Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Sciences

Acoustic/Gravity Wave Phenomena In Wide-Field Imaging: From Data Analysis To A Modeling Framework For Observability In The Mlt Region And Beyond, Jaime Aguilar Guerrero Nov 2021

Acoustic/Gravity Wave Phenomena In Wide-Field Imaging: From Data Analysis To A Modeling Framework For Observability In The Mlt Region And Beyond, Jaime Aguilar Guerrero

Doctoral Dissertations and Master's Theses

Acoustic waves, gravity waves, and larger-scale tidal and planetary waves are significant drivers of the atmosphere’s dynamics and of the local and global circulation that have direct and indirect impacts on our weather and climate. Their measurements and characterization are fundamental challenges in Aeronomy that require a wide range of instrumentation with distinct operational principles. Most measurements share the common features of integrating optical emissions or effects on radio waves through deep layers of the atmosphere. The geometry of these integrations create line-of-sight effects that must be understood, described, and accounted for to properly present the measured data in traditional …


A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami May 2021

A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami

Doctoral Dissertations and Master's Theses

Social engineering attacks (SE-attacks) in enterprises are hastily growing and are becoming increasingly sophisticated. Generally, SE-attacks involve the psychological manipulation of employees into revealing confidential and valuable company data to cybercriminals. The ramifications could bring devastating financial and irreparable reputation loss to the companies. Because SE-attacks involve a human element, preventing these attacks can be tricky and challenging and has become a topic of interest for many researchers and security experts. While methods exist for detecting SE-attacks, our literature review of existing methods identified many crucial factors such as the national cultural, organizational, and personality traits of employees that enable …