Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Physical Sciences and Mathematics
Adaptive Strategies Of Multi-Objective Optimization For Greener Networks, Hatem Yazbek
Adaptive Strategies Of Multi-Objective Optimization For Greener Networks, Hatem Yazbek
CCE Theses and Dissertations
Increasing energy costs and environmental issues related to the Internet and wired networks continue to be a major concern. Energy-efficient or power-aware networks continue to gain interest in the research community. Existing energy reduction approaches do not fully address all aspects of the problem. We consider the problem of reducing energy by turning off network links, while achieving acceptable load balance, by adjusting link weights. Changing link weights frequently can cause network oscillation or instability in measuring the resulting traffic load, which is a situation to be avoided. In this research, we optimize two objectives, which are minimizing network power …
Reduction Of False Positives In Intrusion Detection Based On Extreme Learning Machine With Situation Awareness, Donald A. Burgio
Reduction Of False Positives In Intrusion Detection Based On Extreme Learning Machine With Situation Awareness, Donald A. Burgio
CCE Theses and Dissertations
Protecting computer networks from intrusions is more important than ever for our privacy, economy, and national security. Seemingly a month does not pass without news of a major data breach involving sensitive personal identity, financial, medical, trade secret, or national security data. Democratic processes can now be potentially compromised through breaches of electronic voting systems. As ever more devices, including medical machines, automobiles, and control systems for critical infrastructure are increasingly networked, human life is also more at risk from cyber-attacks. Research into Intrusion Detection Systems (IDSs) began several decades ago and IDSs are still a mainstay of computer and …
Assessing The Presence Of Mindfulness Within Cyber And Non-Cybersecurity Groups, Christopher Wilder
Assessing The Presence Of Mindfulness Within Cyber And Non-Cybersecurity Groups, Christopher Wilder
CCE Theses and Dissertations
Corporations and individuals continue to be under Phishing attack. Researchers categorizes methods corporations and individuals can employ to reduce the impact of being caught in a Phishing scheme. Corporation enable technical mechanisms such as automated filtering, URL blacklisting, and manipulation of browser warning messages to reduce phishing susceptibility costing billions of dollars annually. However, even with robust efforts to educate employees about phishing techniques through security awareness training the abundance of attacks continues to plague organizations. This study aims to identify whether a correlation exists between mindfulness and phishing susceptibility. The goal of this research is to determine if mindful …