Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Computer Sciences
Malicious Manipulation In Service-Oriented Network, Software, And Mobile Systems: Threats And Defenses, Dakun Shen
Malicious Manipulation In Service-Oriented Network, Software, And Mobile Systems: Threats And Defenses, Dakun Shen
USF Tampa Graduate Theses and Dissertations
This dissertation includes three approaches we have been designed to tackle threats and challenges in network, software, and mobile security. The first approach demonstrates a new class of content masking attacks against the Adobe PDF standard, causing documents to appear to humans dissimilar to the underlying content extracted by information-based services. The second work protects sensitive data in binaries from being corrupted by cyber attackers. The last work proposes a mechanism which utilizes the unique walking patterns inherent to humans and differentiate our work from other walking behavior studies by using it as first-order authentication and developing matching methods fast …
Secure Communication Scheme In Smart Home Environment, Hari Krishna Jonnalagadda
Secure Communication Scheme In Smart Home Environment, Hari Krishna Jonnalagadda
USF Tampa Graduate Theses and Dissertations
Internet of Things, has started to mark its existence from past few years. Right from its inception with a coke machine at Carnegie Mellon University, it has come a long way, connecting billions of devices to internet. This journey is well supported by the advancements in networking, hardware miniaturization and sensing capabilities. Diverse nature of applications of Internet of Things, has cut the communication barriers between the varieties of fields ranging from manufacturing industry to health-care industry. Smart Home is one such application of Internet of Things. Connectivity of home appliances, to achieve automation in living, defines Smart Home. Out …