Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

An Analysis Of The Size And Impact Of Digital Footprints, Whitney Nielsen Maxwell Dec 2017

An Analysis Of The Size And Impact Of Digital Footprints, Whitney Nielsen Maxwell

Theses and Dissertations

Personal information available online is known as a digital footprint. While many have a digital footprint, few if any, know what it encapsulates or how to control it. Technology and personal information are becoming more intertwined as technology becomes more integrated with everyday activities. Personal information can be defined as details that apply to a person such as race or shopping habits. Shopping habits are considered personal information by many corporations who spend money to track, or even predict purchases of individuals, whereas more traditional forms of personal information are details like gender, birthdate, and home town. With a wide …


The Application Of Artificial Neural Networks For Prioritization Of Independent Variables Of A Discrete Event Simulation Model In A Manufacturing Environment, Rebecca Pires Dos Santos Jun 2017

The Application Of Artificial Neural Networks For Prioritization Of Independent Variables Of A Discrete Event Simulation Model In A Manufacturing Environment, Rebecca Pires Dos Santos

Theses and Dissertations

The high complexity existent in businesses has required managers to rely on accurate and up to date information. Over the years, many tools have been created to give support to decision makers, such as discrete event simulation and artificial neural networks. Both tools have been applied to improve business performance; however, most of the time they are used separately. This research aims to interpret artificial neural network models that are applied to the data generated by a simulation model and determine which inputs have the most impact on the output of a business. This would allow prioritization of the variables …


Measuring The Robustness Of Forensic Tools' Ability To Detect Data Hiding Techniques, Samuel Isaiah Moses Jun 2017

Measuring The Robustness Of Forensic Tools' Ability To Detect Data Hiding Techniques, Samuel Isaiah Moses

Theses and Dissertations

The goal of this research is to create a methodology that measures the robustness and effectiveness of forensic tools' ability to detect data hiding. First, an extensive search for any existing guidelines testing against data hiding was performed. After finding none, existing guidelines and frameworks in cybersecurity and cyber forensics were reviewed. Next, I created the methodology in this thesis. This methodology includes a set of steps that a user should take to evaluate a forensic tool. The methodology has been designed to be flexible and scalable so as new anti-forensic data hiding methods are discovered and developed, they can …


A Security Evaluation Methodology For Container Images, Brendan Michael Abbott Mar 2017

A Security Evaluation Methodology For Container Images, Brendan Michael Abbott

Theses and Dissertations

The goal of this research is to create a methodology that evaluates the security posture of container images and helps improve container security. This was done by first searching for any guidelines or standards that focus on container images and security. After finding none, I decided to create an evaluative methodology. The methodology is composed of actions that users should take to evaluate the security of a container image. The methodology was created through in-depth research on container images and the build instructions used to create them and is referred to as the Security Evaluation Methodology for Container Images. The …