Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Computer Science (2)
- Air gap (1)
- Applied sciences (1)
- Collaborative environment (1)
- Cyber (1)
-
- Cyber Security (1)
- Cyberdefense (1)
- Cybereducation (1)
- Cybersecurity (1)
- Data exfiltration (1)
- Golden reference library (1)
- Hardware Security (1)
- Hardware security (1)
- Hardware trojan (1)
- Host enumeration (1)
- IPv6 (1)
- Information Security (1)
- Infrasound (1)
- Knowledge management systems (1)
- Knowledge sharing (1)
- Machine Learning (1)
- Machine learning (1)
- Noise (1)
- PHP (1)
- Physical Unclonable Function (1)
- Process Variations (1)
- Reliability (1)
- Security (1)
- Security research (1)
- Static Analysis (1)
Articles 1 - 7 of 7
Full-Text Articles in Information Security
Context-Sensitive Auto-Sanitization For Php, Jared M. Smith, Richard J. Connor, David P. Cunningham, Kyle G. Bashour, Walter T. Work
Context-Sensitive Auto-Sanitization For Php, Jared M. Smith, Richard J. Connor, David P. Cunningham, Kyle G. Bashour, Walter T. Work
Chancellor’s Honors Program Projects
No abstract provided.
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
HON499 projects
The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information includes …
Intrinsic Functions For Securing Cmos Computation: Variability, Modeling And Noise Sensitivity, Xiaolin Xu
Intrinsic Functions For Securing Cmos Computation: Variability, Modeling And Noise Sensitivity, Xiaolin Xu
Doctoral Dissertations
A basic premise behind modern secure computation is the demand for lightweight cryptographic primitives, like identifier or key generator. From a circuit perspective, the development of cryptographic modules has also been driven by the aggressive scalability of complementary metal-oxide-semiconductor (CMOS) technology. While advancing into nano-meter regime, one significant characteristic of today's CMOS design is the random nature of process variability, which limits the nominal circuit design. With the continuous scaling of CMOS technology, instead of mitigating the physical variability, leveraging such properties becomes a promising way. One of the famous products adhering to this double-edged sword philosophy is the Physically …
Hardware Trojan Detection Via Golden Reference Library Matching, Lucas Weaver
Hardware Trojan Detection Via Golden Reference Library Matching, Lucas Weaver
Graduate Theses and Dissertations
Due to the proliferation of hardware Trojans in third party Intellectual Property (IP) designs, the issue of hardware security has risen to the forefront of computer engineering. Because of the miniscule size yet devastating effects of hardware Trojans, few detection methods have been presented that adequately address this problem facing the hardware industry. One such method with the ability to detect hardware Trojans is Structural Checking. This methodology analyzes a soft IP at the register-transfer level to discover malicious inclusions. An extension of this methodology is presented that expands the list of signal functionalities, termed assets, in addition to introducing …
Ultrasonic Data Transmission And Steganography, Hunter Young
Ultrasonic Data Transmission And Steganography, Hunter Young
KSU Journey Honors College Capstones and Theses
This project discusses the feasibility of using ultrasound to transmit data between computer systems, particularly computer systems that have been intentionally cut off from traditional networks for increased security. The goal of this project is to provide a synthesis of the current research that has been done into the use of ultrasonic data transmission, and to conduct a series of tests determining the validity of certain claims made in regards to ultrasonic data transmission within the information security community. All research, experiments, results, and inferences have been discussed in the context of how they relate to the realm of information …
An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly
CCE Theses and Dissertations
Since September 11, 2001, the United States Government (USG) has possessed unparalleled capability in terms of dedicated intelligence and information collection assets supporting the analysts of the Intelligence Community (IC). The USG IC has sponsored, developed, and borne witness to extraordinary advances in technology, techniques, and procedures focused on knowledge harvesting, knowledge sharing, and collaboration. Knowledge, within successful (effective & productive) organizations, exists as a commodity; a commodity that can be created, captured, imparted, shared, and leveraged. The research problem that this study addressed is the challenge of maintaining strong organizational effectiveness and productivity through the use of an information …
An Investigation Into Off-Link Ipv6 Host Enumeration Search Methods, Clinton Carpene
An Investigation Into Off-Link Ipv6 Host Enumeration Search Methods, Clinton Carpene
Theses: Doctorates and Masters
This research investigated search methods for enumerating networked devices on off-link 64 bit Internet Protocol version 6 (IPv6) subnetworks. IPv6 host enumeration is an emerging research area involving strategies to enable detection of networked devices on IPv6 networks. Host enumeration is an integral component in vulnerability assessments (VAs), and can be used to strengthen the security profile of a system. Recently, host enumeration has been applied to Internet-wide VAs in an effort to detect devices that are vulnerable to specific threats. These host enumeration exercises rely on the fact that the existing Internet Protocol version 4 (IPv4) can be exhaustively …