Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Bio-inspired behavior (1)
- Biometrics (1)
- Brain (1)
- Cloud defense (1)
- Cloud security (1)
-
- Community detection (1)
- Continuous verification (1)
- Cyber sensors (1)
- Decision making (1)
- Electronic data (1)
- Emergent group behavior (1)
- Granger causality (1)
- Human reaching intentions (1)
- Keystrokes (1)
- Multi-electrode recording (1)
- Power-law (1)
- Predicting malicious intents (1)
- Signal detection (1)
- Snoop-forge-replay attack (1)
- Snooping (1)
- Social groups (1)
- Threat potential (1)
- Traffic flow (1)
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
Predicting Threat Potential Using Cyber Sensors, Mark Anthony Thompson
Predicting Threat Potential Using Cyber Sensors, Mark Anthony Thompson
Doctoral Dissertations
The proliferation of the Internet has created a culture of a connected society dependent upon technology for communication and information sharing needs. In this dissertation, we hypothesize that attackers are increasingly using electronic resources that are capable of leaving a digital footprint, such as social media services, e-mail, text messages, blogs, and websites for the communication, planning, and coordination of attacks. In its current form, however, traffic analysis is primarily concerned with using communications volume to extract intelligence information, but largely ignores the content of communications transmissions that is needed to meet the security challenges and demands of continually emerging …
Nonlinear Granger Causality And Its Application In Decoding Of Human Reaching Intentions, Mengting Liu
Nonlinear Granger Causality And Its Application In Decoding Of Human Reaching Intentions, Mengting Liu
Doctoral Dissertations
Multi-electrode recording is a key technology that allows the brain mechanisms of decision making, cognition, and their breakdown in diseases to be studied from a network perspective. As the hypotheses concerning the role of neural interactions in cognitive paradigms become increasingly more elaborate, the ability to evaluate the direction of neural interactions in neural networks holds the key to distinguishing their functional significance.
Granger Causality (GC) is used to detect the directional influence of signals between multiple locations. To extract the nonlinear directional flow, GC was completed through a nonlinear predictive approach using radial basis functions (RBF). Furthermore, to obtain …
Snoop-Forge-Replay Attack On Continuous Verification With Keystrokes, Khandaker Abir Rahman
Snoop-Forge-Replay Attack On Continuous Verification With Keystrokes, Khandaker Abir Rahman
Doctoral Dissertations
We present a new attack called the snoop-forge-replay attack on the keystroke-based continuous verification systems. We performed the attacks on two levels – 1) feature-level and 2) sample-level.
(1) Feature-level attack targets specific keystroke-based continuous verification method or system. In feature-level attacks, we performed a series of experiments using keystroke data from 50 users who typed approximately 1200 to 2300 keystrokes of free text during three different periods. The experiments consisted of two parts. In the first part, we conducted zero-effort verification experiments with two verifiers ("R" and "S") and obtained Equal Error Rates (EERs) between 10% and 15% under …
Using Power-Law Properties Of Social Groups For Cloud Defense And Community Detection, Justin L. Rice
Using Power-Law Properties Of Social Groups For Cloud Defense And Community Detection, Justin L. Rice
Doctoral Dissertations
The power-law distribution can be used to describe various aspects of social group behavior. For mussels, sociobiological research has shown that the Lévy walk best describes their self-organizing movement strategy. A mussel's step length is drawn from a power-law distribution, and its direction is drawn from a uniform distribution. In the area of social networks, theories such as preferential attachment seek to explain why the degree distribution tends to be scale-free. The aim of this dissertation is to glean insight from these works to help solve problems in two domains: cloud computing systems and community detection.
Privacy and security are …