Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Library and Information Science

Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi Dec 2016

Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …


Out From Darkness And Into The Light: The Role Of Transparency And Social Media In Government, Frances Nichols Bachstein Aug 2016

Out From Darkness And Into The Light: The Role Of Transparency And Social Media In Government, Frances Nichols Bachstein

Doctoral Dissertations

Government agencies that protect secrecy often have a difficult time connecting to the public. Secretive, or perceived secretive government organizations often fall into the nebulous realm of uncertainty for the information consumer. This results in a great deal of misinformation and disinformation being thought of as correct. Since 2008, the US government is moving toward a more transparent, open, and easily accessed information base through social media. Agencies across the government are adopting types of social media communication. However, bureaus that primarily focus on security and safeguarding secrets struggle with how much disclose, which platforms of social media are the …


Organizing Historical Agricultural Data And Identifying Data Integrity Zones To Assess Agricultural Data Quality, Elizabeth Marie Hawkins Aug 2016

Organizing Historical Agricultural Data And Identifying Data Integrity Zones To Assess Agricultural Data Quality, Elizabeth Marie Hawkins

Open Access Dissertations

As precision agriculture transitions into decision agriculture, data driven decision- making has become the focus of the industry and data quality will be increasingly important. Traditionally, yield data cleaning techniques have removed individual data points based on criteria primarily focused on the yield values. However, when these methods are used, the underlying causes of the errors are often overlooked and as a result, these techniques may fail to remove all of the inaccurate data or remove “good” data. As part of this research, an alternative to data cleaning was developed. Data integrity zones (DIZ) within each field were identified by …