Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (185)
- Electrical and Computer Engineering (136)
- Physical Sciences and Mathematics (118)
- Computer Sciences (109)
- Social and Behavioral Sciences (83)
-
- Digital Communications and Networking (54)
- Information Security (36)
- Science and Technology Studies (36)
- Computer and Systems Architecture (30)
- Business (25)
- Operations Research, Systems Engineering and Industrial Engineering (25)
- Other Computer Engineering (25)
- Civil and Environmental Engineering (21)
- Law (21)
- Public Affairs, Public Policy and Public Administration (20)
- Systems and Communications (20)
- Aviation (19)
- Data Storage Systems (15)
- Technology and Innovation (13)
- Electrical and Electronics (12)
- Aviation Safety and Security (11)
- Computer Law (11)
- Political Science (11)
- Artificial Intelligence and Robotics (10)
- Civil Engineering (10)
- Legal Studies (10)
- Nuclear Engineering (10)
- Aerospace Engineering (9)
- Education (9)
- Institution
-
- Selected Works (32)
- University of Wollongong (28)
- Embry-Riddle Aeronautical University (19)
- University of Nebraska - Lincoln (19)
- Old Dominion University (16)
-
- Purdue University (13)
- TÜBİTAK (13)
- California Polytechnic State University, San Luis Obispo (12)
- Syracuse University (12)
- University of Tennessee, Knoxville (12)
- Brigham Young University (11)
- Technological University Dublin (10)
- Edith Cowan University (9)
- University of Arkansas, Fayetteville (9)
- University of Massachusetts Amherst (9)
- Utah State University (9)
- Wright State University (9)
- University of South Florida (7)
- California State University, San Bernardino (6)
- Florida International University (6)
- New Jersey Institute of Technology (6)
- University of Kentucky (6)
- University of New Haven (6)
- Clemson University (5)
- Missouri University of Science and Technology (5)
- Boise State University (4)
- Louisiana State University (4)
- Singapore Management University (4)
- University of Central Florida (4)
- Western University (4)
- Publication Year
- Publication
-
- Faculty of Engineering and Information Sciences - Papers: Part A (21)
- Theses and Dissertations (20)
- Turkish Journal of Electrical Engineering and Computer Sciences (13)
- Dissertations (10)
- Electronic Theses and Dissertations (10)
-
- International Bulletin of Political Psychology (10)
- Browse all Theses and Dissertations (9)
- Dissertations - ALL (9)
- Master's Theses (8)
- Graduate Theses and Dissertations (7)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (6)
- Doctoral Dissertations (6)
- ECT Fact Sheets (6)
- Electrical & Computer Engineering and Computer Science Faculty Publications (6)
- FIU Electronic Theses and Dissertations (6)
- Masters Theses (6)
- USF Tampa Graduate Theses and Dissertations (6)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (5)
- Journal of International Technology and Information Management (5)
- Library Philosophy and Practice (e-journal) (5)
- Professor Katina Michael (5)
- Associate Professor Katina Michael (4)
- Electrical & Computer Engineering Faculty Publications (4)
- Electrical and Computer Engineering Faculty Research & Creative Works (4)
- Electronic Thesis and Dissertation Repository (4)
- Hong-Ning Dai (4)
- International Journal of Nuclear Security (4)
- Masters Theses 1911 - February 2014 (4)
- Research Collection School Of Computing and Information Systems (4)
- VMASC Publications (4)
- Publication Type
- File Type
Articles 391 - 401 of 401
Full-Text Articles in Engineering
Ip Traceback With Deterministic Packet Marking Dpm, Andrey Belenky
Ip Traceback With Deterministic Packet Marking Dpm, Andrey Belenky
Dissertations
In this dissertation, a novel approach to Internet Protocol (IP) Traceback - Deterministic Packet Marking (DPM) is presented. The proposed approach is scalable, simple to implement, and introduces no bandwidth and practically no processing overhead on the network equipment. It is capable of tracing thousands of simultaneous attackers during a Distributed Denial of Service (DDoS) attack. Given sufficient deployment on the Internet, DPM is capable of tracing back to the slaves for DDoS attacks which involve reflectors. Most of the processing is done at the victim. The traceback process can be performed post-mortem, which allows for tracing the attacks that …
Security Watch: No-Fly Zones And Flying Blind, Ibpp Editor
Security Watch: No-Fly Zones And Flying Blind, Ibpp Editor
International Bulletin of Political Psychology
The article evaluates the gain in security from no-fly zones from a security perspective.
Public Street Surveillance: A Psychometric Study On The Perceived Social Risk, David J. Brooks
Public Street Surveillance: A Psychometric Study On The Perceived Social Risk, David J. Brooks
Theses: Doctorates and Masters
Public street surveillance, a domain of Closed Circuit Television (CCTV), has grown enormously and is becoming common place with increasing utilization in society as an all-purpose security tool. Previous authors (Ditton, 1999; Davies, 1998; Horne, 1998; Tomkins, 1998) have raised concern over social, civil and privacy issues, but there has been limited research to quantify these concerns. There are a number of core aspects that could relocate the risk perception and therefore, social support of public street surveillance. This study utilized the psychometric paradigm to quantitatively measure the social risk perception of public street surveillance. The psychometric paradigm is a …
Information Security System Rating And Ranking, Rayford B. Vaughn Jr., Ambareen Sira, David A. Dampier
Information Security System Rating And Ranking, Rayford B. Vaughn Jr., Ambareen Sira, David A. Dampier
Computer Sciences and Electrical Engineering Faculty Research
The term assurance has been used for decades in trusted system development to express the notion of confidence in the strength of a specific system or system of systems. The unsolved problem that security engineers must struggle with is the adoption of measures or metrics that can reliably depict the assurance associated with a specific hardware and software architecture. This article reports on a recent attempt to focus needs in this area and suggests various categories of information assurance metrics that may be helpful to an organization that is deciding which set is useful for a specific application.
Security, Safety, And The Law: The Alpine Cable Accident, Ibpp Editor
Security, Safety, And The Law: The Alpine Cable Accident, Ibpp Editor
International Bulletin of Political Psychology
This article describes how legal Issues pertaining to fatal aviation accidents with and without significant politico-military implications can contribute to or detract from security and safety phenomena leading to yet other fatal accidents.
Trends. International Trends In Space Policy: An Interview With Eligar Sadeh, Ibpp Editor
Trends. International Trends In Space Policy: An Interview With Eligar Sadeh, Ibpp Editor
International Bulletin of Political Psychology
The article is an interview with Eligar Sadeh, Interim Director, Center for Engineering Infrastructure and Sciences in Space (CIESS), Colorado State University, Fort Collins, Colorado, United States of America.
Trends. The Ins And Outs Of Nuclear Nonproliferation: The Case Of Georgia, Ibpp Editor
Trends. The Ins And Outs Of Nuclear Nonproliferation: The Case Of Georgia, Ibpp Editor
International Bulletin of Political Psychology
The author discusses the strong case that can be made that the essence of all foreign policy matters involves the most basic of psychological boundaries: between the "me" and "not me".
The Future Interface Of Political And Industrial/Organizational Psychologies: The Case Of Air Traffic Controllers, Ibpp Editor
The Future Interface Of Political And Industrial/Organizational Psychologies: The Case Of Air Traffic Controllers, Ibpp Editor
International Bulletin of Political Psychology
This article presents a brief overview of future psychological challenges bearing on the improving the performance of air traffic controllers. The most significant challenges appear to be philosophical, political, social, and cultural.
Building A Secure Intranet, Fred J. Berryman
Building A Secure Intranet, Fred J. Berryman
Theses
This thesis will explain the vulnerabilities of computers in a networking environment and demonstrate proper procedures for building a secure Intranet.
The Internet is built around the concept of open communication. Data is shared around the globe just as easily as it is from one office or cubical to the next. Corporations are skeptical about putting company data on such a public transport mechanism as the Internet, but the tools used on the Internet are exciting and everyone wants to use them. Out of a desire for the best of both worlds, the Intranet was born.
An intranet that has …
Trends. The Cassini Mission To Saturn: Plutonium As Propaganda, Ibpp Editor
Trends. The Cassini Mission To Saturn: Plutonium As Propaganda, Ibpp Editor
International Bulletin of Political Psychology
The author discusses the plutonium-carrying Cassini mission to Saturn.
Do Not As I Say And Not As I Do: The Problem Of Tritium, Ibpp Editor
Do Not As I Say And Not As I Do: The Problem Of Tritium, Ibpp Editor
International Bulletin of Political Psychology
The author discusses the manufacture and use of tritium for nuclear warheads.