Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Authentication (1)
- Backward secrecy (1)
- Biometric (1)
- Blockchain (1)
- Classifier (1)
-
- Crowdsourcing (1)
- Darkcomet (1)
- Encrypted malware (1)
- Frequency Distribution of features for Malware family classification/ (1)
- Group Key Agreement (1)
- Internet of Things (1)
- Iris (1)
- Machine learning (1)
- Malware detection (1)
- Minimum Wage (1)
- Mobile crowdsensing (1)
- Post-compromise security (1)
- Presentation attacks (1)
- Profit Maximization (1)
- QR code (1)
- RC4 (1)
- Smart Contract (1)
- Task Assignment (1)
Articles 1 - 5 of 5
Full-Text Articles in Engineering
Optimal Order Assignment With Minimum Wage Consideration (Ooamwc), Hakem Alazmi
Optimal Order Assignment With Minimum Wage Consideration (Ooamwc), Hakem Alazmi
Master of Science in Computer Science Theses
While the application of crowdsourcing has increased over the years, the technology experiences various issues during implementation. Examples of some of the issues that affect crowdsourcing include task assignment, profit maximizations, as well as time window issues. In some instances addressing some of the issues results in the other issues being overlooked. An example is when assigning tasks to workers, the profits of the workers might not be considered and this ends up affecting the profit maximization aspect. Various algorithms have been proposed to address the task assignment, profit maximizations, and time window issues. However, these algorithms address the issues …
Rethinking The Weakness Of Stream Ciphers And Its Application To Encrypted Malware Detection, William T. Stone, Junggab Son
Rethinking The Weakness Of Stream Ciphers And Its Application To Encrypted Malware Detection, William T. Stone, Junggab Son
Master of Science in Computer Science Theses
Encryption key use is a critical component to the security of a stream cipher: because many implementations simply consist of a key scheduling algorithm and logical exclusive or (XOR), an attacker can completely break the cipher by XORing two ciphertexts encrypted under the same key, revealing the original plaintexts and the key itself. The research presented in this paper reinterprets this phenomenon, using repeated-key cryptanalysis for stream cipher identification. It has been found that a stream cipher executed under a fixed key generates patterns in each character of the ciphertexts it produces and that these patterns can be used to …
Leveraging Smart Contracts For Asynchronous Group Key Agreement In Internet Of Things, Victor Youdom Kemmoe, Junggab Son
Leveraging Smart Contracts For Asynchronous Group Key Agreement In Internet Of Things, Victor Youdom Kemmoe, Junggab Son
Master of Science in Computer Science Theses
Group Key Agreement (GKA) mechanism plays a crucial role in the realization of various secure applications in various networks such as, but not limited to, sensor networks, Internet of Things (IoT), vehicular networks, social networks, and so on. To be suitable for IoT, GKA must satisfy several critical requirements. First, a GKA mechanism must be robust against a compromised device attack and satisfy essential secrecy definitions without the existence of a Trusted Third Party (TTP). TTP is often used by IoT devices in the establishment of ad hoc networks and usually, these devices are resource-constrained. Second, the GKA mechanism must …
Performance Of Malware Classification On Machine Learning Using Feature Selection, Nusrat Asrafi
Performance Of Malware Classification On Machine Learning Using Feature Selection, Nusrat Asrafi
Master of Science in Computer Science Theses
The exponential growth of malware has created a significant threat in our daily lives, which heavily rely on computers running all kinds of software. Malware writers create malicious software by creating new variants, new innovations, new infections and more obfuscated malware by using techniques such as packing and encrypting techniques. Malicious software classification and detection play an important role and a big challenge for cyber security research. Due to the increasing rate of false alarm, the accurate classification and detection of malware is a big necessity issue to be solved. In this research, eight malware family have been classifying according …
A Framework To Detect Presentation Attacks, Laeticia Etienne
A Framework To Detect Presentation Attacks, Laeticia Etienne
Master of Science in Information Technology Theses
Biometric-based authentication systems are becoming the preferred choice to replace password-based authentication systems. Among several variations of biometrics (e.g., face, eye, fingerprint), iris-based authentication is commonly used in every day applications. In iris-based authentication systems, iris images from legitimate users are captured and certain features are extracted to be used for matching during the authentication process. Literature works suggest that iris-based authentication systems can be subject to presentation attacks where an attacker obtains printed copy of the victim’s eye image and displays it in front of an authentication system to gain unauthorized access. Such attacks can be performed by displaying …