Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Physical Sciences and Mathematics
A Comprehensive Security Approach On Data Race Detection And Deepfake Defense, Yu Guo
A Comprehensive Security Approach On Data Race Detection And Deepfake Defense, Yu Guo
Dissertations
In the past decades, even the computer techniques have a significant improvement. The topic about security will be never out of date.
To meet with the requirement of computation, the number of CPU cores has changed from single core to multi-cores. At the same time, the multi-thread programs are also proposed to maximize the advantages of multi-core computing power. While even the performance has been improved, but it also brings some new issues which were never happened on sequential programs called current bugs. Data race is a major type of current bugs, it is happened when multiple threads access the …
Resource Optimization In Support Of Iot Applications, Ihab Ahmed Mohammed
Resource Optimization In Support Of Iot Applications, Ihab Ahmed Mohammed
Dissertations
With the rise of the Internet of Things (IoT) and smart communities, managing computation and communication resources required by billions of smart devices becomes a concern. To tackle this problem, we develop algorithms for resource management to ensure better Quality of Service (QoS), safety, and performance. We focus our efforts on three problems.
In the first problem, we studied the strict QoS requirements of applications and differentiated service requirements in different situations of vehicular networks. We propose a generic prioritization and resource management algorithm that can be used to prioritize the processing of received packets in vehicular networks. We formulate …
Maia And Admonita: Mandatory Integrity Control Language And Dynamic Trust Framework For Arbitrary Structured Data, Wassnaa Al-Mawee
Maia And Admonita: Mandatory Integrity Control Language And Dynamic Trust Framework For Arbitrary Structured Data, Wassnaa Al-Mawee
Dissertations
The expansion of attacks against information systems of companies that operate nuclear power stations and other energy facilities in the United States and other countries, are noticeable with potential catastrophic real-world implications. Data integrity is a fundamental component of information security. It refers to the accuracy and the trustworthiness of data or resources. Data integrity within information systems becomes an important factor of security protection as the data becomes more integrated and crucial to decision-making. The security threats brought by human errors whether, malicious or unintentional, such as viruses, hacking, and many other cybersecurity threats, are dangerous and require mandatory …