Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (10)
- United Arab Emirates University (3)
- University of New Haven (2)
- Arkansas Tech University (1)
- Boise State University (1)
-
- Brigham Young University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Coastal Carolina University (1)
- DePaul University (1)
- East Tennessee State University (1)
- Georgia Southern University (1)
- James Madison University (1)
- La Salle University (1)
- Liberty University (1)
- Mississippi State University (1)
- Nova Southeastern University (1)
- Old Dominion University (1)
- San Jose State University (1)
- Stephen F. Austin State University (1)
- University of Nebraska - Lincoln (1)
- University of South Alabama (1)
- Keyword
-
- Blockchain (4)
- Cybersecurity (4)
- Privacy (3)
- Security (3)
- AI (2)
-
- Attribute-based encryption (2)
- Bitcoin (2)
- Cryptocurrency (2)
- Cybercrime (2)
- Down-stream (2)
- Early detection (2)
- Encryption (2)
- Keyword search (2)
- Machine Learning (2)
- 51% Attack (1)
- AI. (1)
- Access control (1)
- Adversarial attacks (1)
- Airforce (1)
- Artificial Intelligence (AI) (1)
- Artificial intelligence (1)
- Attribute-based credentials (1)
- Axiomatic design (1)
- Backdoors (1)
- Benefits of AI (1)
- Bias in AI Systems (1)
- Big data (1)
- Bloom-filter-based keyword search (1)
- Breach (1)
- Brown Laboratory Rat (1)
- Publication
-
- Research Collection School Of Computing and Information Systems (10)
- Theses (3)
- Electronic Theses and Dissertations (2)
- Honors Theses (2)
- Master's Theses (2)
-
- ATU Research Symposium (1)
- CCE Theses and Dissertations (1)
- College of Engineering Summer Undergraduate Research Program (1)
- Cyber Operations and Resilience Program Graduate Projects (1)
- Cybersecurity Undergraduate Research Showcase (1)
- DePaul Magazine (1)
- Journal of Nonprofit Innovation (1)
- Library Philosophy and Practice (e-journal) (1)
- Master's Projects (1)
- Mathematics and Computer Science Capstones (1)
- Senior Honors Projects, 2020-current (1)
- Senior Honors Theses (1)
- Theses and Dissertations (1)
- Undergraduate Honors Theses (1)
- Publication Type
- File Type
Articles 31 - 33 of 33
Full-Text Articles in Information Security
T-Counter: Trustworthy And Efficient Cpu Resource Measurement Using Sgx In The Cloud, Chuntao Dong, Qingni Shen, Xuhua Ding, Daoqing Yu, Wu Luo, Pengfei Wu, Zhonghai Wu
T-Counter: Trustworthy And Efficient Cpu Resource Measurement Using Sgx In The Cloud, Chuntao Dong, Qingni Shen, Xuhua Ding, Daoqing Yu, Wu Luo, Pengfei Wu, Zhonghai Wu
Research Collection School Of Computing and Information Systems
As cloud services have become popular, and their adoption is growing, consumers are becoming more concerned about the cost of cloud services. Cloud Service Providers (CSPs) generally use a pay-per-use billing scheme in the cloud services model: consumers use resources as they needed and are billed for their resource usage. However, CSPs are untrusted and privileged; they have full control of the entire operating system (OS) and may tamper with bills to cheat consumers. So, how to provide a trusted solution that can keep track of and verify the consumers’ resource usage has been a challenging problem. In this paper, …
High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru
High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru
Master's Projects
Distributed filesystem architectures use commodity hardware to store data on a large scale with maximum consistency and availability. Blockchain makes it possible to store information that can never be tampered with and incentivizes a traditional decentralized storage system. This project aimed to implement a decentralized filesystem that leverages the blockchain to keep a record of all the transactions on it. A conventional filesystem viz. GFS [1] or HDFS [2] uses designated servers owned by their organization to store the data and are governed by a master service. This project aimed at removing a single point of failure and makes use …
Campus Safety Data Gathering, Classification, And Ranking Based On Clery-Act Reports, Walaa F. Abo Elenin
Campus Safety Data Gathering, Classification, And Ranking Based On Clery-Act Reports, Walaa F. Abo Elenin
Electronic Theses and Dissertations
Most existing campus safety rankings are based on criminal incident history with minimal or no consideration of campus security conditions and standard safety measures. Campus safety information published by universities/colleges is usually conceptual/qualitative and not quantitative and are based-on criminal records of these campuses. Thus, no explicit and trusted ranking method for these campuses considers the level of compliance with the standard safety measures. A quantitative safety measure is important to compare different campuses easily and to learn about specific campus safety conditions.
In this thesis, we utilize Clery-Act reports of campuses to automatically analyze their safety conditions and generate …