Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Airforce (1)
- Applied cryptography (1)
- Atomic swap (1)
- Blockchain (1)
- Breach (1)
-
- Children (1)
- Cloud (1)
- Computer Science (1)
- Cryptocurrencies (1)
- Cybersecurity (1)
- Data (1)
- Databases (1)
- Department of Defense (1)
- Dynamic graph databases (1)
- Graph coarsening (1)
- Indexing (1)
- Information retrieval (1)
- Intelligence (1)
- Interoperability (1)
- National Guard (1)
- Natural language processing (1)
- Points-of-interest (1)
- Privacy (1)
- Query answering (1)
- Safe search (1)
- Safeguards (1)
- Search (1)
- Search engines (1)
- Social media usage (1)
- Social network data (1)
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Physical Sciences and Mathematics
Cybersecurity Safeguards: What Cybersecurity Safeguards Could Have Prevented The Intelligence/Data Breach By A Member Of The Air National Guard, Christopher Curtis Royal
Cybersecurity Safeguards: What Cybersecurity Safeguards Could Have Prevented The Intelligence/Data Breach By A Member Of The Air National Guard, Christopher Curtis Royal
Cyber Operations and Resilience Program Graduate Projects
Jack Teixeira, a 21-year-old IT specialist Air National Guard found himself on the wrong side of the US law after sharing what is considered classified and extremely sensitive information about USA's operations and role in Ukraine and Russia war. Like other previous cases of leakage of classified intelligence, the case of Teixeira raises concerns about the weaknesses and vulnerability of federal agencies' IT systems and security protocols governing accessibility to classified documents. Internal leakages of such classified documents hurt national security and can harm the country, especially when such secretive intelligence finds its way into the hands of enemies. Unauthorized …
Privacy-Preserving Protocol For Atomic Swap Between Blockchains, Kiran Gurung
Privacy-Preserving Protocol For Atomic Swap Between Blockchains, Kiran Gurung
Boise State University Theses and Dissertations
Atomic swap facilitates fair exchange of cryptocurrencies without the need for a trusted authority. It is regarded as one of the prominent technologies for the cryptocurrency ecosystem, helping to realize the idea of a decentralized blockchain introduced by Bitcoin. However, due to the heterogeneity of the cryptocurrency systems, developing efficient and privacy-preserving atomic swap protocols has proven challenging. In this thesis, we propose a generic framework for atomic swap, called PolySwap, that enables fair ex-change of assets between two heterogeneous sets of blockchains. Our construction 1) does not require a trusted third party, 2) preserves the anonymity of the swap …
Querying Over Encrypted Databases In A Cloud Environment, Jake Douglas
Querying Over Encrypted Databases In A Cloud Environment, Jake Douglas
Boise State University Theses and Dissertations
The adoption of cloud computing has created a huge shift in where data is processed and stored. Increasingly, organizations opt to store their data outside of their own network to gain the benefits offered by shared cloud resources. With these benefits also come risks; namely, another organization has access to all of the data. A malicious insider at the cloud services provider could steal any personal information contained on the cloud or could use the data for the cloud service provider's business advantage. By encrypting the data, some of these risks can be mitigated. Unfortunately, encrypting the data also means …
Fostering The Retrieval Of Suitable Web Resources In Response To Children's Educational Search Tasks, Oghenemaro Deborah Anuyah
Fostering The Retrieval Of Suitable Web Resources In Response To Children's Educational Search Tasks, Oghenemaro Deborah Anuyah
Boise State University Theses and Dissertations
Children regularly turn to search engines (SEs) to locate school-related materials. Unfortunately, research has shown that when utilizing SEs, children do not always access resources that specifically target them. To support children, popular and child-oriented SEs make available a safe search filter, which is meant to eliminate inappropriate resources. Safe search is, however, not always the perfect deterrent as pornographic and hate-based resources may slip through the filter, while resources relevant to an educational search context may be misconstrued and filtered out. Moreover, filtering inappropriate resources in response to children searches is just one perspective to consider in offering them …
A Scalable Graph-Coarsening Based Index For Dynamic Graph Databases, Akshay Kansal
A Scalable Graph-Coarsening Based Index For Dynamic Graph Databases, Akshay Kansal
Boise State University Theses and Dissertations
Graph is a commonly used data structure for modeling complex data such as chemical molecules, images, social networks, and XML documents. This complex data is stored using a set of graphs, known as graph database D. To speed up query answering on graph databases, indexes are commonly used. State-of-the-art graph database indexes do not adapt or scale well to dynamic graph database use; they are static, and their ability to prune possible search responses to meet user needs worsens over time as databases change and grow. Users can re-mine indexes to gain some improvement, but it is time consuming. Users …
Let’S Try Something New: Service Learning In Boise State's Computer Science Department, Daniel Kondratyuk
Let’S Try Something New: Service Learning In Boise State's Computer Science Department, Daniel Kondratyuk
International Journal of Undergraduate Community Engagement
In this article I explain how a group of Computer Science students at Boise State University participated in a new service learning project. I provide a few testimonials on the students’ experiences and describe the rewarding aspects of service learning in the greater Computer Science community.
Cest: City Event Summarization Using Twitter, Deepa Mallela
Cest: City Event Summarization Using Twitter, Deepa Mallela
Computer Science Graduate Projects and Theses
Twitter, with 288 million active users, has become the most popular platform for continuous real-time discussions. This leads to huge amounts of information related to the real-world, which has attracted researchers from both academia and industry. Event detection on Twitter has gained attention as one of the most popular domains of interest within the research community. Unfortunately, existing event detection methodologies have yet to fully explore Twitter metadata and instead rely solely on identifying events based on prior information or focus on events that belong to specific categories. Given the heavy volume of tweets that discuss events, summarization techniques can …