Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Applied sciences (2)
- #antcenter (1)
- Anomaly detection (1)
- Application software -- Development -- Security measures (1)
- Bridge (1)
-
- Client/server computing – Equipment and supplies (1)
- Clusters (1)
- Coding theory (1)
- Cognitive radio networks (1)
- Communications software (1)
- Competitive analysis (1)
- Computer crimes (1)
- Computer network protocol (1)
- Computer system health monitoring (1)
- Detectors (1)
- Distribution (1)
- Efficient interpolation (1)
- Hackers (1)
- Information technology -- Management (1)
- K-server problem (1)
- List decoding (1)
- Mobile games -- Development -- Security measures (1)
- Mobiles (1)
- Newton-iteration. (1)
- Online algorithms (1)
- Online communities (1)
- Privacy (1)
- RSA (1)
- Root lifting (1)
- SAX (1)
Articles 1 - 14 of 14
Full-Text Articles in Physical Sciences and Mathematics
Attitudes And Behaviors In Online Communities: Empirical Studies Of The Effects Of Social, Community, And Individual Characteristics, Richard Kumi
Graduate Theses and Dissertations
Online communities and communities of practice bring people together to promote and support shared goals and exchange information. Personal interactions are important to many of these communities and one of the important outcomes of personal interactions in online communities and communities of practice is user-generated content. The three essays in the current study examines behavior motivation in online communities and communities of practice to understand how Social and personal psychological factors, and user-generated influence attitudes, intentions and behaviors in online communities.
The first essay addresses two research questions. First, how does Social capital influence exchange and combination behaviors in online …
Application Of Computer Algebra In List Decoding, Muhammad Foizul Islam Chowdhury
Application Of Computer Algebra In List Decoding, Muhammad Foizul Islam Chowdhury
Electronic Thesis and Dissertation Repository
The amount of data that we use in everyday life (social media, stock analysis, satellite communication etc.) are increasing day by day. As a result, the amount of data needs to be traverse through electronic media as well as to store are rapidly growing and there exist several environmental effects that can damage these important data during travelling or while in storage devices. To recover correct information from noisy data, we do use error correcting codes. The most challenging work in this area is to have a decoding algorithm that can decode the code quite fast, in addition with the …
A Novel Defense Mechanism Against Web Crawler Intrusion, Alireza Aghamohammadi
A Novel Defense Mechanism Against Web Crawler Intrusion, Alireza Aghamohammadi
Master's Theses and Doctoral Dissertations
Web robots also known as crawlers or spiders are used by search engines, hackers and spammers to gather information about web pages. Timely detection and prevention of unwanted crawlers increases privacy and security of websites. In this research, a novel method to identify web crawlers is proposed to prevent unwanted crawler to access websites. The proposed method suggests a five-factor identification process to detect unwanted crawlers. This study provides the pretest and posttest results along with a systematic evaluation of web pages with the proposed identification technique versus web pages without the proposed identification process. An experiment was performed with …
Trust-But-Verify: Guaranteeing The Integrity Of User-Generated Content In Online Applications, Akshay Dua
Trust-But-Verify: Guaranteeing The Integrity Of User-Generated Content In Online Applications, Akshay Dua
Dissertations and Theses
Online applications that are open to participation lack reliable methods to establish the integrity of user-generated information. Users may unknowingly own compromised devices, or intentionally publish forged information. In these scenarios, applications need some way to determine the "correctness" of autonomously generated information. Towards that end, this thesis presents a "trust-but-verify" approach that enables open online applications to independently verify the information generated by each participant. In addition to enabling independent verification, our framework allows an application to verify less information from more trustworthy users and verify more information from less trustworthy ones. Thus, an application can trade-off performance for …
Http Mailbox - Asynchronous Restful Communication, Sawood Alam
Http Mailbox - Asynchronous Restful Communication, Sawood Alam
Computer Science Theses & Dissertations
Traditionally, general web services used only the GET and POST methods of HTTP while several other HTTP methods like PUT, PATCH, and DELETE were rarely utilized. Additionally, the Web was mainly navigated by humans using web browsers and clicking on hyperlinks or submitting HTML forms. Clicking on a link is always a GET request while HTML forms only allow GET and POST methods. Recently, several web frameworks/libraries have started supporting RESTful web services through APIs. To support HTTP methods other than GET and POST in browsers, these frameworks have used hidden HTML form fields as a workaround to convey the …
Applied Hypergame Theory For Network Defense, Alan S. Gibson
Applied Hypergame Theory For Network Defense, Alan S. Gibson
Theses and Dissertations
Cyber operations are the most important aspect of military conflicts in the 21st century, but unfortunately they are also among the least understood. The continual battle for network dominance between attackers and defenders is considered to be a complex game. Hypergame theory is an extension of game theory that addresses the kind of games where misperception exists, as is often the case in military engagements. Hypergame theory, like game theory, uses a game model to determine strategy selection, but goes beyond game theory by examining subgames that exist within the full game. The inclusion of misperception and misinformation in the …
An Online Algorithm For The 2-Server Problem On The Line With Improved Competitiveness, Lucas Adam Bang
An Online Algorithm For The 2-Server Problem On The Line With Improved Competitiveness, Lucas Adam Bang
UNLV Theses, Dissertations, Professional Papers, and Capstones
In this thesis we present a randomized online algorithm for the 2-server problem on the line, named R-LINE (for Randomized Line). This algorithm achieves the lowest competitive ratio of any known randomized algorithm for the 2-server problem on the line.
The competitiveness of R-LINE is less than 1.901. This result provides a significant improvement over the previous known competitiveness of 155/78 (approximately 1.987), by Bartal, Chrobak, and Larmore, which was the first randomized algorithm for the 2-server problem one the line with competitiveness less than 2. Taking inspiration from this algorithm,we improve this result by utilizing ideas from T-theory, game …
Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton
Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton
Masters Theses
Since its inception, Tor has offered anonymity for internet users around the world. Tor now offers bridges to help users evade internet censorship, but the primary distribution schemes that provide bridges to users in need have come under attack. This thesis explores how threshold RSA can help strengthen Tor's infrastructure while also enabling more powerful bridge distribution schemes. We implement a basic threshold RSA signature system for the bridge authority and a reputation-based social network design for bridge distribution. Experimental results are obtained showing the possibility of quick responses to requests from honest users while maintaining both the secrecy and …
Tdma Slot Reservation In Cluster-Based Vanets, Mohammad Salem Almalag
Tdma Slot Reservation In Cluster-Based Vanets, Mohammad Salem Almalag
Computer Science Theses & Dissertations
Vehicular Ad Hoc Networks (VANETs) are a form of Mobile Ad Hoc Networks (MANETs) in which vehicles on the road form the nodes of the network. VANETs provide several services to enhance the safety and comfort of drivers and passengers. These services can be obtained by the wireless exchange of information among the vehicles driving on the road. In particular, the transmission of two different types of messages, safety/update and non-safety messages.
The transmission of safety/update message aims to inform the nearby vehicles about the sender's current status and/or a detected dangerous situation. This type of transmission is designed to …
Impact Of Primary User Activity On The Performance Of Energy-Based Spectrum Sensing In Cognitive Radio Systems, Sara L. Macdonald
Impact Of Primary User Activity On The Performance Of Energy-Based Spectrum Sensing In Cognitive Radio Systems, Sara L. Macdonald
Electrical & Computer Engineering Theses & Dissertations
Increasing numbers of wireless devices and mobile data requirements have led to a spectrum shortage. However spectrum utilization percentages are often low due to the current static spectrum allocation process where primary users (PUs) are given exclusive use to spectrum. Several mechanisms to increase spectrum utilization have been proposed including opportunistic spectrum access (OSA). Cognitive Radio (CR) is an emerging concept in wireless communication systems that aims to enable OSA in licensed frequencies by secondary users (SUs). CR systems are expected to sense the spectrum in order to determine if the PU is transmitting. Therefore OSA performance relies on the …
Stochastic Modeling And Time-To-Event Analysis Of Voip Traffic, Imad Al Ajarmeh
Stochastic Modeling And Time-To-Event Analysis Of Voip Traffic, Imad Al Ajarmeh
College of Computing and Digital Media Dissertations
Voice over IP (VoIP) systems are gaining increased popularity due to the cost effectiveness, ease of management, and enhanced features and capabilities. Both enterprises and carriers are deploying VoIP systems to replace their TDM-based legacy voice networks. However, the lack of engineering models for VoIP systems has been realized by many researchers, especially for large-scale networks. The purpose of traffic engineering is to minimize call blocking probability and maximize resource utilization. The current traffic engineering models are inherited from the legacy PSTN world, and these models fall short from capturing the characteristics of new traffic patterns. The objective of this …
Mobile Network Defense Interface For Cyber Defense And Situational Awareness, James C. Hannan
Mobile Network Defense Interface For Cyber Defense And Situational Awareness, James C. Hannan
Theses and Dissertations
Today's computer networks are under constant attack. In order to deal with this constant threat, network administrators rely on intrusion detection and prevention services (IDS) (IPS). Most IDS and IPS implement static rule sets to automatically alert administrators and resolve intrusions. Network administrators face a difficult challenge, identifying attacks against a vast number of benign network transactions. Also after a threat is identified making even the smallest policy change to the security software potentially has far-reaching and unanticipated consequences. Finally, because the administrator is primarily responding to alerts they may lose situational awareness of the network. During this research a …
Rootkit Detection Using A Cross-View Clean Boot Method, Bridget N. Flatley
Rootkit Detection Using A Cross-View Clean Boot Method, Bridget N. Flatley
Theses and Dissertations
In cyberspace, attackers commonly infect computer systems with malware to gain capabilities such as remote access, keylogging, and stealth. Many malware samples include rootkit functionality to hide attacker activities on the target system. After detection, users can remove the rootkit and associated malware from the system with commercial tools. This research describes, implements, and evaluates a clean boot method using two partitions to detect rootkits on a system. One partition is potentially infected with a rootkit while the other is clean. The method obtains directory listings of the potentially infected operating system from each partition and compares the lists to …
Automatic Detection Of Abnormal Behavior In Computing Systems, James Frank Roberts
Automatic Detection Of Abnormal Behavior In Computing Systems, James Frank Roberts
Theses and Dissertations--Computer Science
I present RAACD, a software suite that detects misbehaving computers in large computing systems and presents information about those machines to the system administrator. I build this system using preexisting anomaly detection techniques. I evaluate my methods using simple synthesized data, real data containing coerced abnormal behavior, and real data containing naturally occurring abnormal behavior. I find that the system adequately detects abnormal behavior and significantly reduces the amount of uninteresting computer health data presented to a system administrator.