Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Simulation And Analysis Of Insider Attacks, Christopher Blake Clark May 2013

Simulation And Analysis Of Insider Attacks, Christopher Blake Clark

UNLV Theses, Dissertations, Professional Papers, and Capstones

An insider is an individual (usually an employee, contractor, or business partner) that has been trusted with access to an organization's systems and sensitive data for legitimate purposes. A malicious insider abuses this access in a way that negatively impacts the company, such as exposing, modifying, or defacing software and data.

Many algorithms, strategies, and analyses have been developed with the intent of detecting and/or preventing insider attacks. In an academic setting, these tools and approaches show great promise. To be sure of their effectiveness, however, these analyses need to be tested. While real data is available on insider attacks …


Traffic Modeling In Lagrangian Coordinates Using Smartphone Apps, Sergio Contreras May 2013

Traffic Modeling In Lagrangian Coordinates Using Smartphone Apps, Sergio Contreras

UNLV Theses, Dissertations, Professional Papers, and Capstones

Traditionally, one of the ways traffic flow has been studied is by using the kinematic wave model. This model is derived in the Eulerian framework by using conservation of the number of vehicles. Recently, the kinematic wave model has been transformed into Lagrangian coordinates. In this framework, the independent variables are unique

vehicles and time. The detailed change in framework, and the properties of the model in the changed framework are reviewed. Numerical results from different traffic cases are explained. Since vehicle trajectory data can be easily collected from smartphones,

a smartphone application is developed for this purpose. This data …