Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Brigham Young University (19)
- Nova Southeastern University (16)
- University of South Florida (14)
- Walden University (9)
- University of Arkansas, Fayetteville (8)
-
- Wright State University (8)
- University of Massachusetts Amherst (7)
- Purdue University (6)
- University of Texas at Arlington (6)
- City University of New York (CUNY) (5)
- Missouri University of Science and Technology (5)
- Western Michigan University (5)
- Governors State University (4)
- Louisiana State University (4)
- Singapore Management University (4)
- Western University (4)
- Edith Cowan University (3)
- Kennesaw State University (3)
- La Salle University (3)
- New Jersey Institute of Technology (3)
- Old Dominion University (3)
- South Dakota State University (3)
- University of Nevada, Las Vegas (3)
- University of New Orleans (3)
- University of Texas at El Paso (3)
- Utah State University (3)
- Wayne State University (3)
- California Polytechnic State University, San Luis Obispo (2)
- Dartmouth College (2)
- East Tennessee State University (2)
- Publication Year
- Publication
-
- Theses and Dissertations (25)
- CCE Theses and Dissertations (16)
- USF Tampa Graduate Theses and Dissertations (14)
- Electronic Theses and Dissertations (9)
- Open Access Dissertations (9)
-
- Walden Dissertations and Doctoral Studies (9)
- Browse all Theses and Dissertations (8)
- Doctoral Dissertations (8)
- Graduate Theses and Dissertations (8)
- Dissertations (7)
- Masters Theses (5)
- Computer Science and Engineering Theses (4)
- Electronic Thesis and Dissertation Repository (4)
- All Capstone Projects (3)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (3)
- Dissertations and Theses Collection (Open Access) (3)
- LSU Master's Theses (3)
- Open Access Theses & Dissertations (3)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (3)
- Undergraduate Honors Theses (3)
- University of New Orleans Theses and Dissertations (3)
- Computer Science and Engineering Dissertations (2)
- Dissertations and Theses (2)
- Dissertations, Theses, and Capstone Projects (2)
- Economic Crime Forensics Capstones (2)
- Electrical & Computer Engineering Theses & Dissertations (2)
- Honors Theses (2)
- Information Technology Master Theses (2)
- Master's Theses (2)
- Master's Theses (2009 -) (2)
Articles 1 - 30 of 207
Full-Text Articles in Physical Sciences and Mathematics
Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy
Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy
Theses/Capstones/Creative Projects
Cryptocurrencies rely on a distributed public ledger (record of transactions) in order to perform their intended functions. However, the public’s ability to audit the network is both its greatest strength and greatest weakness: Anyone can see what address sent currency, and to whom the currency was sent. If cryptocurrency is ever going to take some of the responsibility of fiat currency, then there needs to be a certain level of confidentiality. Thus far, Monero has come out on top as the preferred currency for embodying the ideas of privacy and confidentiality. Through numerous cryptographic procedures, Monero is able to obfuscate …
Attitudes And Perceptions Towards Privacy And Surveillance In Australia, Aleatha J. Shanley
Attitudes And Perceptions Towards Privacy And Surveillance In Australia, Aleatha J. Shanley
Theses: Doctorates and Masters
Understanding attitudes towards privacy and surveillance technologies used to enhance security objectives is a complex, but crucial aspect for policy makers to consider. Historically, terrorism-related incidents justified the uptake of surveillance practices. More recently however, biosecurity concerns have motivated nation-states to adopt more intrusive surveillance measures. There is a growing body of literature that supports the public’s desire to maintain privacy despite fears of biological or physical threats.
This research set out to explore attitudes towards privacy and surveillance in an Australian context. Throughout the course of this endeavour, the COVID-19 pandemic emerged bringing with it a variety of track …
A Conceptual Decentralized Identity Solution For State Government, Martin Duclos
A Conceptual Decentralized Identity Solution For State Government, Martin Duclos
Theses and Dissertations
In recent years, state governments, exemplified by Mississippi, have significantly expanded their online service offerings to reduce costs and improve efficiency. However, this shift has led to challenges in managing digital identities effectively, with multiple fragmented solutions in use. This paper proposes a Self-Sovereign Identity (SSI) framework based on distributed ledger technology. SSI grants individuals control over their digital identities, enhancing privacy and security without relying on a centralized authority. The contributions of this research include increased efficiency, improved privacy and security, enhanced user satisfaction, and reduced costs in state government digital identity management. The paper provides background on digital …
Quantifying And Enhancing The Security Of Federated Learning, Virat Vishnu Shejwalkar
Quantifying And Enhancing The Security Of Federated Learning, Virat Vishnu Shejwalkar
Doctoral Dissertations
Federated learning is an emerging distributed learning paradigm that allows multiple users to collaboratively train a joint machine learning model without having to share their private data with any third party. Due to many of its attractive properties, federated learning has received significant attention from academia as well as industry and now powers major applications, e.g., Google's Gboard and Assistant, Apple's Siri, Owkin's health diagnostics, etc. However, federated learning is yet to see widespread adoption due to a number of challenges. One such challenge is its susceptibility to poisoning by malicious users who aim to manipulate the joint machine learning …
Intrusion Detection: Machine Learning Techniques For Software Defined Networks, Jacob S. Rodriguez
Intrusion Detection: Machine Learning Techniques For Software Defined Networks, Jacob S. Rodriguez
Masters Theses
In recent years, software defined networking (SDN) has gained popularity as a novel approach towards network management and architecture. Compared to traditional network architectures, this software-based approach offers greater flexibility, programmability, and automation. However, despite the advantages of this system, there still remains the possibility that it could be compromised. As we continue to explore new approaches to network management, we must also develop new ways of protecting those systems from threats. Throughout this paper, I will describe and test a network intrusion detection system (NIDS), and how it can be implemented within a software defined network. This system will …
Phishing, Irda Voli
Phishing, Irda Voli
Mathematics and Computer Science Capstones
Phishing is a cybercrime that involves a hacker identifying as a real person or institution that targets people over text message, phone calls, and emails. The hacker tries to scam the target into giving up personal information. People are targeted through text messages, phone calls, and emails. More recently in 2020 when covid became a major issue, phishing started becoming more and more popular for ways to scam. The messages became more specific, and job sites became more believable. According to article “Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies”, David Warburton says:
COVID-19 continues to significantly …
Secure And Efficient Federated Learning, Xingyu Li
Secure And Efficient Federated Learning, Xingyu Li
Theses and Dissertations
In the past 10 years, the growth of machine learning technology has been significant, largely due to the availability of large datasets for training. However, gathering a sufficient amount of data on a central server can be challenging. Additionally, with the rise of mobile networking and the large amounts of data generated by IoT devices, privacy and security issues have become a concern, resulting in government regulations such as GDPR, HIPAA, CCPA, and ADPPA. Under these circumstances, traditional centralized machine learning methods face a problem in that sensitive data must be kept locally for privacy reasons, making it difficult to …
Mitigation Of Cache Attacks On Cloud Services, Mudassiruddin Mohammed
Mitigation Of Cache Attacks On Cloud Services, Mudassiruddin Mohammed
All Student Theses
Cloud computing is frequently used due to its low cost and flexibility, but it also raises security issues to cloud service providers and customers. Cache attacks are a critical security risk in cloud computing. Cache attacks use weaknesses in cloud servers' cache memory to steal sensitive information, interrupt services, and decrease cloud performance. This study examines the many forms of cache attacks, their possible effects, and known mitigation measures. The study approach includes a review of current methods and their effectiveness in combating cache attack. The report also suggests future research topics for developing more effective and economical methods for …
Performance Analysis Of Zero Trust In Cloud Native Systems, Simone Rodigari
Performance Analysis Of Zero Trust In Cloud Native Systems, Simone Rodigari
Theses
Critical applications demand strong security implementations, low latency and high availability at constant rates, however, the performance of a software system is affected by the implementation of security. This research measures the performance overhead and possible mitigation in cloud native systems secured with a service mesh, which allows enabling security policies for the authentication, authorization and encryption of traffic within distributed systems. The side-car proxy is a core component of this architecture, acting as a policy enforcement point and intercepting networking communication from/to applications part of the mesh, consequently affecting the performance of applications hosted in the cloud. Physical resources …
Insecure Deserialization Detection In Python, Aneesh Verma
Insecure Deserialization Detection In Python, Aneesh Verma
Master's Projects
The importance of Cyber Security is increasing every single day. From the emergence of new ransomware to major data breaches, the online world is getting dangerous. A multinational non- profit group devoted to online application security is called OWASP, or the Open Web Application Security Project. The OWASP Top 10 is a frequently updated report that highlights the ten most important vulnerabilities to web application security. Among these 10 vulnerabilities, there exists a vulnerability called Software and Data Integrity Failures. A subset of this vulnerability is Insecure Deserialization. An object is transformed into a stream of bytes through the serialization …
Unlocking User Identity: A Study On Mouse Dynamics In Dual Gaming Environments For Continuous Authentication, Marcho Setiawan Handoko
Unlocking User Identity: A Study On Mouse Dynamics In Dual Gaming Environments For Continuous Authentication, Marcho Setiawan Handoko
All Graduate Theses, Dissertations, and Other Capstone Projects
With the surge in information management technology reliance and the looming presence of cyber threats, user authentication has become paramount in computer security. Traditional static or one-time authentication has its limitations, prompting the emergence of continuous authentication as a frontline approach for enhanced security. Continuous authentication taps into behavior-based metrics for ongoing user identity validation, predominantly utilizing machine learning techniques to continually model user behaviors. This study elucidates the potential of mouse movement dynamics as a key metric for continuous authentication. By examining mouse movement patterns across two contrasting gaming scenarios - the high-intensity "Team Fortress" and the low-intensity strategic …
Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte
Fuzzing Php Interpreters By Automatically Generating Samples, Jacob S. Baumgarte
Browse all Theses and Dissertations
Modern web development has grown increasingly reliant on scripting languages such as PHP. The complexities of an interpreted language means it is very difficult to account for every use case as unusual interactions can cause unintended side effects. Automatically generating test input to detect bugs or fuzzing, has proven to be an effective technique for JavaScript engines. By extending this concept to PHP, existing vulnerabilities that have since gone undetected can be brought to light. While PHP fuzzers exist, they are limited to testing a small quantity of test seeds per second. In this thesis, we propose a solution for …
Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula
Enhancing Graph Convolutional Network With Label Propagation And Residual For Malware Detection, Aravinda Sai Gundubogula
Browse all Theses and Dissertations
Malware detection is a critical task in ensuring the security of computer systems. Due to a surge in malware and the malware program sophistication, machine learning methods have been developed to perform such a task with great success. To further learn structural semantics, Graph Neural Networks abbreviated as GNNs have emerged as a recent practice for malware detection by modeling the relationships between various components of a program as a graph, which deliver promising detection performance improvement. However, this line of research attends to individual programs while overlooking program interactions; also, these GNNs tend to perform feature aggregation from neighbors …
Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani
Solidity Compiler Version Identification On Smart Contract Bytecode, Lakshmi Prasanna Katyayani Devasani
Browse all Theses and Dissertations
Identifying the version of the Solidity compiler used to create an Ethereum contract is a challenging task, especially when the contract bytecode is obfuscated and lacks explicit metadata. Ethereum bytecode is highly complex, as it is generated by the Solidity compiler, which translates high-level programming constructs into low-level, stack-based code. Additionally, the Solidity compiler undergoes frequent updates and modifications, resulting in continuous evolution of bytecode patterns. To address this challenge, we propose using deep learning models to analyze Ethereum bytecodes and infer the compiler version that produced them. A large number of Ethereum contracts and the corresponding compiler versions is …
Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan
Path-Safe :Enabling Dynamic Mandatory Access Controls Using Security Tokens, James P. Maclennan
Browse all Theses and Dissertations
Deploying Mandatory Access Controls (MAC) is a popular way to provide host protection against malware. Unfortunately, current implementations lack the flexibility to adapt to emergent malware threats and are known for being difficult to configure. A core tenet of MAC security systems is that the policies they are deployed with are immutable from the host while they are active. This work looks at deploying a MAC system that leverages using encrypted security tokens to allow for redeploying policy configurations in real-time without the need to stop a running process. This is instrumental in developing an adaptive framework for security systems …
The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii
The Open Charge Point Protocol (Ocpp) Version 1.6 Cyber Range A Training And Testing Platform, David Elmo Ii
Browse all Theses and Dissertations
The widespread expansion of Electric Vehicles (EV) throughout the world creates a requirement for charging stations. While Cybersecurity research is rapidly expanding in the field of Electric Vehicle Infrastructure, efforts are impacted by the availability of testing platforms. This paper presents a solution called the “Open Charge Point Protocol (OCPP) Cyber Range.” Its purpose is to conduct Cybersecurity research against vulnerabilities in the OCPP v1.6 protocol. The OCPP Cyber Range can be used to enable current or future research and to train operators and system managers of Electric Charge Vehicle Supply Equipment (EVSE). This paper demonstrates this solution using three …
Contributors To Pathologic Depolarization In Myotonia Congenita, Jessica Hope Myers
Contributors To Pathologic Depolarization In Myotonia Congenita, Jessica Hope Myers
Browse all Theses and Dissertations
Myotonia congenita is an inherited skeletal muscle disorder caused by loss-of-function mutation in the CLCN1 gene. This gene encodes the ClC-1 chloride channel, which is almost exclusively expressed in skeletal muscle where it acts to stabilize the resting membrane potential. Loss of this chloride channel leads to skeletal muscle hyperexcitability, resulting in involuntary muscle action potentials (myotonic discharges) seen clinically as muscle stiffness (myotonia). Stiffness affects the limb and facial muscles, though specific muscle involvement can vary between patients. Interestingly, respiratory distress is not part of this disease despite muscles of respiration such as the diaphragm muscle also carrying this …
Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba
Software Protection And Secure Authentication For Autonomous Vehicular Cloud Computing, Muhammad Hataba
Dissertations
Artificial Intelligence (AI) is changing every technology we deal with. Autonomy has been a sought-after goal in vehicles, and now more than ever we are very close to that goal. Vehicles before were dumb mechanical devices, now they are becoming smart, computerized, and connected coined as Autonomous Vehicles (AVs). Moreover, researchers found a way to make more use of these enormous capabilities and introduced Autonomous Vehicles Cloud Computing (AVCC). In these platforms, vehicles can lend their unused resources and sensory data to join AVCC.
In this dissertation, we investigate security and privacy issues in AVCC. As background, we built our …
Witness-Authenticated Key Exchange, Kelsey G. Melissaris
Witness-Authenticated Key Exchange, Kelsey G. Melissaris
Dissertations, Theses, and Capstone Projects
In this dissertation we investigate Witness-Authenticated Key Exchange (WAKE), a key agreement protocol in which each party is authenticated through knowledge of a witness to an arbitrary NP statement. We provide both game-based and universally composable definitions. Thereby, this thesis presents solutions for the most flexible and general method of authentication for group key exchange, providing simple constructions from (succinct) signatures of knowledge (SOK) and a two round UC-secure protocol.
After a discussion of flaws in previous definitions for WAKE we supply a new and improved game-based definition along with the first definition for witness-authenticated key exchange between groups of …
The Effects Of Side-Channel Attacks On Post-Quantum Cryptography: Influencing Frodokem Key Generation Using The Rowhammer Exploit, Michael Jacob Fahr
The Effects Of Side-Channel Attacks On Post-Quantum Cryptography: Influencing Frodokem Key Generation Using The Rowhammer Exploit, Michael Jacob Fahr
Graduate Theses and Dissertations
Modern cryptographic algorithms such as AES and RSA are effectively used for securing data transmission. However, advancements in quantum computing pose a threat to modern cryptography algorithms due to the potential of solving hard mathematical problems faster than conventional computers. Thus, to prepare for quantum computing, NIST has started a competition to standardize quantum-resistant public-key cryptography algorithms. These algorithms are evaluated for strong theoretical security and run-time performance. NIST is in the third round of the competition, and the focus has shifted to analyzing the vulnerabilities to side-channel attacks. One algorithm that has gained notice is the Round 3 alternate …
Formal Verification Applications For The Treekem Continuous Group Key Agreement Protocol, Alexander J. Washburn
Formal Verification Applications For The Treekem Continuous Group Key Agreement Protocol, Alexander J. Washburn
Theses and Dissertations
The features of Secure Group Messaging, the security guarantees of Message Layer Security, and the TreeKEM protocol designed to satisfy these guarantees and features are explored. A motivation and methodology for verification via explicit model checking is presented. Subsequently, a translation of the TreeKEM protocol into a Promela reference model is described, examining the nuances explicit model checking brings. Finally the results of the formal verification methods are discussed.
Torsh: Obfuscating Consumer Internet-Of-Things Traffic With A Collaborative Smart-Home Router Network, Adam Vandenbussche
Torsh: Obfuscating Consumer Internet-Of-Things Traffic With A Collaborative Smart-Home Router Network, Adam Vandenbussche
Dartmouth College Undergraduate Theses
When consumers install Internet-connected "smart devices" in their homes, metadata arising from the communications between these devices and their cloud-based service providers enables adversaries privy to this traffic to profile users, even when adequate encryption is used. Internet service providers (ISPs) are one potential adversary privy to users’ incom- ing and outgoing Internet traffic and either currently use this insight to assemble and sell consumer advertising profiles or may in the future do so. With existing defenses against such profiling falling short of meeting user preferences and abilities, there is a need for a novel solution that empowers consumers to …
Towards Practicalization Of Blockchain-Based Decentralized Applications, Songlin He
Towards Practicalization Of Blockchain-Based Decentralized Applications, Songlin He
Dissertations
Blockchain can be defined as an immutable ledger for recording transactions, maintained in a distributed network of mutually untrusting peers. Blockchain technology has been widely applied to various fields beyond its initial usage of cryptocurrency. However, blockchain itself is insufficient to meet all the desired security or efficiency requirements for diversified application scenarios. This dissertation focuses on two core functionalities that blockchain provides, i.e., robust storage and reliable computation. Three concrete application scenarios including Internet of Things (IoT), cybersecurity management (CSM), and peer-to-peer (P2P) content delivery network (CDN) are utilized to elaborate the general design principles for these two main …
Information Provenance For Mobile Health Data, Taylor A. Hardin
Information Provenance For Mobile Health Data, Taylor A. Hardin
Dartmouth College Ph.D Dissertations
Mobile health (mHealth) apps and devices are increasingly popular for health research, clinical treatment and personal wellness, as they offer the ability to continuously monitor aspects of individuals' health as they go about their everyday activities. Many believe that combining the data produced by these mHealth apps and devices may give healthcare-related service providers and researchers a more holistic view of an individual's health, increase the quality of service, and reduce operating costs. For such mHealth data to be considered useful though, data consumers need to be assured that the authenticity and the integrity of the data has remained intact---especially …
Game-Theoretic Deception Modeling For Distracting Network Adversarie, Mohammad Sujan Miah
Game-Theoretic Deception Modeling For Distracting Network Adversarie, Mohammad Sujan Miah
Open Access Theses & Dissertations
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identifying network vulnerabilities and work out various targets to attack where deception is becoming an increasingly crucial technique for the defenders to delay these attacks. For securing computer networks, the defenders use various deceptive decoy objects to detect, confuse, and distract attackers. By trapping the attackers, these decoys gather information, waste their time and resources, and potentially prevent future attacks. However, we have to consider that an attacker with the help of smart techniques may detect the decoys and avoid them. One of the well-known …
Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System., Shruthi Ramakrishnan
Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System., Shruthi Ramakrishnan
Graduate Theses and Dissertations
Critical infrastructures (CI) play a vital role in majority of the fields and sectors worldwide. It contributes a lot towards the economy of nations and towards the wellbeing of the society. They are highly coupled, interconnected and their interdependencies make them more complex systems. Thus, when a damage occurs in a CI system, its complex interdependencies make it get subjected to cascading effects which propagates faster from one infrastructure to another resulting in wide service degradations which in turn causes economic and societal effects. The propagation of cascading effects of disruptive events could be handled efficiently if the assessment and …
Management Of Data Brokers In Support Of Smart Community Applications, Shadha Tabatabai
Management Of Data Brokers In Support Of Smart Community Applications, Shadha Tabatabai
Dissertations
The widespread use of smart devices has led to the Internet of Things (IoT) revolution. Big data generated by billions of devices must be analyzed to make better decisions. However, this introduces security, communication, and processing problems. To solve these problems, we develop algorithms to enhance the work of brokers. We focus our efforts on three problems.
In the first problem, brokers are used in the cloud along with Software Defined Network (SDN) switches. We formulate minimizing brokers’ load difference within a reconfiguration budget with the constraint of indivisible topics as an Integer Linear Programming (ILP) problem. We show that …
Impact Of Internal Control, Cybersecurity Risk, And Competitive Advantage On Retail Cybersecurity Budget, Samuel William Pfanstiel
Impact Of Internal Control, Cybersecurity Risk, And Competitive Advantage On Retail Cybersecurity Budget, Samuel William Pfanstiel
Walden Dissertations and Doctoral Studies
Retail organizations are driven to improve security posture for many reasons, including meeting financial regulation requirements, mitigating threats of data breach, and differentiating themselves within markets affected by customer perception. The problem was that little was known about how these drivers of internal control, cybersecurity risk, and competitive advantage impact retail cybersecurity budgets within the retail sector. The purpose of this quantitative nonexperimental correlational study was to describe the relationship between cybersecurity budget and drivers of internal control, cybersecurity risk, and competitive advantage among U.S.-based retail merchant organizations. Real options theory provided a foundation for explaining this decision-making process. Data …
Persistent Stealthy Attacks And Their Detection In Large Distributed Cyber-Physical Systems, Simon Bech Thougaard
Persistent Stealthy Attacks And Their Detection In Large Distributed Cyber-Physical Systems, Simon Bech Thougaard
Doctoral Dissertations
"Cyber-Physical Systems (CPS) are increasingly targeted by attackers using a wide and evolving array of methods. When these systems are distributed, every node represents a potential vulnerability, and secure system design must take this into account. Distributed CPSs also have the potential to better detect and handle attacks, by leveraging redundancies of physical measurements between adjacent nodes. The main purpose of this research is to determine the conditions that render a distributed CPS more resistant to attacks, and the conditions that render it more vulnerable. The work is centered around two separate applications: The Smart Grid and Autonomous Drone Swarms. …
Correct Web Service Transactions In The Presence Of Malicious And Misbehaving Transactions, John Thomas Ravan Iii
Correct Web Service Transactions In The Presence Of Malicious And Misbehaving Transactions, John Thomas Ravan Iii
Theses and Dissertations
Concurrent database transactions within a web service environment can cause a variety of problems without the proper concurrency control mechanisms in place. A few of these problems involve data integrity issues, deadlock, and efficiency issues. Even with today’s industry standard solutions to these problems, they have taken a reactive approach rather than proactively preventing these problems from happening. We deliver a solution, based on prediction-based scheduling to ensure consistency while keeping execution time the same or faster than current industry solutions. The first part of this solution involves prototyping and formally proving a prediction-based scheduler.
The prediction-based scheduler leverages a …