Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (178)
- Electrical and Computer Engineering (136)
- Physical Sciences and Mathematics (113)
- Computer Sciences (104)
- Social and Behavioral Sciences (83)
-
- Digital Communications and Networking (53)
- Information Security (36)
- Science and Technology Studies (36)
- Computer and Systems Architecture (30)
- Business (25)
- Operations Research, Systems Engineering and Industrial Engineering (25)
- Other Computer Engineering (25)
- Civil and Environmental Engineering (21)
- Law (21)
- Public Affairs, Public Policy and Public Administration (20)
- Systems and Communications (20)
- Aviation (19)
- Data Storage Systems (15)
- Technology and Innovation (13)
- Electrical and Electronics (12)
- Aviation Safety and Security (11)
- Computer Law (11)
- Political Science (11)
- Artificial Intelligence and Robotics (10)
- Civil Engineering (10)
- Legal Studies (10)
- Nuclear Engineering (10)
- Aerospace Engineering (9)
- Education (9)
- Institution
-
- Selected Works (32)
- University of Wollongong (28)
- Embry-Riddle Aeronautical University (19)
- University of Nebraska - Lincoln (19)
- Old Dominion University (16)
-
- Purdue University (13)
- TÜBİTAK (13)
- California Polytechnic State University, San Luis Obispo (12)
- Syracuse University (12)
- University of Tennessee, Knoxville (12)
- Brigham Young University (11)
- Technological University Dublin (10)
- Edith Cowan University (9)
- University of Arkansas, Fayetteville (9)
- University of Massachusetts Amherst (9)
- Utah State University (9)
- University of South Florida (7)
- California State University, San Bernardino (6)
- Florida International University (6)
- New Jersey Institute of Technology (6)
- University of Kentucky (6)
- University of New Haven (6)
- Clemson University (5)
- Missouri University of Science and Technology (5)
- Boise State University (4)
- Louisiana State University (4)
- Singapore Management University (4)
- University of Central Florida (4)
- University of South Carolina (4)
- Western University (4)
- Publication Year
- Publication
-
- Faculty of Engineering and Information Sciences - Papers: Part A (21)
- Theses and Dissertations (21)
- Turkish Journal of Electrical Engineering and Computer Sciences (13)
- Dissertations (10)
- Electronic Theses and Dissertations (10)
-
- International Bulletin of Political Psychology (10)
- Dissertations - ALL (9)
- Master's Theses (8)
- Graduate Theses and Dissertations (7)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (6)
- Doctoral Dissertations (6)
- ECT Fact Sheets (6)
- Electrical & Computer Engineering and Computer Science Faculty Publications (6)
- FIU Electronic Theses and Dissertations (6)
- Masters Theses (6)
- USF Tampa Graduate Theses and Dissertations (6)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (5)
- Journal of International Technology and Information Management (5)
- Library Philosophy and Practice (e-journal) (5)
- Professor Katina Michael (5)
- Associate Professor Katina Michael (4)
- Electrical & Computer Engineering Faculty Publications (4)
- Electrical and Computer Engineering Faculty Research & Creative Works (4)
- Electronic Thesis and Dissertation Repository (4)
- Hong-Ning Dai (4)
- International Journal of Nuclear Security (4)
- Masters Theses 1911 - February 2014 (4)
- Research Collection School Of Computing and Information Systems (4)
- VMASC Publications (4)
- All Dissertations (3)
- Publication Type
- File Type
Articles 1 - 30 of 395
Full-Text Articles in Engineering
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Military Cyber Affairs
Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.
Dp-Smote: Integrating Differential Privacy And Oversampling Technique To Preserve Privacy In Smart Homes, Amr Tarek Elsayed, Almohammady Sobhi Alsharkawy, Mohamed Sayed Farag, Shaban Ebrahim Abu Yusuf
Dp-Smote: Integrating Differential Privacy And Oversampling Technique To Preserve Privacy In Smart Homes, Amr Tarek Elsayed, Almohammady Sobhi Alsharkawy, Mohamed Sayed Farag, Shaban Ebrahim Abu Yusuf
Al-Azhar Bulletin of Science
Smart homes represent intelligent environments where interconnected devices gather information, enhancing users’ living experiences by ensuring comfort, safety, and efficient energy management. To enhance the quality of life, companies in the smart device industry collect user data, including activities, preferences, and power consumption. However, sharing such data necessitates privacy-preserving practices. This paper introduces a robust method for secure sharing of data to service providers, grounded in differential privacy (DP). This empowers smart home residents to contribute usage statistics while safeguarding their privacy. The approach incorporates the Synthetic Minority Oversampling technique (SMOTe) and seamlessly integrates Gaussian noise to generate synthetic data, …
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain
VMASC Publications
Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication. Designated verifier signature, a variant of quantum cryptography, is very useful in applications like the Internet of Things (IoT) and auctions. An identity-based quantum-designated verifier signature (QDVS) scheme is suggested in this work. Our protocol features security attributes like eavesdropping, non-repudiation, designated verification, and hiding sources attacks. Additionally, it is protected from attacks on forgery, inter-resending, and impersonation. The proposed scheme benefits from the traditional designated …
Lsav: Lightweight Source Address Validation In Sdn To Counteract Ip Spoofing-Based Ddos Attacks, Ali̇ Karakoç, Fati̇h Alagöz
Lsav: Lightweight Source Address Validation In Sdn To Counteract Ip Spoofing-Based Ddos Attacks, Ali̇ Karakoç, Fati̇h Alagöz
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, we propose a design to detect and prevent IP spoofing-based distributed denial of service (DDoS) attacks on software-defined networks (SDNs). DDoS attacks are still one of the significant problems for internet service providers (ISPs) and individual users. These attacks can disrupt customer services by targeting the availability of the system, and in some cases, they can completely shut down the target infrastructure. Protecting the system against DDoS attacks is therefore crucial for ensuring the reliability and availability of internet services. To address this problem, we propose a lightweight source address validation (LSAV) framework that leverages the flexibility …
Security Datasets For Network Research, Bruce Hartpence, Bill Stackpole, Daryl Johnson
Security Datasets For Network Research, Bruce Hartpence, Bill Stackpole, Daryl Johnson
Data
This document describes the content of the security traffic datasets included in this collection and the conditions under which the packets were collected. These datasets were assembled from 2023 onward. There will be periodic updates or additions to the dataset collection. The current collection includes a variety of nmap intense scans, an Address Resolution Protocol Man in the Middle (ARP MITM) attack, an Internet Control Message Protocol (ICMP) Redirect MITM and an active directory enumeration attack.
When referencing these datasets, please use the following DOI: 10.57673/gccis-qj60
Normalized Linearly-Combined Chaotic System: Design, Analysis, Implementation And Application, Md Sakib Hasan, Anurag Dhungel, Partha Sarathi Paul, Maisha Sadia, Md Razuan Hossain
Normalized Linearly-Combined Chaotic System: Design, Analysis, Implementation And Application, Md Sakib Hasan, Anurag Dhungel, Partha Sarathi Paul, Maisha Sadia, Md Razuan Hossain
Faculty and Student Publications
This work presents a general framework for developing a multi-parameter 1-D chaotic system for uniform and robust chaotic operation across the parameter space. This is important for diverse practical applications where parameter disturbance may cause degradation or even complete disappearance of chaotic properties. The wide uninterrupted chaotic range and improved chaotic properties are demonstrated with the aid of stability analysis, bifurcation diagram, Lyapunov exponent (LE), Kolmogorov entropy, Shannon entropy, and correlation coefficient. We also demonstrate the proposed system’s amenability to cascading for further performance improvement. We introduce an efficient Field-Programmable Gate Array (FPGA)-based implementation and validate its chaotic properties using …
Towards Reliable Multi-Path Routing : An Integrated Cooperation Model For Drones, Ibtihel Baddari, Abdelhak Mesbah, Maohamed Amine Riahla
Towards Reliable Multi-Path Routing : An Integrated Cooperation Model For Drones, Ibtihel Baddari, Abdelhak Mesbah, Maohamed Amine Riahla
Emirates Journal for Engineering Research
Ad-hoc networks have evolved into a vital wireless communication component by offering an adaptable infrastructure suitable for various scenarios in our increasingly interconnected and mobile world. However, this adaptability also exposes these networks to security challenges, given their dynamic nature, where nodes frequently join and leave. This dynamism is advantageous but presents resource constraints and vulnerability to malicious nodes, impacting data transmission reliability and security.
In this context, this article explores the development of a secure routing protocol for Ad-hoc networks based on a cooperation reinforcement model to reduce the degradation of routing performance. We leverage the reputation of nodes …
Remote Laboratory For Nuclear Security Education, Anthony R. Galindo, Craig Marianno
Remote Laboratory For Nuclear Security Education, Anthony R. Galindo, Craig Marianno
International Journal of Nuclear Security
Laboratory experiences for online students are very limited. To fill this gap, educators in the Department of Nuclear Engineering at Texas A&M University developed a series of radiation detection experiments for their remote students. Radiation detection is only one piece of nuclear security. The objective of the current research is to describe the development and execution of three online laboratories that investigate the basic application of physical security sensors that use light, ultrasonics, and heat to detect adversaries. This laboratory complements lecture material from the department’s Nuclear Security System and Design course. Using the Remote Desktop Application, students connect to …
Enhancing Relation Database Security With Shuffling, Tieming Geng
Enhancing Relation Database Security With Shuffling, Tieming Geng
Theses and Dissertations
Database security holds paramount importance as it safeguards an organization's most valuable assets: its data. In an age marked by escalating cyber threats, protecting sensitive information stored in databases is essential to preserve trust, prevent financial losses, and maintain legal compliance. In this dissertation, an exploration into the realm of relation database security is undertaken. The research introduces a cryptographic secure shuffling algorithm designed to fortify database security. Additionally, the dissertation presents a series of innovative solutions aimed at bolstering both the security and efficiency of the shuffling algorithm. Encryption algorithms have long served as a mean of safeguarding sensitive …
3rd Party Ip Encryption From Netlist To Bitstream For Xilinx 7-Series Fpgas, Daniel Hutchings
3rd Party Ip Encryption From Netlist To Bitstream For Xilinx 7-Series Fpgas, Daniel Hutchings
Theses and Dissertations
IP vendors need to keep the internal designs of their IP secret from the IP user for security or commercial reasons. The CAD tools provided by FPGA vendors have some built-in functionality to encrypt the IP. However, the IP is consequently decrypted by the CAD tools in order to run the IP through the design flow. An IP user can use APIs provided by the CAD tools to recreate the IP in an unencrypted state. An IP user could also easily learn the internals of a protected IP with the advent of new open-source bitstream to netlist tools. The user …
Systematic Characterization Of Power Side Channel Attacks For Residual And Added Vulnerabilities, Aurelien Tchoupou Mozipo
Systematic Characterization Of Power Side Channel Attacks For Residual And Added Vulnerabilities, Aurelien Tchoupou Mozipo
Dissertations and Theses
Power Side Channel Attacks have continued to be a major threat to cryptographic devices. Hence, it will be useful for designers of cryptographic systems to systematically identify which type of power Side Channel Attacks their designs remain vulnerable to after implementation. It’s also useful to determine which additional vulnerabilities they have exposed their devices to, after the implementation of a countermeasure or a feature. The goal of this research is to develop a characterization of power side channel attacks on different encryption algorithms' implementations to create metrics and methods to evaluate their residual vulnerabilities and added vulnerabilities. This research studies …
Secure State Estimation Of Distribution Network Based On Kalman Filter Decomposition, Xinghua Liu, Siwen Dong, Jiaqiang Tian
Secure State Estimation Of Distribution Network Based On Kalman Filter Decomposition, Xinghua Liu, Siwen Dong, Jiaqiang Tian
Journal of System Simulation
A new state estimation algorithm is proposed to improve the accuracy to obtain the optimal state estimation of distribution network against FDI attack. In the case of phasor measurement units being attacked and the measurement results being altered,the optimal Kalman estimate can be decomposed into a weighted sum of local state estimates. Focusing on the insecurity of the weighted sum method,a convex optimization based on local estimation is proposed to replace the method and combine the local estimation into a secure state estimation. The simulation results show that the proposed estimator is consistent with the Kalman …
Software-Defined Networking Security Techniques And The Digital Forensics Of The Sdn Control Plane, Abdullah Alshaya
Software-Defined Networking Security Techniques And The Digital Forensics Of The Sdn Control Plane, Abdullah Alshaya
LSU Doctoral Dissertations
Software-Defined Networking (SDN) is an efficient networking design that decouples the network's control plane from the data plane. When compared to the traditional network architecture, the SDN architecture shares many of the same security issues. The centralized SDN controller makes it easier to control, easier to program in real-time, and more flexible, but this comes at the cost of more security risks. An attack on the control plane layer of the SDN controller is a major security concern.
First, centralized design and the existence of a single point of failure in the control plane compromise the accessibility and availability of …
Secure And Efficient Federated Learning, Xingyu Li
Secure And Efficient Federated Learning, Xingyu Li
Theses and Dissertations
In the past 10 years, the growth of machine learning technology has been significant, largely due to the availability of large datasets for training. However, gathering a sufficient amount of data on a central server can be challenging. Additionally, with the rise of mobile networking and the large amounts of data generated by IoT devices, privacy and security issues have become a concern, resulting in government regulations such as GDPR, HIPAA, CCPA, and ADPPA. Under these circumstances, traditional centralized machine learning methods face a problem in that sensitive data must be kept locally for privacy reasons, making it difficult to …
Enhancing Security At Baxter Arena, Jennifer Davis
Enhancing Security At Baxter Arena, Jennifer Davis
Theses/Capstones/Creative Projects
The purpose of this report is to detail two options proposed for enhancing security at Baxter Arena. Both options are focused on metal detection. In this report we will look at the benefits and negatives of metal detection, both handheld and stationery, and how it can be used in enhancing building security.
Adversarial Deep Learning And Security With A Hardware Perspective, Joseph Clements
Adversarial Deep Learning And Security With A Hardware Perspective, Joseph Clements
All Dissertations
Adversarial deep learning is the field of study which analyzes deep learning in the presence of adversarial entities. This entails understanding the capabilities, objectives, and attack scenarios available to the adversary to develop defensive mechanisms and avenues of robustness available to the benign parties. Understanding this facet of deep learning helps us improve the safety of the deep learning systems against external threats from adversaries. However, of equal importance, this perspective also helps the industry understand and respond to critical failures in the technology. The expectation of future success has driven significant interest in developing this technology broadly. Adversarial deep …
Proposed Mitigation Framework For The Internet Of Insecure Things, Mahmoud M. Elgindy, Sally M. Elghamrawy, Ali I. El-Desouky
Proposed Mitigation Framework For The Internet Of Insecure Things, Mahmoud M. Elgindy, Sally M. Elghamrawy, Ali I. El-Desouky
Mansoura Engineering Journal
Intrusion detection systems IDS are increasingly utilizing machine learning methods. IDSs are important tools for ensuring the security of network data and resources. The Internet of Things (IoT) is an expanding network of intelligent machines and sensors. However, they are vulnerable to attackers because of the ubiquitous and extensive IoT networks. Datasets from intrusion detection systems (IDS) have been analyzed deep learning methods such as Bidirectional long-short term memory (BiLSTM). This research presents an BiLSTM intrusion detection framework with Principal Component Analysis PCA (PCA-LSTM-IDS). The PCA-LSTM-IDS is comprised of two layers: extracting layer which using PCA, and the anomaly BiLSTM …
Strengthening Urban Resilience: Understanding The Interdependencies Of Outer Space And Strategic Planning For Sustainable Smart Environments, Ulpia-Elena Botezatu, Olga Bucovetchi, Adrian V. Gheorghe, Radu D. Stanciu
Strengthening Urban Resilience: Understanding The Interdependencies Of Outer Space And Strategic Planning For Sustainable Smart Environments, Ulpia-Elena Botezatu, Olga Bucovetchi, Adrian V. Gheorghe, Radu D. Stanciu
Engineering Management & Systems Engineering Faculty Publications
The conventional approach to urban planning has predominantly focused on horizontal dimensions, disregarding the potential risks originating from outer space. This paper aims to initiate a discourse on the vertical dimension of cities, which is influenced by outer space, as an essential element of strategic urban planning. Through an examination of a highly disruptive incident in outer space involving a collision between the Iridium 33 and Cosmos 2251 satellites, this article elucidates the intricate interdependencies between urban areas and outer space infrastructure and services. Leveraging the principles of critical infrastructure protection, which bridge the urban and outer space domains, and …
Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz
Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz
Williams Honors College, Honors Research Projects
This report details a network penetration test in a simulated environment using GNS3, focusing on the configuration of routers, switches, and hosts. The project successfully identified and exploited network vulnerabilities, including FTP access, misconfigured sudo permissions, and SMB protocol weaknesses. The penetration testing process utilized tools like fping and nmap for reconnaissance and vulnerability scanning, revealing the importance of device configurations in network security. The project concluded with mitigation strategies, emphasizing the need for secure access, robust password policies, and security controls. The experience underscored the significance of continuous learning and adaptation in the ever-evolving field of cybersecurity. The project …
Blockchain-Enabled Authenticated Key Agreement Scheme For Mobile Vehicles-Assisted Precision Agricultural Iot Networks, Anusha Vangala, Ashok Kumar Das, Ankush Mitra, Sajal K. Das, Youngho Park
Blockchain-Enabled Authenticated Key Agreement Scheme For Mobile Vehicles-Assisted Precision Agricultural Iot Networks, Anusha Vangala, Ashok Kumar Das, Ankush Mitra, Sajal K. Das, Youngho Park
Computer Science Faculty Research & Creative Works
Precision Farming Has a Positive Potential in the Agricultural Industry Regarding Water Conservation, Increased Productivity, Better Development of Rural Areas, and Increased Income. Blockchain Technology is a Better Alternative for Storing and Sharing Farm Data as It is Reliable, Transparent, Immutable, and Decentralized. Remote Monitoring of an Agricultural Field Requires Security Systems to Ensure that Any Sensitive Information is Exchanged Only among Authenticated Entities in the Network. to This End, We Design an Efficient Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural Internet of Things (IoT) Networks Called AgroMobiBlock. the Limited Existing Work on Authentication in Agricultural Networks …
A Provable Secure And Efficient Authentication Framework For Smart Manufacturing Industry, Muhammad Hammad, Akhtar Badshah, Ghulam Abbas, Hisham Alasmary, Muhammad Waqas, Wasim A. Khan
A Provable Secure And Efficient Authentication Framework For Smart Manufacturing Industry, Muhammad Hammad, Akhtar Badshah, Ghulam Abbas, Hisham Alasmary, Muhammad Waqas, Wasim A. Khan
Research outputs 2022 to 2026
Smart manufacturing is transforming the manufacturing industry by enhancing productivity and quality, driving growth in the global economy. The Internet of Things (IoT) has played a crucial role in realizing Industry 4.0, where machines can communicate and interact in real-time. Despite these advancements, security remains a major challenge in developing and deploying smart manufacturing. As cyber-attacks become more prevalent, researchers are making security a top priority. Although IoT and Industrial IoT (IIoT) are used to establish smart industries, these systems remain vulnerable to various types of attacks. To address these security issues, numerous authentication methods have been proposed. However, many …
Video Anomaly Detection Using Residual Autoencoder: A Lightweight Framework, Mohamed H. Habeb, May A. Salama, Lamiaa A. Elrefaei
Video Anomaly Detection Using Residual Autoencoder: A Lightweight Framework, Mohamed H. Habeb, May A. Salama, Lamiaa A. Elrefaei
Mansoura Engineering Journal
This paper proposes an efficient lightweight deep spatial residual autoencoder (SRAE) model to detect anomalous events in video surveillance systems. A lightweight network is essential in real-time situations where time is critical. Moreover, it could be deployed on low-resource devices like embedded systems or mobile devices. This makes it a very useful option for real-world situations where there may be a shortage of resources. The proposed network is composed of a 3-layer residual encoder-decoder architecture that is adopted to acquire the salient spatial characteristics representative of normal events in videos. Then, the reconstruction loss is used to find abnormalities, where …
A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat
A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat
Electrical & Computer Engineering Faculty Publications
IoT security is one of the prominent issues that has gained significant attention among the researchers in recent times. The recent advancements in IoT introduces various critical security issues and increases the risk of privacy leakage of IoT data. Implementation of Blockchain can be a potential solution for the security issues in IoT. This review deeply investigates the security threats and issues in IoT which deteriorates the effectiveness of IoT systems. This paper presents a perceptible description of the security threats, Blockchain based solutions, security characteristics and challenges introduced during the integration of Blockchain with IoT. An analysis of different …
Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty
Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty
Electrical & Computer Engineering Faculty Publications
There is a great demand for an efficient security framework which can secure IoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IoT considering the dynamic and distributed nature of IoT. This motivates the researchers to focus more on investigating the role of machine learning (ML) in the designing of security models. A brief analysis of different ML algorithms for IoT security is discussed along with the advantages and limitations of ML algorithms. Existing studies state that ML algorithms suffer from the problem of high computational overhead and risk of privacy leakage. …
Transfer Learning Using Infrared And Optical Full Motion Video Data For Gender Classification, Alexander M. Glandon, Joe Zalameda, Khan M. Iftekharuddin, Gabor F. Fulop (Ed.), David Z. Ting (Ed.), Lucy L. Zheng (Ed.)
Transfer Learning Using Infrared And Optical Full Motion Video Data For Gender Classification, Alexander M. Glandon, Joe Zalameda, Khan M. Iftekharuddin, Gabor F. Fulop (Ed.), David Z. Ting (Ed.), Lucy L. Zheng (Ed.)
Electrical & Computer Engineering Faculty Publications
This work is a review and extension of our ongoing research in human recognition analysis using multimodality motion sensor data. We review our work on hand crafted feature engineering for motion capture skeleton (MoCap) data, from the Air Force Research Lab for human gender followed by depth scan based skeleton extraction using LIDAR data from the Army Night Vision Lab for person identification. We then build on these works to demonstrate a transfer learning sensor fusion approach for using the larger MoCap and smaller LIDAR data for gender classification.
A Literature Review On Privacy And Security In Virtual Reality And Augmented Reality, Yunus Gumbo
A Literature Review On Privacy And Security In Virtual Reality And Augmented Reality, Yunus Gumbo
Master of Science in Information Technology Theses
As technologies become more advanced and powerful each day, the progression towards embracing virtual reality environments in our daily activities become more real, and subsequently, the boundaries between virtual and physical worlds more in question. However, several issues continue to persist as the world around us changes – privacy and security. In this paper we are going to analyze in detail, the newer virtual reality (VR) and augmented reality (AR) applications, the privacy risks associated with these environments, current solutions – their benefits and challenges as well as potential newer solutions which can be implemented to increase privacy protection.
There …
High-Performance Vlsi Architectures For Lattice-Based Cryptography, Weihang Tan
High-Performance Vlsi Architectures For Lattice-Based Cryptography, Weihang Tan
All Dissertations
Lattice-based cryptography is a cryptographic primitive built upon the hard problems on point lattices. Cryptosystems relying on lattice-based cryptography have attracted huge attention in the last decade since they have post-quantum-resistant security and the remarkable construction of the algorithm. In particular, homomorphic encryption (HE) and post-quantum cryptography (PQC) are the two main applications of lattice-based cryptography. Meanwhile, the efficient hardware implementations for these advanced cryptography schemes are demanding to achieve a high-performance implementation.
This dissertation aims to investigate the novel and high-performance very large-scale integration (VLSI) architectures for lattice-based cryptography, including the HE and PQC schemes. This dissertation first presents …
Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba
Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba
Dissertations
Artificial Intelligence (AI) is changing every technology we deal with. Autonomy has been a sought-after goal in vehicles, and now more than ever we are very close to that goal. Vehicles before were dumb mechanical devices, now they are becoming smart, computerized, and connected coined as Autonomous Vehicles (AVs). Moreover, researchers found a way to make more use of these enormous capabilities and introduced Autonomous Vehicles Cloud Computing (AVCC). In these platforms, vehicles can lend their unused resources and sensory data to join AVCC.
In this dissertation, we investigate security and privacy issues in AVCC. As background, we built our …
Interleaved Honeypot-Framing Model With Secure Mac Policies For Wireless Sensor Networks, Rajasoundaran Soundararajan, Maheswar Rajagopal, Akila Muthuramalingam, Eklas Hossain, Jaime Lloret
Interleaved Honeypot-Framing Model With Secure Mac Policies For Wireless Sensor Networks, Rajasoundaran Soundararajan, Maheswar Rajagopal, Akila Muthuramalingam, Eklas Hossain, Jaime Lloret
Electrical and Computer Engineering Faculty Publications and Presentations
The Wireless Medium Access Control (WMAC) protocol functions by handling various data frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC policies need secure data communication rules and intrusion detection procedures to safeguard the data from attackers. The existing secure Medium Access Control (MAC) policies provide expected and predictable practices against channel attackers. These security policies can be easily breached by any intelligent attacks or malicious actions. The proposed Wireless Interleaved Honeypot-Framing Model (WIHFM) newly implements distributed honeypot-based security mechanisms in each sensor node to act reactively against various attackers. The proposed WIHFM creates an …
An Empirical Comparison Of The Security And Performance Characteristics Of Topology Formation Algorithms For Bitcoin Networks, Muntadher Sallal, Ruairí De Fréin, Ali Malik, Benjamin Aziz
An Empirical Comparison Of The Security And Performance Characteristics Of Topology Formation Algorithms For Bitcoin Networks, Muntadher Sallal, Ruairí De Fréin, Ali Malik, Benjamin Aziz
Articles
There is an increasing demand for digital crypto-currencies to be more secure and robust to meet the following business requirements: (1) low transaction fees and (2) the privacy of users. Nowadays, Bitcoin is gaining traction and wide adoption. Many well-known businesses have begun accepting bitcoins as a means of making financial payments. However, the susceptibility of Bitcoin networks to information propagation delay, increases the vulnerability to attack of the Bitcoin network, and decreases its throughput performance. This paper introduces and critically analyses new network clustering methods, named Locality Based Clustering (LBC), Ping Time Based Approach (PTBC), Super Node Based Clustering …