Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Predicting Threat Potential Using Cyber Sensors, Mark Anthony Thompson Jul 2013

Predicting Threat Potential Using Cyber Sensors, Mark Anthony Thompson

Doctoral Dissertations

The proliferation of the Internet has created a culture of a connected society dependent upon technology for communication and information sharing needs. In this dissertation, we hypothesize that attackers are increasingly using electronic resources that are capable of leaving a digital footprint, such as social media services, e-mail, text messages, blogs, and websites for the communication, planning, and coordination of attacks. In its current form, however, traffic analysis is primarily concerned with using communications volume to extract intelligence information, but largely ignores the content of communications transmissions that is needed to meet the security challenges and demands of continually emerging …


Nonlinear Granger Causality And Its Application In Decoding Of Human Reaching Intentions, Mengting Liu Jan 2013

Nonlinear Granger Causality And Its Application In Decoding Of Human Reaching Intentions, Mengting Liu

Doctoral Dissertations

Multi-electrode recording is a key technology that allows the brain mechanisms of decision making, cognition, and their breakdown in diseases to be studied from a network perspective. As the hypotheses concerning the role of neural interactions in cognitive paradigms become increasingly more elaborate, the ability to evaluate the direction of neural interactions in neural networks holds the key to distinguishing their functional significance.

Granger Causality (GC) is used to detect the directional influence of signals between multiple locations. To extract the nonlinear directional flow, GC was completed through a nonlinear predictive approach using radial basis functions (RBF). Furthermore, to obtain …


Snoop-Forge-Replay Attack On Continuous Verification With Keystrokes, Khandaker Abir Rahman Jan 2013

Snoop-Forge-Replay Attack On Continuous Verification With Keystrokes, Khandaker Abir Rahman

Doctoral Dissertations

We present a new attack called the snoop-forge-replay attack on the keystroke-based continuous verification systems. We performed the attacks on two levels – 1) feature-level and 2) sample-level.

(1) Feature-level attack targets specific keystroke-based continuous verification method or system. In feature-level attacks, we performed a series of experiments using keystroke data from 50 users who typed approximately 1200 to 2300 keystrokes of free text during three different periods. The experiments consisted of two parts. In the first part, we conducted zero-effort verification experiments with two verifiers ("R" and "S") and obtained Equal Error Rates (EERs) between 10% and 15% under …


Using Power-Law Properties Of Social Groups For Cloud Defense And Community Detection, Justin L. Rice Jan 2013

Using Power-Law Properties Of Social Groups For Cloud Defense And Community Detection, Justin L. Rice

Doctoral Dissertations

The power-law distribution can be used to describe various aspects of social group behavior. For mussels, sociobiological research has shown that the Lévy walk best describes their self-organizing movement strategy. A mussel's step length is drawn from a power-law distribution, and its direction is drawn from a uniform distribution. In the area of social networks, theories such as preferential attachment seek to explain why the degree distribution tends to be scale-free. The aim of this dissertation is to glean insight from these works to help solve problems in two domains: cloud computing systems and community detection.

Privacy and security are …