Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Information Security (4)
- Theory and Algorithms (4)
- Electrical and Computer Engineering (3)
- Engineering (3)
- Software Engineering (3)
-
- Systems Architecture (3)
- Other Computer Sciences (2)
- Power and Energy (2)
- Artificial Intelligence and Robotics (1)
- Computer Engineering (1)
- Computer and Systems Architecture (1)
- Controls and Control Theory (1)
- Databases and Information Systems (1)
- Electronic Devices and Semiconductor Manufacturing (1)
- Numerical Analysis and Scientific Computing (1)
- Other Computer Engineering (1)
- VLSI and Circuits, Embedded and Hardware Systems (1)
- Institution
- Keyword
-
- Internet of Things (2)
- <p>Application software -- Development.</p> <p>Mobile computing.</p> <p>Drone aircraft -- Control systems.</p> (1)
- Academic -- UNF -- Computing; Computing batch schedulers; high performance (1)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (1)
- Android appstore (1)
-
- Assistive Technology (1)
- Battery (1)
- Behavioral-ecological networks (1)
- Bio-social networking (1)
- Blockchain (1)
- CAmkES (1)
- Cloud computing (1)
- Cognitive radio (1)
- Computers (1)
- Cost (1)
- Covert (1)
- Cyber security (1)
- Cybersecurity internet web (1)
- Delay tolerant network (1)
- Detecting saturation attacks (1)
- Die-to-die interactions (1)
- Distributed systems (1)
- Drone apps (1)
- Dynamic spectrum access (1)
- Electricity grid (1)
- Energy (1)
- Energy-aware algorithms (1)
- Feedback analysis (1)
- Gate signal modeling (1)
- Google Play Store (1)
- Publication
-
- Dissertations, Theses, and Capstone Projects (2)
- Doctoral Dissertations (2)
- Master's Projects (2)
- Boise State University Theses and Dissertations (1)
- Electronic Theses and Dissertations (1)
-
- Graduate Theses and Dissertations (1)
- Master's Theses (1)
- Masters Theses & Doctoral Dissertations (1)
- Mathematics and Computer Science Capstones (1)
- Senior Projects Fall 2019 (1)
- Theses and Dissertations--Computer Science (1)
- Theses, Dissertations and Capstones (1)
- UNF Graduate Theses and Dissertations (1)
Articles 1 - 16 of 16
Full-Text Articles in OS and Networks
Detection And Countermeasure Of Saturation Attacks In Software-Defined Networks, Samer Yousef Khamaiseh
Detection And Countermeasure Of Saturation Attacks In Software-Defined Networks, Samer Yousef Khamaiseh
Boise State University Theses and Dissertations
The decoupling of control and data planes in software-defined networking (SDN) facilitates orchestrating the network traffic. However, SDN suffers from critical security issues, such as DoS saturation attacks on the data plane. These attacks can exhaust the SDN component resources, including the computational resources of the control plane, create a high packet loss rate and a long delay in delivering the OpenFlow messages due to the bandwidth consumption of the OpenFlow connection channel, and exhausting the buffer memory of the data plane.
Currently, most of the existing machine learning detection methods rely on a predefined time-window to start analyzing the …
Software-Defined Infrastructure For Iot-Based Energy Systems, Stephen Lee
Software-Defined Infrastructure For Iot-Based Energy Systems, Stephen Lee
Doctoral Dissertations
Internet of Things (IoT) devices are becoming an essential part of our everyday lives. These physical devices are connected to the internet and can measure or control the environment around us. Further, IoT devices are increasingly being used to monitor buildings, farms, health, and transportation. As these connected devices become more pervasive, these devices will generate vast amounts of data that can be used to gain insights and build intelligence into the system. At the same time, large-scale deployment of these devices will raise new challenges in efficiently managing and controlling them. In this thesis, I argue that the IoT …
Energy-Aware Algorithms For Greening Internet-Scale Distributed Systems Using Renewables, Vani Gupta
Energy-Aware Algorithms For Greening Internet-Scale Distributed Systems Using Renewables, Vani Gupta
Doctoral Dissertations
Internet-scale Distributed Systems (IDSs) are large distributed systems that are comprised of hundreds of thousands of servers located in hundreds of data centers around the world. A canonical example of an IDS is a content delivery network (CDN) that delivers content to users from a large global deployment of servers around the world. IDSs consume large amounts of energy and their energy requirements are projected to increase significantly in the future. With carbon emissions from data centers increasing every year, use of renewables to power data centers is critical for the sustainability of data centers and for the environment. In …
Franklin Township Municipal Broadband And Wireless Network, William Galtieri
Franklin Township Municipal Broadband And Wireless Network, William Galtieri
Mathematics and Computer Science Capstones
Franklin Township is a municipality in Somerset County, New Jersey covering an area of approximately 46.15 square miles and a population of 62,300 as of the 2010 Census. The town relies on a cellular provider to provide data connections for computers in municipal vehicles such as police cars, public works vehicles, fire inspection trucks, building inspectors and other departments. Additionally, the municipality pays for connections for security cameras at remote facilities and for smart garbage can monitoring throughout the town. These services are costly for the municipality and create a dependency on service providers for access to information needed by …
An Evolutionary Perspective On Foraging Strategies And Group Dynamics In Bio-Social Inspired Cognitive Radio Networks, Anna Wisniewska
An Evolutionary Perspective On Foraging Strategies And Group Dynamics In Bio-Social Inspired Cognitive Radio Networks, Anna Wisniewska
Dissertations, Theses, and Capstone Projects
Saturation of wireless channels is inevitable as the number of wireless devices grows exponentially in an environment of limited radio spectrum capacity. Cognitive radio technology has been proposed to relieve overcrowded spectrum resources by allowing licensed channels to be opportunistically accessed by unlicensed users (cognitive radio devices) during periods of time when the license holder (primary user) is absent from its channel. Uncoordinated competition over limited resources among cognitive radio devices poses complex co-existence challenges. We propose novel bio-social inspired behavioral models and map out plausible evolutionary trajectories of co-use strategies in the cognitive radio ecosystem. By drawing parallels between …
Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui
Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui
Electronic Theses and Dissertations
This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be …
Network Alignment In Heterogeneous Social Networks, Priyanka Kasbekar
Network Alignment In Heterogeneous Social Networks, Priyanka Kasbekar
Master's Projects
Online Social Networks (OSN) have numerous applications and an ever growing user base. This has led to users being a part of multiple social networks at the same time. Identifying a similar user from one social network on another social network will give in- formation about a user’s behavior on different platforms. It further helps in community detection and link prediction tasks. The process of identifying or aligning users in multiple networks is called Network Alignment. More the information we have about the nodes / users better the results of Network Alignment. Unlike other related work in this field that …
Predictive Analysis For Cloud Infrastructure Metrics, Paridhi Agrawal
Predictive Analysis For Cloud Infrastructure Metrics, Paridhi Agrawal
Master's Projects
In a cloud computing environment, enterprises have the flexibility to request resources according to their application demands. This elastic feature of cloud computing makes it an attractive option for enterprises to host their applications on the cloud. Cloud providers usually exploit this elasticity by auto-scaling the application resources for quality assurance. However, there is a setup-time delay that may take minutes between the demand for a new resource and it being prepared for utilization. This causes the static resource provisioning techniques, which request allocation of a new resource only when the application breaches a specific threshold, to be slow and …
Dynamic Shifting Of Virtual Network Topologies For Network Attack Prevention, Lenoy Avidan
Dynamic Shifting Of Virtual Network Topologies For Network Attack Prevention, Lenoy Avidan
Master's Theses
Computer networks were not designed with security in mind, making research into the subject of network security vital. Virtual Networks are similar to computer networks, except the components of a Virtual Network are in software rather than hardware. With the constant threat of attacks on networks, security is always a big concern, and Virtual Networks are no different. Virtual Networks have many potential attack vectors similar to physical networks, making research into Virtual Network security of great importance. Virtual Networks, since they are composed of virtualized network components, have the ability to dynamically change topologies. In this paper, we explore …
Model Development And Assessment Of The Gate Network In A High-Performance Sic Power Module, William Austin Curbow
Model Development And Assessment Of The Gate Network In A High-Performance Sic Power Module, William Austin Curbow
Graduate Theses and Dissertations
The main objective of this effort is to determine points of weakness in the gate network of a high-performance SiC power module and to offer remedies to these issues to increase the overall performance, robustness, and reliability of the technology. In order to accomplish this goal, a highly accurate model of the gate network is developed through three methods of parameter extraction: calculation, simulation, and measurement. A SPICE model of the gate network is developed to analyze four electrical issues in a high-speed, SiC-based power module including the necessary internal gate resistance for damping under-voltage and over-voltage transients, the disparity …
A Mobile Cyber-Physical System Framework For Aiding People With Visual Impairment, Martin Goldberg
A Mobile Cyber-Physical System Framework For Aiding People With Visual Impairment, Martin Goldberg
Dissertations, Theses, and Capstone Projects
It is a challenging problem for researchers and engineers in the assistive technology (AT) community to provide suitable solutions for visually impaired people (VIPs) through AT to meet orientation, navigation and mobility (ONM) needs. Given the spectrum of assistive technologies currently available for the purposes of aiding VIPs with ONM, our literature review and survey have shown that there is a reluctance to adopt these technological solutions in the VIP community.
Motivated by these findings, we think it critical to re-examine and rethink the approaches that have been taken. It is our belief that we need to take a different …
Malgazer: An Automated Malware Classifier With Running Window Entropy And Machine Learning, Keith Jones
Malgazer: An Automated Malware Classifier With Running Window Entropy And Machine Learning, Keith Jones
Masters Theses & Doctoral Dissertations
This dissertation explores functional malware classification using running window entropy and machine learning classifiers. This topic was under researched in the prior literature, but the implications are important for malware defense. This dissertation will present six new design science artifacts. The first artifact was a generalized machine learning based malware classifier model. This model was used to categorize and explain the gaps in the prior literature. This artifact was also used to compare the prior literature to the classifiers created in this dissertation, herein referred to as “Malgazer” classifiers.
Running window entropy data was required, but the algorithm was too …
Optimal Gateway Placement In Low-Cost Smart Cities, Oluwashina Madamori
Optimal Gateway Placement In Low-Cost Smart Cities, Oluwashina Madamori
Theses and Dissertations--Computer Science
Rapid urbanization burdens city infrastructure and creates the need for local governments to maximize the usage of resources to serve its citizens. Smart city projects aim to alleviate the urbanization problem by deploying a vast amount of Internet-of-things (IoT) devices to monitor and manage environmental conditions and infrastructure. However, smart city projects can be extremely expensive to deploy and manage partly due to the cost of providing Internet connectivity via 5G or WiFi to IoT devices. This thesis proposes the use of delay tolerant networks (DTNs) as a backbone for smart city communication; enabling developing communities to become smart cities …
What People Complain About Drone Apps? A Large-Scale Empirical Study Of Google Play Store Reviews, Kanimozhi Kalaichelvan
What People Complain About Drone Apps? A Large-Scale Empirical Study Of Google Play Store Reviews, Kanimozhi Kalaichelvan
Theses, Dissertations and Capstones
Within the past few years, there has been a tremendous increase in the number of UAVs (Unmanned Aerial Vehicle) or drones manufacture and purchase. It is expected to proliferate further, penetrating into every stream of life, thus making its usage inevitable. The UAV’s major components are its physical hardware and programming software, which controls its navigation or performs various tasks based on the field of concern. The drone manufacturers launch the controlling app for the drones in mobile app stores. A few drone manufacturers also release development kits to aid drone enthusiasts in developing customized or more creative apps. Thus, …
Covertnet: Circumventing Web Surveillance Using Covert Channels, Will C. Burghard
Covertnet: Circumventing Web Surveillance Using Covert Channels, Will C. Burghard
Senior Projects Fall 2019
Senior Project submitted to The Division of Science, Mathematics and Computing of Bard College.
A Method Of Evaluation Of High-Performance Computing Batch Schedulers, Jeremy Stephen Futral
A Method Of Evaluation Of High-Performance Computing Batch Schedulers, Jeremy Stephen Futral
UNF Graduate Theses and Dissertations
According to Sterling et al., a batch scheduler, also called workload management, is an application or set of services that provide a method to monitor and manage the flow of work through the system [Sterling01]. The purpose of this research was to develop a method to assess the execution speed of workloads that are submitted to a batch scheduler. While previous research exists, this research is different in that more complex jobs were devised that fully exercised the scheduler with established benchmarks. This research is important because the reduction of latency even if it is miniscule can lead to massive …