Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (20)
- Chulalongkorn University (19)
- University of Arkansas, Fayetteville (18)
- Air Force Institute of Technology (16)
- Old Dominion University (12)
-
- University of South Carolina (11)
- New Jersey Institute of Technology (8)
- Louisiana State University (7)
- University of Massachusetts Amherst (6)
- University of South Florida (6)
- University of Windsor (5)
- West Virginia University (5)
- University of Tennessee, Knoxville (4)
- Western University (4)
- Embry-Riddle Aeronautical University (3)
- Missouri University of Science and Technology (3)
- South Dakota State University (3)
- University of Louisville (3)
- University of Nevada, Las Vegas (3)
- University of New Mexico (3)
- University of New Orleans (3)
- University of Texas at El Paso (3)
- University of Wisconsin Milwaukee (3)
- Virginia Commonwealth University (3)
- Washington University in St. Louis (3)
- California Polytechnic State University, San Luis Obispo (2)
- City University of New York (CUNY) (2)
- Clemson University (2)
- Michigan Technological University (2)
- Northern Illinois University (2)
- Keyword
-
- Machine Learning (22)
- Computer Science (20)
- Department of Computer Science and Engineering (20)
- Machine learning (18)
- Deep Learning (14)
-
- Deep learning (14)
- Cybersecurity (11)
- Artificial intelligence (8)
- Computer Engineering (8)
- Artificial Intelligence (7)
- Robotics (6)
- Natural language processing (5)
- Optimization (5)
- Computer vision (4)
- #afcec (3)
- CAD (3)
- Control (3)
- Critical Infrastructure (3)
- Health Care (3)
- Reinforcement Learning (3)
- Semantic Web (3)
- Signal processing (3)
- Simulation (3)
- Artificial Neural Network (2)
- Artificial neural networks (2)
- Augmented Reality (2)
- Big Data (2)
- Computer Vision (2)
- Convolutional Neural Network (2)
- Cyberattack (2)
- Publication
-
- Theses and Dissertations (36)
- Browse all Theses and Dissertations (20)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (19)
- Electronic Theses and Dissertations (14)
- Doctoral Dissertations (11)
-
- Graduate Theses and Dissertations (11)
- Dissertations (7)
- Computer Science and Computer Engineering Undergraduate Honors Theses (6)
- USF Tampa Graduate Theses and Dissertations (6)
- Graduate Theses, Dissertations, and Problem Reports (5)
- Electrical & Computer Engineering Theses & Dissertations (4)
- Electronic Thesis and Dissertation Repository (4)
- Honors Theses (4)
- Dissertations and Theses (3)
- Doctoral Dissertations and Master's Theses (3)
- LSU Master's Theses (3)
- McKelvey School of Engineering Theses & Dissertations (3)
- Open Access Theses & Dissertations (3)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (3)
- University of New Orleans Theses and Dissertations (3)
- All Theses (2)
- Computational Modeling & Simulation Engineering Theses & Dissertations (2)
- Dissertations, Master's Theses and Master's Reports (2)
- Engineering Management & Systems Engineering Theses & Dissertations (2)
- Graduate Research Theses & Dissertations (2)
- LSU Doctoral Dissertations (2)
- Mechanical & Aerospace Engineering Theses & Dissertations (2)
- Mechanical Engineering ETDs (2)
- Theses (2)
- Walden Dissertations and Doctoral Studies (2)
Articles 1 - 30 of 210
Full-Text Articles in Engineering
Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn
Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn
Culminating Experience Projects
This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …
Cloud Container Security’ Next Move, Vishakha Sadhwani
Cloud Container Security’ Next Move, Vishakha Sadhwani
Dissertations and Theses
In the last few years, it is apparent to cybersecurity experts everywhere that the proverbial container tech genie is out of the bottle, and has been widely embraced across multiple organizations. To achieve the flexibility of building and deploying applications anywhere and everywhere, cloud native environments have gained great momentum and made the development lifecycle simpler than ever. However, container environments brings with them a range of cybersecurity issues that includes images, containers, hosts, runtimes, registries, and orchestration platforms, which needs the necessity to focus on investing in securing your container stack.
According to this report[1], released by cloud-native …
An Ultrasensitive Bacterial Detection Platform For Culture-Free Diagnosis Of Infections, Xuyang Shi
An Ultrasensitive Bacterial Detection Platform For Culture-Free Diagnosis Of Infections, Xuyang Shi
ETD Archive
The current methods of the diagnosis of bloodstream infections are based on bacterial culture growth, a process that requires considerable time, e.g., 12-16 hours, to obtain a result. This long wait time for the result creates many problems, including the generation of multi-drug resistant organisms (MDROs). At the same time, infected bloodstream usually contains a very low concentration of bacteria, i.e., lower than 5 CFU/mL. The long diagnosis time and the extremely low concentration of bacteria in the infected bloodstream make such infections difficult to diagnose. Here, we demonstrate a culture-free approach for the diagnosis of bloodstream infections using a …
Denoising And Deconvolving Sperm Whale Data In The Northern Gulf Of Mexico Using Fourier And Wavelet Techniques, Kendal Mccain Leftwich
Denoising And Deconvolving Sperm Whale Data In The Northern Gulf Of Mexico Using Fourier And Wavelet Techniques, Kendal Mccain Leftwich
University of New Orleans Theses and Dissertations
The use of underwater acoustics can be an important component in obtaining information from the oceans of the world. It is desirable (but difficult) to compile an acoustic catalog of sounds emitted by various underwater objects to complement optical catalogs. For example, the current visual catalog for whale tail flukes of large marine mammals (whales) can identify even individual whales from their individual fluke characteristics. However, since sperm whales, Physeter microcephalus, do not fluke up when they dive, they cannot be identified in this manner. A corresponding acoustic catalog for sperm whale clicks could be compiled to identify individual …
Online/Incremental Learning To Mitigate Concept Drift In Network Traffic Classification, Alberto R. De La Rosa
Online/Incremental Learning To Mitigate Concept Drift In Network Traffic Classification, Alberto R. De La Rosa
Open Access Theses & Dissertations
Communication networks play a large role in our everyday lives. COVID19 pandemic in 2020 highlighted their importance as most jobs had to be moved to remote work environments. It is possible that the spread of the virus, the death toll, and the economic consequences would have been much worse without communication networks. To remove sole dependence on one equipment vendor, networks are heterogeneous by design. Due to this, as well as their increasing size, network management has become overwhelming for network managers. For this reason, automating network management will have a significant positive impact. Machine learning and software defined networking …
Synthetic Data Generation For Intelligent Inspection Of Structural Environments, Noshin Habib
Synthetic Data Generation For Intelligent Inspection Of Structural Environments, Noshin Habib
Open Access Theses & Dissertations
Automated detection of cracks and corrosion in pavements and industrial settings is essential to a cost-effective approach to maintenance. Deep learning has paved the path for vast levels of improvement in the area. Such models require a plethora of data with accurate ground truth and enough variation for the model to generalize to the data, which is notwidely available. There has been recent progress in computer graphics being used for the creation of synthetic data to address the issue of deficient data availability, but it is limited to specific objects, such as cars and human beings. Textures and deformities within …
Deep Learning Of Microstructures, Amir Abbas Kazemzadeh Farizhandi
Deep Learning Of Microstructures, Amir Abbas Kazemzadeh Farizhandi
Boise State University Theses and Dissertations
The internal structure of materials also called the microstructure plays a critical role in the properties and performance of materials. The chemical element composition is one of the most critical factors in changing the structure of materials. However, the chemical composition alone is not the determining factor, and a change in the production process can also significantly alter the materials' structure. Therefore, many efforts have been made to discover and improve production methods to optimize the functional properties of materials. The most critical challenge in finding materials with enhanced properties is to understand and define the salient features of the …
Data-Driven Deep Learning-Based Analysis On Thz Imaging, Haoyan Liu
Data-Driven Deep Learning-Based Analysis On Thz Imaging, Haoyan Liu
Graduate Theses and Dissertations
Breast cancer affects about 12.5% of women population in the United States. Surgical operations are often needed post diagnosis. Breast conserving surgery can help remove malignant tumors while maximizing the remaining healthy tissues. Due to lacking effective real-time tumor analysis tools and a unified operation standard, re-excision rate could be higher than 30% among breast conserving surgery patients. This results in significant physical, physiological, and financial burdens to those patients. This work designs deep learning-based segmentation algorithms that detect tissue type in excised tissues using pulsed THz technology. This work evaluates the algorithms for tissue type classification task among freshly …
The Role Of Generative Adversarial Networks In Bioimage Analysis And Computational Diagnostics., Ahmed Naglah
The Role Of Generative Adversarial Networks In Bioimage Analysis And Computational Diagnostics., Ahmed Naglah
Electronic Theses and Dissertations
Computational technologies can contribute to the modeling and simulation of the biological environments and activities towards achieving better interpretations, analysis, and understanding. With the emergence of digital pathology, we can observe an increasing demand for more innovative, effective, and efficient computational models. Under the umbrella of artificial intelligence, deep learning mimics the brain’s way in learn complex relationships through data and experiences. In the field of bioimage analysis, models usually comprise discriminative approaches such as classification and segmentation tasks. In this thesis, we study how we can use generative AI models to improve bioimage analysis tasks using Generative Adversarial Networks …
Design Of Environment Aware Planning Heuristics For Complex Navigation Objectives, Carter D. Bailey
Design Of Environment Aware Planning Heuristics For Complex Navigation Objectives, Carter D. Bailey
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
A heuristic is the simplified approximations that helps guide a planner in deducing the best way to move forward. Heuristics are valued in many modern AI algorithms and decision-making architectures due to their ability to drastically reduce computation time. Particularly in robotics, path planning heuristics are widely leveraged to aid in navigation and exploration. As the robotic platform explores and navigates, information about the world can and should be used to augment and update the heuristic to guide solutions. Complex heuristics that can account for environmental factors, robot capabilities, and desired actions provide optimal results with little wasted exploration, but …
Design And Comparison Of Asynchronous Fft Implementations, Julie Bigot
Design And Comparison Of Asynchronous Fft Implementations, Julie Bigot
Graduate Theses and Dissertations
Fast Fourier Transform (FFT) is a widely used digital signal processing technology in a large variety of applications. For battery-powered embedded systems incorporating FFT, its physical implementation is constrained by strict power consumption, especially during idle periods. Compared to the prevailing clocked synchronous counterpart, quasi-delay insensitive asynchronous circuits offer a series of advantages including flexible timing requirement and lower leakage power, making them ideal choices for these systems. In this thesis work, various FFT configurations were implemented in the low-power Multi-Threshold NULL Convention Logic (MTNCL) paradigm. Analysis illustrates the area and power consumption trends along the changing of the number …
Image-Based Cancer Diagnosis Using Novel Deep Neural Networks, Hosein Barzekar
Image-Based Cancer Diagnosis Using Novel Deep Neural Networks, Hosein Barzekar
Theses and Dissertations
Cancer is the major cause of death in many nations. This serious illness can only be effectivelytreated if it is diagnosed early. In contrast, biomedical imaging presents challenges to both clinical institutions and researchers. Physiological anomalies are often characterized by modest modifications in individual cells or tissues, making them difficult to detect visually. Physiological anomalies are often characterized by slight abnormalities in individual cells or tissues, making them difficult to detect visually. Traditionally, anomalies are diagnosed by radiologists and pathologists with extensive training. This procedure, however, demands the participation of professionals and incurs a substantial expense, making the classification of …
Use Of Machine Learning And Natural Language Processing To Enhance Traffic Safety Analysis, Md Abu Sayed
Use Of Machine Learning And Natural Language Processing To Enhance Traffic Safety Analysis, Md Abu Sayed
Theses and Dissertations
Despite significant advances in vehicle technologies, safety data collection and analysis, and engineering advancements, tens of thousands of Americans die every year in motor vehicle crashes. Alarmingly, the trend of fatal and serious injury crashes appears to be heading in the wrong direction. In 2021, the actual rate of fatalities exceeded the predicted rate. This worrisome trend prompts and necessitates the development of advanced and holistic approaches to determining the causes of a crash (particularly fatal and major injuries). These approaches range from analyzing problems from multiple perspectives, utilizing available data sources, and employing the most suitable tools and technologies …
Development Of Nucleic Acid Diagnostics For Targeted And Non-Targeted Biosensing, Christopher William Smith
Development Of Nucleic Acid Diagnostics For Targeted And Non-Targeted Biosensing, Christopher William Smith
Legacy Theses & Dissertations (2009 - 2024)
The field of nucleic acid technology is rapidly expanding with new impactful discoveriesbeing made each year. Starting from the discovery of the double-helix structure, cloning, gene editing, polymerase chain reaction (PCR), CRISPR technology, and even the late mRNA vaccines; nucleic acid technology is at the forefront of improving medicine. Nucleic acid technology is extremely versatile due to its easy programmability, automated cheap synthesis, and even its catalog for numerous chemical modifications that can be used to alter structure stability. For example, the number of permutations that can be made with DNA just by altering the code for adenine (A), cytosine …
Electrical Modeling For Dynamic Performance Prediction And Optimization Of Mcpms Layout, Quang Minh Le
Electrical Modeling For Dynamic Performance Prediction And Optimization Of Mcpms Layout, Quang Minh Le
Graduate Theses and Dissertations
In recent years, the fast development of Multichip Power Modules (MCPM) packaging and Wide Bandgap (WBG) technology has enabled higher voltage and current ratings, better thermal performance, lower parasitic parameters, and higher mechanical reliability. However, the design of the MCPM layout is a multidisciplinary problem leading to many time-consuming analyses and tedious design processes. Because of these challenges, the design automation tool for MCPM layout has become an emerging research area and gained much attention from the power electronics community. The two critical objectives of a design automation tool for MCPM layout are fast and accurate models for design insights …
Wildfire Spread Prediction Using Attention Mechanisms In U-Net, Kamen Haresh Shah, Kamen Haresh Shah
Wildfire Spread Prediction Using Attention Mechanisms In U-Net, Kamen Haresh Shah, Kamen Haresh Shah
Master's Theses
An investigation into using attention mechanisms for better feature extraction in wildfire spread prediction models. This research examines the U-net architecture to achieve image segmentation, a process that partitions images by classifying pixels into one of two classes. The deep learning models explored in this research integrate modern deep learning architectures, and techniques used to optimize them. The models are trained on 12 distinct observational variables derived from the Google Earth Engine catalog. Evaluation is conducted with accuracy, Dice coefficient score, ROC-AUC, and F1-score. This research concludes that when augmenting U-net with attention mechanisms, the attention component improves feature suppression …
Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque
Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque
Electrical & Computer Engineering Theses & Dissertations
Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components dealing with physical processes and real-time computations, along with networking. CPSs often incorporate approaches merging from different scientific fields such as embedded systems, control systems, operational technology, information technology systems (ITS), and cybernetics. Today critical infrastructures (CIs) (e.g., energy systems, electric grids, etc.) and other CPSs (e.g., manufacturing industries, autonomous transportation systems, etc.) are experiencing challenges in dealing with cyberattacks. Major cybersecurity concerns are rising around CPSs because of their ever-growing use of information technology based automation. Often the security concerns are limited to probability-based possible attack …
Hard-Real-Time Computing Performance In A Cloud Environment, Alvin Cornelius Murphy
Hard-Real-Time Computing Performance In A Cloud Environment, Alvin Cornelius Murphy
Engineering Management & Systems Engineering Theses & Dissertations
The United States Department of Defense (DoD) is rapidly working with DoD Services to move from multi-year (e.g., 7-10) traditional acquisition programs to a commercial industrybased approach for software development. While commercial technologies and approaches provide an opportunity for rapid fielding of mission capabilities to pace threats, the suitability of commercial technologies to meet hard-real-time requirements within a surface combat system is unclear. This research establishes technical data to validate the effectiveness and suitability of current commercial technologies to meet the hard-real-time demands of a DoD combat management system. (Moreland Jr., 2013) conducted similar research; however, microservices, containers, and container …
Identification Of Factors Contributing To Traffic Crashes By Analysis Of Text Narratives, Cristian D. Arteaga-Sanchez
Identification Of Factors Contributing To Traffic Crashes By Analysis Of Text Narratives, Cristian D. Arteaga-Sanchez
UNLV Theses, Dissertations, Professional Papers, and Capstones
The fatalities, injuries, and property damage that result from traffic crashes impose a significant burden on society. Current research and practice in traffic safety rely on analysis of quantitative data from crash reports to understand crash severity contributors and develop countermeasures. Despite advances from this effort, quantitative crash data suffers from drawbacks, such as the limited ability to capture all the information relevant to the crashes and the potential errors introduced during data collection. Crash narratives can help address these limitations, as they contain detailed descriptions of the context and sequence of events of the crash. However, the unstructured nature …
Development Of An Automated Platform For Sensing And Differentiating Vapor-Phase Btex Constituents, Jonathan Samuelson
Development Of An Automated Platform For Sensing And Differentiating Vapor-Phase Btex Constituents, Jonathan Samuelson
USF Tampa Graduate Theses and Dissertations
Light aromatic hydrocarbons are an inevitable byproduct of fossil fuel extraction, refinement, distribution, and use. The four lightest and most prevalent of these are benzene, toluene, ethylbenzene, and xylene, which are known collectively as BTEX. In spite of their chemical similarity these species have markedly different effects on human health and substantially different concentrations are permitted by OSHA in workplaces and by the EPA in ambient air and groundwater. Real-time detection, identification, and quantification of these species is therefore of great importance wherever they see industrial use.This work represents the continuation and advancement of a line of research in which …
Generative Spatio-Temporal And Multimodal Analysis Of Neonatal Pain, Md Sirajus Salekin
Generative Spatio-Temporal And Multimodal Analysis Of Neonatal Pain, Md Sirajus Salekin
USF Tampa Graduate Theses and Dissertations
Neonates can not express their pain like an adult person. Due to the lacking of proper muscle growth and inability to express non-verbally, it is difficult to understand their emotional status. In addition, if the neonates are under any treatment or left monitored after any major surgeries (post-operative), it is more difficult to understand their pain due to the side effect of medications and the caring system (i.e. intubated, masked face, covered body with blanket, etc.). In a clinical environment, usually, bedside nurses routinely observe the neonate and measure the pain status following any standard clinical pain scale. But current …
Enabling The Human Perception Of A Working Camera In Web Conferences Via Its Movement, Anish Shrestha
Enabling The Human Perception Of A Working Camera In Web Conferences Via Its Movement, Anish Shrestha
LSU Master's Theses
In recent years, video conferencing has seen a significant increase in its usage due to the COVID-19 pandemic. When casting user’s video to other participants, the videoconference applications (e.g. Zoom, FaceTime, Skype, etc.) mainly leverage 1) webcam’s LED-light indicator, 2) user’s video feedback in the software and 3) the software’s video on/off icons to remind the user whether the camera is being used. However, these methods all impose the responsibility on the user itself to check the camera status, and there have been numerous cases reported when users expose their privacy inadvertently due to not realizing that their camera is …
Compilation Optimizations To Enhance Resilience Of Big Data Programs And Quantum Processors, Travis D. Lecompte
Compilation Optimizations To Enhance Resilience Of Big Data Programs And Quantum Processors, Travis D. Lecompte
LSU Doctoral Dissertations
Modern computers can experience a variety of transient errors due to the surrounding environment, known as soft faults. Although the frequency of these faults is low enough to not be noticeable on personal computers, they become a considerable concern during large-scale distributed computations or systems in more vulnerable environments like satellites. These faults occur as a bit flip of some value in a register, operation, or memory during execution. They surface as either program crashes, hangs, or silent data corruption (SDC), each of which can waste time, money, and resources. Hardware methods, such as shielding or error correcting memory (ECM), …
Preventing Variadic Function Attacks Through Argument Width Counting, Brennan Ward
Preventing Variadic Function Attacks Through Argument Width Counting, Brennan Ward
USF Tampa Graduate Theses and Dissertations
Format String attacks, first noted in June 2000 [1], are a type of attack in which anadversary has control of the string argument (the format string) passed to a string format function (such as printf). Such control allows the attacker to read and write arbitrary program memory. To prevent these attacks, various methodologies have been proposed, each with their own costs and benefits. I present a novel solution to this problem through argument width counting, ensuring that such format functions cannot access stack memory beyond the space where arguments were placed. Additionally, I show how this approach can be expanded …
Enabling Daily Tracking Of Individual’S Cognitive State With Eyewear, Soha Rostaminia
Enabling Daily Tracking Of Individual’S Cognitive State With Eyewear, Soha Rostaminia
Doctoral Dissertations
Research studies show that sleep deprivation causes severe fatigue, impairs attention and decision making, and affects our emotional interpretation of events, which makes it a big threat to public safety, and mental and physical well-being. Hence, it would be most desired if we could continuously measure one’s drowsiness and fatigue level, their emotion while making decisions, and assess their sleep quality in order to provide personalized feedback or actionable behavioral suggestions to modulate sleep pattern and alertness levels with the aim of enhancing performance, well-being, and quality of life. While there have been decades of studies on wearable devices, we …
Unobtrusive Assessment Of Upper-Limb Motor Impairment Using Wearable Inertial Sensors, Brandon R. Oubre
Unobtrusive Assessment Of Upper-Limb Motor Impairment Using Wearable Inertial Sensors, Brandon R. Oubre
Doctoral Dissertations
Many neurological diseases cause motor impairments that limit autonomy and reduce health-related quality of life. Upper-limb motor impairments, in particular, significantly hamper the performance of essential activities of daily living, such as eating, bathing, and changing clothing. Assessment of impairment is necessary for tracking disease progression, measuring the efficacy of interventions, and informing clinical decision making. Impairment is currently assessed by trained clinicians using semi-quantitative rating scales that are limited by their reliance on subjective, visual assessments. Furthermore, existing scales are often burdensome to administer and do not capture patients' motor performance in home and community settings, resulting in a …
Hyperspectral Unmixing: A Theoretical Aspect And Applications To Crism Data Processing, Yuki Itoh
Hyperspectral Unmixing: A Theoretical Aspect And Applications To Crism Data Processing, Yuki Itoh
Doctoral Dissertations
Hyperspectral imaging has been deployed in earth and planetary remote sensing, and has contributed the development of new methods for monitoring the earth environment and new discoveries in planetary science. It has given scientists and engineers a new way to observe the surface of earth and planetary bodies by measuring the spectroscopic spectrum at a pixel scale. Hyperspectal images require complex processing before practical use. One of the important goals of hyperspectral imaging is to obtain the images of reflectance spectrum. A raw image obtained by hyperspectral remote sensing usually undergoes conversion to a physical quantity representing the intensity of …
Adaptive Multi-Scale Place Cell Representations And Replay For Spatial Navigation And Learning In Autonomous Robots, Pablo Scleidorovich
Adaptive Multi-Scale Place Cell Representations And Replay For Spatial Navigation And Learning In Autonomous Robots, Pablo Scleidorovich
USF Tampa Graduate Theses and Dissertations
Place cells are one of the most widely studied neurons thought to play a vital role in spatial cognition. Extensive studies show that their activity in the rodent hippocampus is highly correlated with the animal’s spatial location, forming “place fields” of smaller sizes near the dorsal pole and larger sizes near the ventral pole. Despite advances, it is yet unclear how this multi-scale representation enables navigation in complex environments.
In this dissertation, we analyze the place cell representation from a computational point of view, evaluating how multi-scale place fields impact navigation in large and cluttered environments. The objectives are to …
Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba
Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba
Dissertations
Artificial Intelligence (AI) is changing every technology we deal with. Autonomy has been a sought-after goal in vehicles, and now more than ever we are very close to that goal. Vehicles before were dumb mechanical devices, now they are becoming smart, computerized, and connected coined as Autonomous Vehicles (AVs). Moreover, researchers found a way to make more use of these enormous capabilities and introduced Autonomous Vehicles Cloud Computing (AVCC). In these platforms, vehicles can lend their unused resources and sensory data to join AVCC.
In this dissertation, we investigate security and privacy issues in AVCC. As background, we built our …
Supporting The Discovery, Reuse, And Validation Of Cybersecurity Requirements At The Early Stages Of The Software Development Lifecycle, Jessica Antonia Steinmann
Supporting The Discovery, Reuse, And Validation Of Cybersecurity Requirements At The Early Stages Of The Software Development Lifecycle, Jessica Antonia Steinmann
Doctoral Dissertations and Master's Theses
The focus of this research is to develop an approach that enhances the elicitation and specification of reusable cybersecurity requirements. Cybersecurity has become a global concern as cyber-attacks are projected to cost damages totaling more than $10.5 trillion dollars by 2025. Cybersecurity requirements are more challenging to elicit than other requirements because they are nonfunctional requirements that requires cybersecurity expertise and knowledge of the proposed system. The goal of this research is to generate cybersecurity requirements based on knowledge acquired from requirements elicitation and analysis activities, to provide cybersecurity specifications without requiring the specialized knowledge of a cybersecurity expert, and …