Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer Science (7)
- Computer Networking (6)
- Anonymity networks (2)
- Cybersecurity (2)
- Dark web (2)
-
- Internet of Things (2)
- Linux (2)
- Tor (2)
- Anonymity (1)
- Architecture (1)
- Assistive Technology (1)
- Attractors (1)
- Behavioral-ecological networks (1)
- Bio-social networking (1)
- Cellular automata (1)
- Coding Theory (1)
- Cognitive radio (1)
- Complex adaptive systems (1)
- Computer Network (1)
- Computer Network Security (1)
- Disk (1)
- Distributed Computing (1)
- Dynamic spectrum access (1)
- Dynamical systems (1)
- I2p (1)
- Information Security (1)
- Information Theory (1)
- IoT (1)
- Irban Infrastructure (1)
- Machine Learning (1)
- Publication
- Publication Type
Articles 1 - 17 of 17
Full-Text Articles in Physical Sciences and Mathematics
Coded Distributed Function Computation, Pedro J. Soto
Coded Distributed Function Computation, Pedro J. Soto
Dissertations, Theses, and Capstone Projects
A ubiquitous problem in computer science research is the optimization of computation on large data sets. Such computations are usually too large to be performed on one machine and therefore the task needs to be distributed amongst a network of machines. However, a common problem within distributed computing is the mitigation of delays caused by faulty machines. This can be performed by the use of coding theory to optimize the amount of redundancy needed to handle such faults. This problem differs from classical coding theory since it is concerned with the dynamic coded computation on data rather than just statically …
Cis 440 Unix, George A. Nossa
Cis 440 Unix, George A. Nossa
Open Educational Resources
This document is a topical outline of the CIS 440 UNIX Course. This course is mostly based on lab assignments that are performed by students using their home computers (desktops or laptops). The home computers are configured as virtual machines by installing the Oracle Virtual Box Version 6.12 The Ubuntu Desktop Operating System (version 20.04) is then installed on these virtual machines, which are then used to run the course labs. The first Unit of the syllabus covers the virtual machine configuration for the lab environment and subsequent Units are a topical outline of the course. The detailed content is …
Systems And Network Administration - Introduction, Jimmy Richford, Nyc Tech-In-Residence Corps
Systems And Network Administration - Introduction, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for CISC 4311: Systems and Network Administration (Fall 2020)
Cisc 4331 – Systems And Network Administration - Week 5, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 5, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 5 for CISC 4331 - Systems and Network Administration
Cisc 4331 – Systems And Network Administration - Week 3, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 3, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 3 for CISC 4331: Systems and Network Administration
Cisc 4331 – Systems And Network Administration Week 6, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration Week 6, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 6 for CISC 4331 - Systems and Network Administration
Cisc 4331 – Systems And Network Administration - Week 4, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 4, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 4 for CISC 4331 - Systems and Network Administration
Cisc 4331 – Systems And Network Administration - Week 2, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 2, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 2 for CISC 4331: Systems and Network Administration
Lecture - Csci 275: Linux Systems Administration And Security, Moe Hassan, Nyc Tech-In-Residence Corps
Lecture - Csci 275: Linux Systems Administration And Security, Moe Hassan, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for CSCI 275: Linux Systems Administration and Security
An Evolutionary Perspective On Foraging Strategies And Group Dynamics In Bio-Social Inspired Cognitive Radio Networks, Anna Wisniewska
An Evolutionary Perspective On Foraging Strategies And Group Dynamics In Bio-Social Inspired Cognitive Radio Networks, Anna Wisniewska
Dissertations, Theses, and Capstone Projects
Saturation of wireless channels is inevitable as the number of wireless devices grows exponentially in an environment of limited radio spectrum capacity. Cognitive radio technology has been proposed to relieve overcrowded spectrum resources by allowing licensed channels to be opportunistically accessed by unlicensed users (cognitive radio devices) during periods of time when the license holder (primary user) is absent from its channel. Uncoordinated competition over limited resources among cognitive radio devices poses complex co-existence challenges. We propose novel bio-social inspired behavioral models and map out plausible evolutionary trajectories of co-use strategies in the cognitive radio ecosystem. By drawing parallels between …
Weaving The Dark Web: Legitimacy On Freenet, Tor, And I2p, John Schriner
Weaving The Dark Web: Legitimacy On Freenet, Tor, And I2p, John Schriner
Publications and Research
This is a book review of Robert W. Gehl's Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P (2018). The book explores these anonymity networks and the concept of legitimacy throughout. Using a multidisciplinary approach and interviews with network-builders and users, Gehl helps to demystify the dark web and critically examine these networks and technologies.
A Mobile Cyber-Physical System Framework For Aiding People With Visual Impairment, Martin Goldberg
A Mobile Cyber-Physical System Framework For Aiding People With Visual Impairment, Martin Goldberg
Dissertations, Theses, and Capstone Projects
It is a challenging problem for researchers and engineers in the assistive technology (AT) community to provide suitable solutions for visually impaired people (VIPs) through AT to meet orientation, navigation and mobility (ONM) needs. Given the spectrum of assistive technologies currently available for the purposes of aiding VIPs with ONM, our literature review and survey have shown that there is a reluctance to adopt these technological solutions in the VIP community.
Motivated by these findings, we think it critical to re-examine and rethink the approaches that have been taken. It is our belief that we need to take a different …
Building Test Anonymity Networks In A Cybersecurity Lab Environment, John Schriner
Building Test Anonymity Networks In A Cybersecurity Lab Environment, John Schriner
Student Theses
This paper explores current methods for creating test anonymity networks in a laboratory environment for the purpose of improving these networks while protecting user privacy. We first consider how each of these networks is research-driven and interested in helping researchers to conduct their research ethically. We then look to the software currently available for researchers to set up in their labs. Lastly we explore ways in which digital forensics and cybersecurity students could get involved with these projects and look at several class exercises that help students to understand particular attacks on these networks and ways they can help to …
Re-Architecting Mass Storage Input/Output For Performance And Efficiency, Robert Gezelter
Re-Architecting Mass Storage Input/Output For Performance And Efficiency, Robert Gezelter
Dissertations, Theses, and Capstone Projects
The semantics and fundamental structure of modern operating system IO systems dates from the mid-1960's to the mid-1970's, a period of time when computing power and memory capacity were a mere fraction of today's systems. Engineering tradeoffs made in the past enshrine the resource availability context of computing at that time. Deconstructing the semantics of the IO infrastructure allows a re-examination of long-standing design decisions in the context of today's greater processing and memory resources. The re-examination allows changes to several wide-spread paradigms to improve efficiency and performance.
The Legacy Of Multics And Secure Operating Systems Today, John Schriner
The Legacy Of Multics And Secure Operating Systems Today, John Schriner
Publications and Research
This paper looks to the legacy of Multics from 1963 and its influence on computer security. It discusses kernel-based and virtualization-based containment in projects like SELinux and Qubes, respectively. The paper notes the importance of collaborative and research-driven projects like Qubes and Tor Project.
Morphogenesis And Growth Driven By Selection Of Dynamical Properties, Yuri Cantor
Morphogenesis And Growth Driven By Selection Of Dynamical Properties, Yuri Cantor
Dissertations, Theses, and Capstone Projects
Organisms are understood to be complex adaptive systems that evolved to thrive in hostile environments. Though widely studied, the phenomena of organism development and growth, and their relationship to organism dynamics is not well understood. Indeed, the large number of components, their interconnectivity, and complex system interactions all obscure our ability to see, describe, and understand the functioning of biological organisms.
Here we take a synthetic and computational approach to the problem, abstracting the organism as a cellular automaton. Such systems are discrete digital models of real-world environments, making them more accessible and easier to study then their physical world …
Monitoring The Dark Web And Securing Onion Services, John Schriner
Monitoring The Dark Web And Securing Onion Services, John Schriner
Publications and Research
This paper focuses on how researchers monitor the Dark Web. After defining what onion services and Tor are, we discuss tools for monitoring and securing onion services. As Tor Project itself is research-driven, we find that the development and use of these tools help us to project where use of the Dark Web is headed.