware services to users. As a result number of requests are generated for processing in the edge servers. If these edge servers for some reason become unavailable for providing service, users will not be able to perform their delay sensitive or location aware operations. Like other servers in the network, edge …


"How Good Are They?" - A State Of The Effectiveness Of Anti-Phishing Tools On Twitter, Sayak Saha Roy Aug 2020

"How Good Are They?" - A State Of The Effectiveness Of Anti-Phishing Tools On Twitter, Sayak Saha Roy

Computer Science and Engineering Theses

Phishing websites are one of the most pervasive online attack vectors, with nearly 1.5 million such attacks created every month. Social media is the primary ground for phishing attacks, with 86% of these attacks originating from Twitter, Facebook, LinkedIn, etc. Prevalent approaches against these attacks includes URL scanners, anti-phishing blacklists and social media's own detection systems. In this work, we focus on Twitter, and through a combination of data-driven methods and emulations, we evaluate the verdicts provided by URL scanners, and Twitter’s detection system. We show that these sources provide a good amount of misinformation, which not only can lead …


Tapin: A Two-Factor User Authentication Scheme For Smartwatches Through Secret Finger Tapping, Akash Lohani May 2020

Tapin: A Two-Factor User Authentication Scheme For Smartwatches Through Secret Finger Tapping, Akash Lohani

Computer Science and Engineering Theses

Nowadays, smartwatches have become one of the most common wearable gadgets as they are small and portable. As more and more personal information is managed and processed inside smartwatches, it is important to have a secure user authentication scheme in place. There have been many successful authentication schemes for a smartphones such as Password/PIN, bio-metric approach(e.g. fingerprint, face recognition), etc directly used on smartwatches. However, these approaches are not quite suitable for smartwatches due to its constraints in size and limited computation power. To address this issue, we propose TaPIN that allows users to authenticate themselves by playing out the …


Rhetsec_ | Rhetorical Security, Jennifer Mead Dec 2019

Rhetsec_ | Rhetorical Security, Jennifer Mead

Culminating Projects in English

Rhetsec_ examines the rhetorical situation, the rhetorical appeals, and how phishing emails simulate "real" emails in five categories of phishing emails. While the first focus of cybersecurity is security, you must also understand the language of computers to know how to secure them. Phishing is one way to compromise security using computers, and so the computer becomes a tool for malicious language (phishing emails and malware) to be transmitted. Therefore to be concerned with securing computers, then you must also be concerned with language. Language is rhetoric's domain, and the various rhetorical elements which create an identity of the phisher …


User Syndication Using Speech Rhythm, Faisal Z H Alnahhas Aug 2019

User Syndication Using Speech Rhythm, Faisal Z H Alnahhas

Computer Science and Engineering Theses

In recent years we have seen a variety of approaches to increase security on computers and mobile devices including fingerprint, and facial recognition. Such techniques while effective are very expensive. Voice biometrics, specifically speech rhythm, is a method that has been drawing attention and growing in recent years. Unlike other methods, it requires little to no additional hardware installed on a device for it to work accurately. Speech rhythm utilizes the device's built-in microphone, and analyzes speakers based on features of their speech. In this work we leverage the existing hardware and simply add an efficient layer of software to …


Improving Performance And Security In Anonymity Systems, Mohsen Imani Aug 2018

Improving Performance And Security In Anonymity Systems, Mohsen Imani

Computer Science and Engineering Dissertations

Tor is an anonymity network that provides online privacy for the Internet users. Tor hides the user's traffic among the others' traffic. The more users Tor attracts, the stronger anonymity it provides. Unfortunately, users of the Tor anonymity system suffer from less-than-ideal performance, in part because circuit building and selection processes are not tuned for speed. Moreover, there are some attacks like guard fingerprinting and website fingerprinting attacks that try to profile or de-anonymize the Tor users. In this dissertation, we propose methods to address both security and performance issues in Tor. We first examine the process of selecting among …


Hierarchical Representation Learning With Connectionist Models, De Wang May 2018

Hierarchical Representation Learning With Connectionist Models, De Wang

Computer Science and Engineering Dissertations

To unleash the power of big data, efficient algorithms which are scalable to millions of data are desired. Deep learning is one area that benefits from big data enormously. Deep learning uses neural networks to mimic human brains, this approach is termed connectionist in AI community. In this dissertation, we propose several novel learning strategies to improve the performance of connectionist models. Evaluation of a large neural network during inference phase requires a lot of GPU memory and computation, which will degrade user experience due to response latency. Model distillation is one way to distill the knowledge contained in one …


Australia's National Security: An Interview With Dr Katina Michael, G. Messaris, K. Michael May 2006

Australia's National Security: An Interview With Dr Katina Michael, G. Messaris, K. Michael

Professor Katina Michael

No abstract provided.