Component Hiding Using Identification And Boundary Blurring Techniques, 2010 Air Force Institute of Technology
Component Hiding Using Identification And Boundary Blurring Techniques, James D. Parham Jr.
Theses and Dissertations
Protecting software from adversarial attacks is extremely important for DoD technologies. When systems are compromised, the possibility exists for recovery costing millions of dollars and countless labor hours. Circuits implemented on embedded systems utilizing FPGA technology are the result of downloading software for instantiating circuits with specific functions or components. We consider the problem of component hiding a form of software protection. Component identification is a well studied problem. However, we use component identification as a metric for driving the cost of reverse engineering to an unreasonable level. We contribute to protection of software and circuitry by implementing a Java …
Modeling Computer Communication Networks In A Realistic 3d Environment, 2010 Air Force Institute of Technology
Modeling Computer Communication Networks In A Realistic 3d Environment, Charles R. Rowell Jr.
Theses and Dissertations
Communication network simulations have typically been visualized in the past through 2D representations, but this is insufficient for battlefield network scenarios. Visual representations of battlefield networks greatly benefit from 3D visualization due to its ability to retain asset location. This research investigates the feasibility of modeling a typical battlefield communication network in a realistic 3D manner and discusses the effects of doing so. The result is an open source, 3D network visualization tool that can create highly intuitive connected battlefield scenes, enabling the user to quickly comprehend network state. It highlights mobile assets, packet movement, and node connectivity while allowing …
A Distributed Network Logging Topology, 2010 Air Force Institute of Technology
A Distributed Network Logging Topology, Nicholas E. Fritts
Theses and Dissertations
Network logging is used to monitor computer systems for potential problems and threats by network administrators. Research has found that the more logging enabled, the more potential threats can be detected in the logs (Levoy, 2006). However, generally it is considered too costly to dedicate the manpower required to analyze the amount of logging data that it is possible to generate. Current research is working on different correlation and parsing techniques to help filter the data, but these methods function by having all of the data dumped in to a central repository. Central repositories are limited in the amount of …
Static And Dynamic Component Obfuscation On Reconfigurable Devices, 2010 Air Force Institute of Technology
Static And Dynamic Component Obfuscation On Reconfigurable Devices, Camdon R. Cady
Theses and Dissertations
Computing systems are used in virtually every aspect of our lives. Technology such as smart phones and electronically controlled subsystems in cars is becoming so commonly used that it is virtually ubiquitous. Sometimes, this technology can be exploited to perform functions that it was never intended to perform, or fail to provide information that it is supposed to protect. X-HIA was shown to be effective at identifying several circuit components in a significantly shorter time than previous identification methods. Instead of requiring a number of input/output pairings that grows factorially or exponentially as the circuit size grows, it requires only …
Developing Cyberspace Data Understanding: Using Crisp-Dm For Host-Based Ids Feature Mining, 2010 Air Force Institute of Technology
Developing Cyberspace Data Understanding: Using Crisp-Dm For Host-Based Ids Feature Mining, Joseph R. Erskine
Theses and Dissertations
Current intrusion detection systems generate a large number of specific alerts, but do not provide actionable information. Many times, these alerts must be analyzed by a network defender, a time consuming and tedious task which can occur hours or days after an attack occurs. Improved understanding of the cyberspace domain can lead to great advancements in Cyberspace situational awareness research and development. This thesis applies the Cross Industry Standard Process for Data Mining (CRISP-DM) to develop an understanding about a host system under attack. Data is generated by launching scans and exploits at a machine outfitted with a set of …
Service-Differentiated And Reliable Communication In Event-Based Wireless Sensor Networks, 2010 University of Nebraska at Lincoln
Service-Differentiated And Reliable Communication In Event-Based Wireless Sensor Networks, Yuyan Xue
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Wireless Sensor Networks (WSNs) consist of low-power embedded devices with integrated sensing, computing and wireless communication capabilities. These devices, called sensor nodes or motes, are often battery-powered and deployed in a distributed manner to provide observations on the physical world. Reliably and promptly collecting the sensing data to convey the features of a surveillance area, especially the events of interest, to the sink is one of the most critical requirements of WSN design. However, dynamic wireless channel conditions and the constrained energy resources make it a challenging task to provide the end-to-end performance guarantees in multi-hop WSNs.
The objective of …
Study Of Physical Layer Security In Wireless Communications, 2010 University of Nebraska at Lincoln
Study Of Physical Layer Security In Wireless Communications, Mustafa Duruturk
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
This thesis has investigated security in wireless communications at physical layer. Security is an important issue for wireless communications and poses many challenges. Most security schemes have been applied to the upper layers of communications networks. Since in a typical wireless communication, transmission of data is over the air, third party receiver(s) may have easy access to the transmitted data. This work discusses a new security technique at the physical layer for the MIMO (802.11n) transmitters. For this project, the wireless medium is secured by transmitting a noise signal that is only recoverable by the receiver. This report includes an …
Global Positioning Logger, 2010 California Polytechnic State University - San Luis Obispo
Global Positioning Logger, Matthew Hall
Computer Engineering
The Global Positioning Logger (GPL) is a mobile embedded device that utilizes GPS technology. The GPS data is used to display current speed and past global locations.
Reverberation-Chamber Test Environment For Outdoor Urban Wireless Propagation Studies, 2010 University of South Carolina - Columbia
Reverberation-Chamber Test Environment For Outdoor Urban Wireless Propagation Studies, Helge Fielitz, Kate A. Remley, Christopher L. Holloway, Qian Zhang, Qiong Wu, David W. Matolak
Faculty Publications
We introduce a test environment to replicate the well-known clustering of reflections in power delay profiles arising from late-time delays and reflections. Urban wireless propagation environments are known to exhibit such clustering. The test setup combines discrete reflections generated by a fading simulator with the continuous distribution of reflections created in a reverberation chamber. We describe measurements made in an urban environment in Denver, CO, that illustrate these multiple distributions of reflections. Our comparison of measurements made in the urban environment to those made in the new test environment shows good agreement.
A Graduate Education In Software Management And The Software Business For Mid-Career Professionals, 2010 Carnegie Mellon University
A Graduate Education In Software Management And The Software Business For Mid-Career Professionals, Ray Bareiss, Gladys Mercier
Ray Bareiss
Given the unique nature of the software business, the faculty of Carnegie Mellon University’s Silicon Valley campus concluded that mid-career software professionals would be better served by a tailored master’s degree focusing on software management and more broadly on the business of software than by a typical MBA. Our software management master’s program integrates business, technical, and soft skills to prepare our students for technical leadership in their current companies or in entrepreneurial ventures. Our initial program built on the strengths of Carnegie Mellon’s world-class software engineering education. We targeted students working in large companies, engaged in large-scale enterprise software …
Coaching Via Cognitive Apprenticeship, 2010 Carnegie Mellon University
Coaching Via Cognitive Apprenticeship, Ray Bareiss, Martin Radley
Ray Bareiss
At Carnegie Mellon’s Silicon Valley campus we employ a learn by- doing educational approach in which nearly all student learning, and thus instruction, is in the context of realistic, team based projects. Consequently, we have adopted coaching as our predominant teaching model. In this paper we reflect on our experience with the nature of teaching by coaching using a framework derived from Cognitive Apprenticeship, and explain how we employ the techniques it suggests in our teaching. We also discuss a range of instructional tensions that arise in teaching by coaching and present a survey of student attitudes regarding the effectiveness …
Networking And Computing Infrastructure In Nevada: Current Status And Future Developments, 2010 University of Nevada, Reno
Networking And Computing Infrastructure In Nevada: Current Status And Future Developments, Frederick C. Harris
2010 Annual Nevada NSF EPSCoR Climate Change Conference
12 PowerPoint slides Session 2: Infrastructure Convener: Sergiu Dascalu, UNR
Architecture And Usability Aspects Of Environmental Data Portals, 2010 University of Nevada Reno
Architecture And Usability Aspects Of Environmental Data Portals, Michael Mcmahon, Jr.
2010 Annual Nevada NSF EPSCoR Climate Change Conference
12 PowerPoint slides Session 2: Infrastructure Convener: Sergiu Dascalu, UNR Abstract: -Web Portal: A web site that acts as a starting point or gateway to Internet content, services, and information. Portals expose this information via a consistent set of visual elements and organizational constructs that improve the user experience and may relate, unify, or otherwise enhance the content. -Data Portal: A web site that acts as a starting point or gateway to Internet content, web/data services, and related information. Portals expose this information via a consistent set of visual elements and organizational constructs that improve the user experience and relate, …
Survey Of Environmental Data Portals: Features, Characteristics, And Reliability Issues, 2010 University of Nevada, Las Vegas
Survey Of Environmental Data Portals: Features, Characteristics, And Reliability Issues, Shahram Latifi, David Walker
2010 Annual Nevada NSF EPSCoR Climate Change Conference
24 PowerPoint slides Session 2: Infrastructure Convener: Sergiu Dascalu, UNR Abstract: -What is a Data Portal? -Presents information from diverse sources in a unified way -Enables instant, reliable and secure exchange of information over the Web -The "portal" concept is to offer a single web page that aggregates content from several systems or servers.
Goals, Plans, And Strategies Of The Cyberinfrastructure Project Component, 2010 University of Nevada Reno
Goals, Plans, And Strategies Of The Cyberinfrastructure Project Component, Sergiu Dascalu
2010 Annual Nevada NSF EPSCoR Climate Change Conference
15 PowerPoint slides Session 2: Infrastructure Convener: Sergiu Dascalu, UNR Abstract: -Team -Goal and Targets -Strategies and Activities -Progress: Activities & Milestones -Plans
Research Poster: Software Frameworks For Improved Productivity In Climate Change Research, 2010 University of Nevada Reno
Research Poster: Software Frameworks For Improved Productivity In Climate Change Research, Sohei Okamoto
2010 Annual Nevada NSF EPSCoR Climate Change Conference
Research poster
Research Poster: Architecture And Usability Aspects Of Environmental Data Portals, 2010 University of Nevada Reno
Research Poster: Architecture And Usability Aspects Of Environmental Data Portals, Victor Ivanov
2010 Annual Nevada NSF EPSCoR Climate Change Conference
Research poster
Research Poster: Htsma: A Hybrid Temporal-Spatial Multi-Channel Assignment Scheme In Heterogeneous Wireless Mesh Networks, 2010 University of Nevada, Las Vegas
Research Poster: Htsma: A Hybrid Temporal-Spatial Multi-Channel Assignment Scheme In Heterogeneous Wireless Mesh Networks, Yan Jin, Ju-Yeon Jo, Mei Yang, Yoohwan Kim, Yingtao Jiang, John Gowens
2010 Annual Nevada NSF EPSCoR Climate Change Conference
Research poster
Research Poster: Survey Of Environmental Data Portals: Features And Characteristics, 2010 University of Nevada, Las Vegas
Research Poster: Survey Of Environmental Data Portals: Features And Characteristics, David Walker
2010 Annual Nevada NSF EPSCoR Climate Change Conference
Research poster
Web-Dinar: Web Based Diagnosis Of Network And Application Resources In Disaster Response Systems, 2010 University of Massachusetts Amherst
Web-Dinar: Web Based Diagnosis Of Network And Application Resources In Disaster Response Systems, Kartik Deshpande
Masters Theses 1911 - February 2014
Disaster management and emergency response mechanisms are coming of age post 9/11. Paper based triaging and evacuation is slowly being replaced with much advanced mechanisms using remote clients (Laptops, Thin clients, PDAs), RFiDs etc. This reflects a modern trend to deploy Information Technology (IT) in disaster management. IT elements provide a great a deal of flexibility and seamlessness in the communication of information. The information flowing is so critical that, loss of data is not at all acceptable. Loss of data would mean loss of critical medical information portraying the disaster scenario. This would amount to a wrong picture being …