Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii May 2023

Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii

Electronic Theses and Dissertations

This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.


Identifying And Analyzing Multi-Star Systems Among Tess Planetary Candidates Using Gaia, Katie E. Bailey May 2023

Identifying And Analyzing Multi-Star Systems Among Tess Planetary Candidates Using Gaia, Katie E. Bailey

Electronic Theses and Dissertations

Exoplanets represent a young, rapidly advancing subfield of astrophysics where much is still unknown. It is therefore important to analyze trends among their parameters to learn more about these systems. More complexity is added to these systems with the presence of additional stellar companions. To study these complex systems, one can employ programming languages such as Python to parse databases such as those constructed by TESS and Gaia to bridge the gap between exoplanets and stellar companions. Data can then be analyzed for trends in these multi-star exoplanet systems and in juxtaposition to their single-star counterparts. This research was able …


Differentiate Metasploit Framework Attacks From Others, Gina Liu Ajero Dec 2022

Differentiate Metasploit Framework Attacks From Others, Gina Liu Ajero

Electronic Theses and Dissertations

Metasploit Framework is a very popular collection of penetration testing tools. From auxiliaries such as network scanners and mappers to exploits and payloads, Metasploit Framework offers a plethera of apparatuses to implement all the stages of a penetration test. There are two versions: both a free open-source community version and a commercial professional version called Metasploit Pro. The free version, Metasploit Framework, is heavily used by cyber crimininals to carry out illegal activities to gain unauthorized access to targets.

In this paper, I conduct experiments in a virtual environment to discover whether attacks originated from Metasploit Framework are marked with …


The Effect Of Initial Conditions On The Weather Research And Forecasting Model, Aaron D. Baker May 2021

The Effect Of Initial Conditions On The Weather Research And Forecasting Model, Aaron D. Baker

Electronic Theses and Dissertations

Modeling our atmosphere and determining forecasts using numerical methods has been a challenge since the early 20th Century. Most models use a complex dynamical system of equations that prove difficult to solve by hand as they are chaotic by nature. When computer systems became more widely adopted and available, approximating the solution of these equations, numerically, became easier as computational power increased. This advancement in computing has caused numerous weather models to be created and implemented across the world. However a challenge of approximating these solutions accurately still exists as each model have varying set of equations and variables to …


Applications Of Digital Remote Sensing To Quantify Glacier Change In Glacier And Mount Rainier National Parks, Brianna Clark May 2020

Applications Of Digital Remote Sensing To Quantify Glacier Change In Glacier And Mount Rainier National Parks, Brianna Clark

Electronic Theses and Dissertations

Digital remote sensing and geographic information systems were employed in performing area and volume calculations on glacial landscapes. Characteristics of glaciers from two geographic regions, the Intermountain Region (between the Rocky Mountain and Cascade Ranges) and the Pacific Northwest, were estimated for the years 1985, 2000, and 2015. Glacier National Park was studied for the Intermountain Region whereas Mount Rainier National Park was representative of the glaciers in the Pacific Northwest. Within the thirty year period of the study, the glaciers in Glacier National Park decreased in area by 27.5 percent while those on Mount Rainier only decreased by 5.7 …