Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Optimal Order Assignment With Minimum Wage Consideration (Ooamwc), Hakem Alazmi Dec 2020

Optimal Order Assignment With Minimum Wage Consideration (Ooamwc), Hakem Alazmi

Master of Science in Computer Science Theses

While the application of crowdsourcing has increased over the years, the technology experiences various issues during implementation. Examples of some of the issues that affect crowdsourcing include task assignment, profit maximizations, as well as time window issues. In some instances addressing some of the issues results in the other issues being overlooked. An example is when assigning tasks to workers, the profits of the workers might not be considered and this ends up affecting the profit maximization aspect. Various algorithms have been proposed to address the task assignment, profit maximizations, and time window issues. However, these algorithms address the issues …


Rethinking The Weakness Of Stream Ciphers And Its Application To Encrypted Malware Detection, William T. Stone, Junggab Son Jul 2020

Rethinking The Weakness Of Stream Ciphers And Its Application To Encrypted Malware Detection, William T. Stone, Junggab Son

Master of Science in Computer Science Theses

Encryption key use is a critical component to the security of a stream cipher: because many implementations simply consist of a key scheduling algorithm and logical exclusive or (XOR), an attacker can completely break the cipher by XORing two ciphertexts encrypted under the same key, revealing the original plaintexts and the key itself. The research presented in this paper reinterprets this phenomenon, using repeated-key cryptanalysis for stream cipher identification. It has been found that a stream cipher executed under a fixed key generates patterns in each character of the ciphertexts it produces and that these patterns can be used to …


Leveraging Smart Contracts For Asynchronous Group Key Agreement In Internet Of Things, Victor Youdom Kemmoe, Junggab Son Jul 2020

Leveraging Smart Contracts For Asynchronous Group Key Agreement In Internet Of Things, Victor Youdom Kemmoe, Junggab Son

Master of Science in Computer Science Theses

Group Key Agreement (GKA) mechanism plays a crucial role in the realization of various secure applications in various networks such as, but not limited to, sensor networks, Internet of Things (IoT), vehicular networks, social networks, and so on. To be suitable for IoT, GKA must satisfy several critical requirements. First, a GKA mechanism must be robust against a compromised device attack and satisfy essential secrecy definitions without the existence of a Trusted Third Party (TTP). TTP is often used by IoT devices in the establishment of ad hoc networks and usually, these devices are resource-constrained. Second, the GKA mechanism must …


Performance Of Malware Classification On Machine Learning Using Feature Selection, Nusrat Asrafi Apr 2020

Performance Of Malware Classification On Machine Learning Using Feature Selection, Nusrat Asrafi

Master of Science in Computer Science Theses

The exponential growth of malware has created a significant threat in our daily lives, which heavily rely on computers running all kinds of software. Malware writers create malicious software by creating new variants, new innovations, new infections and more obfuscated malware by using techniques such as packing and encrypting techniques. Malicious software classification and detection play an important role and a big challenge for cyber security research. Due to the increasing rate of false alarm, the accurate classification and detection of malware is a big necessity issue to be solved. In this research, eight malware family have been classifying according …


A Framework To Detect Presentation Attacks, Laeticia Etienne Apr 2020

A Framework To Detect Presentation Attacks, Laeticia Etienne

Master of Science in Information Technology Theses

Biometric-based authentication systems are becoming the preferred choice to replace password-based authentication systems. Among several variations of biometrics (e.g., face, eye, fingerprint), iris-based authentication is commonly used in every day applications. In iris-based authentication systems, iris images from legitimate users are captured and certain features are extracted to be used for matching during the authentication process. Literature works suggest that iris-based authentication systems can be subject to presentation attacks where an attacker obtains printed copy of the victim’s eye image and displays it in front of an authentication system to gain unauthorized access. Such attacks can be performed by displaying …