Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Engineering

Old Dominion University

Keyword
Publication
Publication Type

Articles 1 - 30 of 60

Full-Text Articles in Physical Sciences and Mathematics

Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park Dec 2019

Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park

VMASC Publications

In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication …


Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park Dec 2019

Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park

VMASC Publications

The advancement in Information and Communications Technology (ICT) has changed the entire paradigm of computing. Because of such advancement, we have new types of computing and communication environments, for example, Internet of Things (IoT) that is a collection of smart IoT devices. The Internet of Medical Things (IoMT) is a specific type of IoT communication environment which deals with communication through the smart healthcare (medical) devices. Though IoT communication environment facilitates and supports our day-to-day activities, but at the same time it has also certain drawbacks as it suffers from several security and privacy issues, such as replay, man-in-the-middle, impersonation, …


Defining Boat Wake Impacts On Shoreline Stability Toward Management And Policy Solutions, Donna Marie Bilkovic, Molly M. Mitchell, Jennifer Davis, Julie Herman, Elizabeth Andrews, Angela King, Pamela Mason, Navid Tahvildari, Jana Davis, Rachel L. Dixon Dec 2019

Defining Boat Wake Impacts On Shoreline Stability Toward Management And Policy Solutions, Donna Marie Bilkovic, Molly M. Mitchell, Jennifer Davis, Julie Herman, Elizabeth Andrews, Angela King, Pamela Mason, Navid Tahvildari, Jana Davis, Rachel L. Dixon

Civil & Environmental Engineering Faculty Publications

Coastal economies are often supported by activities that rely on commercial or recreational vessels to move people or goods, such as shipping, transportation, cruising, and fishing. Unintentionally, frequent or intense vessel traffic can contribute to erosion of coastlines; this can be particularly evident in sheltered systems where shoreline erosion should be minimal in the absence of boat waves. We reviewed the state of the science of known effects of boat waves on shoreline stability, examined data on erosion, turbidity, and shoreline armoring patterns for evidence of a response to boat waves in Chesapeake Bay, and reviewed existing management and policy …


Electroosmotic Flow Of Viscoelastic Fluid In A Nanochannel Connecting Two Reservoirs, Lanju Mei, Shizhi Qian Nov 2019

Electroosmotic Flow Of Viscoelastic Fluid In A Nanochannel Connecting Two Reservoirs, Lanju Mei, Shizhi Qian

Mechanical & Aerospace Engineering Faculty Publications

Electroosmotic flow (EOF) of viscoelastic fluid with Linear Phan-Thien–Tanner (LPTT) constitutive model in a nanochannel connecting two reservoirs is numerically studied. For the first time, the influence of viscoelasticity on the EOF and the ionic conductance in the micro-nanofluidic interconnect system, with consideration of the electrical double layers (EDLs), is investigated. Regardless of the bulk salt concentration, significant enhancement of the flow rate is observed for viscoelastic fluid compared to the Newtonian fluid, due to the shear thinning effect. An increase in the ionic conductance of the nanochannel occurs for the viscoelastic fluid. The enhancement of the ionic conductance is …


Odu Researchers' Flood Adaptation Study Honored At International Conference, News @ Odu Oct 2019

Odu Researchers' Flood Adaptation Study Honored At International Conference, News @ Odu

News Items

No abstract provided.


Paper-Based Flexible Electrode Using Chemically-Modified Graphene And Functionalized Multiwalled Carbon Nanotube Composites For Electrophysiological Signal Sensing, Md Faruk Hossain, Jae Sang Heo, John Nelson, Insoo Kim Oct 2019

Paper-Based Flexible Electrode Using Chemically-Modified Graphene And Functionalized Multiwalled Carbon Nanotube Composites For Electrophysiological Signal Sensing, Md Faruk Hossain, Jae Sang Heo, John Nelson, Insoo Kim

Bioelectrics Publications

Flexible paper-based physiological sensor electrodes were developed using chemically-modified graphene (CG) and carboxylic-functionalized multiwalled carbon nanotube composites (f@MWCNTs). A solvothermal process with additional treatment was conducted to synthesize CG and f@MWCNTs to make CG-f@MWCNT composites. The composite was sonicated in an appropriate solvent to make a uniform suspension, and then it was drop cast on a nylon membrane in a vacuum filter. A number of batches (0%~35% f@MWCNTs) were prepared to investigate the performance of the physical characteristics. The 25% f@MWCNT-loaded composite showed the best adhesion on the paper substrate. The surface topography and chemical bonding of the proposed CG-f@MWCNT …


Catalytic Transfer Hydrogenation Reactions Of Lipids, Alexander Asiedu Oct 2019

Catalytic Transfer Hydrogenation Reactions Of Lipids, Alexander Asiedu

Civil & Environmental Engineering Theses & Dissertations

Catalytic transfer hydrogenation (CTH) of lipids was investigated using 2-propanol as hydrogen donor for producing liquid hydrocarbons, e.g. jet fuels. The main sources of lipids selected in this study were waste cooking oil (WCO) and oil-laden algae-derived biofuel intermediate (BI). Two different catalysts were employed in this study, namely activated carbon and trimetallic-doped zeolite.

The CTH reaction was between WCO and 2-propanol in a continuous flow reactor over a packed-bed activated carbon at near atmospheric pressure. Results revealed a high level of alkenes and aromatics compounds, which are not stable and are not environmentally unfriendly. To reduce these compounds in …


Spatiotemporal Downscaling Rainfall Predictions Of North American Regional Climate Change Assessment Program For Entire Virginia, Zhaoyi Cai Oct 2019

Spatiotemporal Downscaling Rainfall Predictions Of North American Regional Climate Change Assessment Program For Entire Virginia, Zhaoyi Cai

Civil & Environmental Engineering Theses & Dissertations

This thesis developed a statistical downscaling approach, which consists of a series of linear regression equations, to spatiotemporally downscale the rainfall predictions from North American Regional Climate Change Assessment Program (NARCCAP) in accordance with the 15-min observed rainfall data at the rain gauges across the state of Virginia. NARCCAP has generated twelve different region-global climate models (RCM-GCMs) with a temporal resolution of 3 hr and a spatial resolution of 50 km over the entire America. Although it has been downscaled already, such resolutions are still too coarse to represent the rain gauges. This means that the RCM-GCMs’ predictions need to …


Demonstration Of Visible And Near Infrared Raman Spectrometers And Improved Matched Filter Model For Analysis Of Combined Raman Signals, Alexander Matthew Atkinson Oct 2019

Demonstration Of Visible And Near Infrared Raman Spectrometers And Improved Matched Filter Model For Analysis Of Combined Raman Signals, Alexander Matthew Atkinson

Electrical & Computer Engineering Theses & Dissertations

Raman spectroscopy is a powerful analysis technique that has found applications in fields such as analytical chemistry, planetary sciences, and medical diagnostics. Recent studies have shown that analysis of Raman spectral profiles can be greatly assisted by use of computational models with achievements including high accuracy pure sample classification with imbalanced data sets and detection of ideal sample deviations for pharmaceutical quality control. The adoption of automated methods is a necessary step in streamlining the analysis process as Raman hardware becomes more advanced. Due to limits in the architectures of current machine learning based Raman classification models, transfer from pure …


A Cfd Study Of Steady Fully Developed Laminar Flow Through A 90-Degree Bend Pipe With A Square Cross-Sectional Area, Subodh Sushant Toraskar Oct 2019

A Cfd Study Of Steady Fully Developed Laminar Flow Through A 90-Degree Bend Pipe With A Square Cross-Sectional Area, Subodh Sushant Toraskar

Mechanical & Aerospace Engineering Theses & Dissertations

Fluid flow through a closed curved conduit has always been a topic of extensive research, as it has many practical and industrial applications. The flow is generally characterized by a presence of secondary flow, vortical motions and pressure losses for different flow regimes. These observed irregularities may positively or negatively impact the flow. They are beneficial for cases where mixing of fluids is required, usually observed for multiphase flow regimes or detrimental for cases involving particles in the fluid. There are also instances where a particle-laden fluid transported through the curved pipe was directly related to corrosion- erosion related problems. …


Laser-Spark Multicharged Ion Implantation System ‒ Application In Ion Implantation And Neural Deposition Of Carbon In Nickel (111), Oguzhan Balki Oct 2019

Laser-Spark Multicharged Ion Implantation System ‒ Application In Ion Implantation And Neural Deposition Of Carbon In Nickel (111), Oguzhan Balki

Electrical & Computer Engineering Theses & Dissertations

Carbon ions generated by ablation of a carbon target using an Nd:YAG laser pulse (wavelength λ = 1064 nm, pulse width τ = 7 ns, and laser fluence of 10-110 J/cm2) are characterized. Time-of-flight analyzer, a three-mesh retarding field analyzer, and an electrostatic ion energy analyzer are used to study the charge and energy of carbon ions generated by laser ablation. The dependencies of the ion signal on the laser fluence, laser focal point position relative to target surface, and the acceleration voltage are described. Up to C4+ are observed. When no acceleration voltage is applied between …


Pulse Power Effects On Transient Plasma Ignition For Combustion, David Wayne Alderman Ii Oct 2019

Pulse Power Effects On Transient Plasma Ignition For Combustion, David Wayne Alderman Ii

Electrical & Computer Engineering Theses & Dissertations

Transient plasma ignition (TPI) uses highly non-equilibrium plasmas, driven by less than 100 nanosecond, high-voltage pulses, to initiate combustion. The effects of pulse repetition frequency (PRF) and ultrashort nanosecond rise times on TPI are investigated in this work using lean, stoichiometric, and rich air-fuel mixtures at atmospheric pressure. Experimental data show the transient plasmas driven by ultrashort rise time, high voltage pulses at high PRF’s enhance the combustion of lean or stoichiometric air-methane mixtures in a static chamber. In particular, increasing PRF enhances the combustion performance by means of reduced delay times independent of the equivalence ratio of the air-fuel …


Computational Analysis Of Antipode Algorithms For The Output Feedback Hopf Algebra, Lance Berlin Oct 2019

Computational Analysis Of Antipode Algorithms For The Output Feedback Hopf Algebra, Lance Berlin

Electrical & Computer Engineering Theses & Dissertations

The feedback interconnection of two systems written in terms of Chen-Fliess series can be described explicitly in terms of the antipode of the output feedback Hopf algebra. At present, there are three known computational approaches to calculating this antipode: the left coproduct method, the right coproduct method, and the derivation method. Each of these algorithms is defined recursively, and thus becomes computationally expensive quite quickly. This motivates the need for a more complete understanding of the algorithmic complexity of these methods, as well as the development of new approaches for determining the Hopf algebra antipode. The main goals of this …


Communication Capability For A Simulation-Based Test And Evaluation Framework For Autonomous Systems, Ntiana Sakioti Oct 2019

Communication Capability For A Simulation-Based Test And Evaluation Framework For Autonomous Systems, Ntiana Sakioti

Computational Modeling & Simulation Engineering Theses & Dissertations

The design and testing process for collaborative autonomous systems can be extremely complex and time-consuming, so it is advantageous to begin testing early in the design. A Test & Evaluation (T&E) Framework was previously developed to enable the testing of autonomous software at various levels of mixed reality. The Framework assumes a modular approach to autonomous software development, which introduces the possibility that components are not in the same stage of development. The T&E Framework allows testing to begin early in a simulated environment, with the autonomous software methodically migrating from virtual to augmented to physical environments as component development …


A Low-Cost Soft Robotic Hand Exoskeleton For Use In Therapy Of Limited Hand–Motor Function, Grant Rudd, Liam Daly, Vukica Jovanovic, Filip Cukov Sep 2019

A Low-Cost Soft Robotic Hand Exoskeleton For Use In Therapy Of Limited Hand–Motor Function, Grant Rudd, Liam Daly, Vukica Jovanovic, Filip Cukov

Engineering Technology Faculty Publications

We present the design and validation of a low-cost, customizable and 3D-printed anthropomorphic soft robotic hand exoskeleton for rehabilitation of hand injuries using remotely administered physical therapy regimens. The design builds upon previous work done on cable actuated exoskeleton designs by implementing the same kinematic functionality, but with the focus shifted to ease of assembly and cost effectiveness as to allow patients and physicians to manufacture and assemble the hardware necessary to implement treatment. The exoskeleton was constructed solely from 3D-printed and widely available of-the-shelf components. Control of the actuators was realized using an Arduino microcontroller, with a custom-designed shield …


Using Feature Extraction From Deep Convolutional Neural Networks For Pathological Image Analysis And Its Visual Interpretability, Wei-Wen Hsu Jul 2019

Using Feature Extraction From Deep Convolutional Neural Networks For Pathological Image Analysis And Its Visual Interpretability, Wei-Wen Hsu

Electrical & Computer Engineering Theses & Dissertations

This dissertation presents a computer-aided diagnosis (CAD) system using deep learning approaches for lesion detection and classification on whole-slide images (WSIs) with breast cancer. The deep features being distinguishing in classification from the convolutional neural networks (CNN) are demonstrated in this study to provide comprehensive interpretability for the proposed CAD system using the domain knowledge in pathology. In the experiment, a total of 186 slides of WSIs were collected and classified into three categories: Non-Carcinoma, Ductal Carcinoma in Situ (DCIS), and Invasive Ductal Carcinoma (IDC). Instead of conducting pixel-wise classification (segmentation) into three classes directly, a hierarchical framework with the …


Developing Algorithms To Detect Incidents On Freeways From Loop Detector And Vehicle Re-Identification Data, Biraj Adhikari Jul 2019

Developing Algorithms To Detect Incidents On Freeways From Loop Detector And Vehicle Re-Identification Data, Biraj Adhikari

Civil & Environmental Engineering Theses & Dissertations

A new approach for testing incident detection algorithms has been developed and is presented in this thesis. Two new algorithms were developed and tested taking California #7, which is the most widely used algorithm to date, and SVM (Support Vector Machine), which is considered one of the best performing classifiers, as the baseline for comparisons. Algorithm #B in this study uses data from Vehicle Re-Identification whereas the other three algorithms (California #7, SVM and Algorithm #A) use data from a double loop detector for detection of an incident. A microscopic traffic simulator is used for modeling three types of incident …


Effects Of Pulse Width On He Plasma Jets In Contact With Water Evaluated By Oh(A-X) Emission And Ohaq Production, Shutong Song, Esin B. Sözer, Chunqi Jiang Jun 2019

Effects Of Pulse Width On He Plasma Jets In Contact With Water Evaluated By Oh(A-X) Emission And Ohaq Production, Shutong Song, Esin B. Sözer, Chunqi Jiang

Bioelectrics Publications

Nanosecond pulsed helium plasma jets impinging on water produce hydroxyl radicals both in gas- and liquid-phase. In this study, the effects of pulse width on a repetitively pulsed plasma jet in contact with water are evaluated via OH(A-X) emission and OHaq production in water for various pulse widths ranging from 200 to 5000 ns. The maximal energy efficiency of OH(A-X) emission is obtained for pulse widths of 600-800 ns whereas the maximal efficiency of OHaq production is at 200 ns. Temporally-resolved emission spectroscopy shows that more than 40% of OH(A-X) emission is produced during the first 200 ns …


Impact Of Http Cookie Violations In Web Archives, Sawood Alam, Michele C. Weigle, Michael L. Nelson Jun 2019

Impact Of Http Cookie Violations In Web Archives, Sawood Alam, Michele C. Weigle, Michael L. Nelson

Computer Science Faculty Publications

Certain HTTP Cookies on certain sites can be a source of content bias in archival crawls. Accommodating Cookies at crawl time, but not utilizing them at replay time may cause cookie violations, resulting in defaced composite mementos that never existed on the live web. To address these issues, we propose that crawlers store Cookies with short expiration time and archival replay systems account for values in the Vary header along with URIs.


Next-Generation Rainfall Idf Curves For The Virginian Drainage Area Of Chesapeake Bay, Xixi Wang, Xiaomin Yang, Zhaoyi Cai Jun 2019

Next-Generation Rainfall Idf Curves For The Virginian Drainage Area Of Chesapeake Bay, Xixi Wang, Xiaomin Yang, Zhaoyi Cai

Civil & Environmental Engineering Faculty Publications

Probability-based intensity-duration-frequency IDF curves are needed but currently lacking for Department of Defense DoD to construct and manage its infrastructure in changing climate. The objectives of this project were to 1 develop an innovative approach for considering rainfall non-stationarity in developing such IDF curves and 2 apply this approach to the state of Virginia. In this regard, the observed data on 15-min rainfall at 57 gauges and the precipitations projected by twelve pairs of Regional Climate Model RCM and Global Circulation Model GCM were used. For a given gauge or watershed, in terms of fitting the empirical exceedance probabilities, a …


Confucian Robot Ethics, Qin Zhu, Tom Williams, Ruchen Wen May 2019

Confucian Robot Ethics, Qin Zhu, Tom Williams, Ruchen Wen

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In the literature of artificial moral agents (AMAs), most work is influenced by either deontological or utilitarian frameworks. It has also been widely acknowledged that these Western “rule-based” ethical theories have encountered both philosophical and computing challenges. To tackle these challenges, this paper explores a non-Western, role-based, Confucian approach to robot ethics. In this paper, we start by providing a short introduction to some theoretical fundamentals of Confucian ethics. Then, we discuss some very preliminary ideas for constructing a Confucian approach to robot ethics. Lastly, we briefly share a couple of empirical studies our research group has recently conducted that …


Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider May 2019

Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The following article compares the temporality of the life-world with the digital processing. The temporality of the life-world is determined to be stretched and spontaneous. The temporality of the digital is given by discrete step-by-step points of time. Most ethical issues can be traced back to a mismatch of these two ways of processing. This creates a foundation for the ethics of the digital processing. Methodologically, phenomenological considerations are merged with media-philosophical considerations in the article.


Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances S. Grodzinsky May 2019

Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances S. Grodzinsky

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In this paper, we examine a cluster of ethical controversies generated by the re-identification of anonymized personal data in the context of big data analytics, with particular attention to the implications for personal privacy. Our paper is organized into two main parts. Part One examines some ethical problems involving re-identification of personally identifiable information (PII) in large data sets. Part Two begins with a brief description of Moor and Weckert’s Dynamic Ethics (DE) and Nissenbaum’s Contextual Integrity (CI) Frameworks. We then investigate whether these frameworks, used together, can provide us with a more robust scheme for analyzing privacy concerns that …


Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie May 2019

Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The evolution of the Internet and AI technology has made it possible for the government and the businesses to keep track of their personal lives. GAFA continues to collect information unintended by the individuals. It is a threat that our privacy is violated in this way. In order to solute such problems, it is important to consider a mechanism that enables us to be peaceful lives while protecting privacy in the Internet society.

This paper focuses on the consumption behavior on the Internet and addresses anonymity. We consider some network protocols that enable sustainable consensus by combining anonymity methods such …


Legal And Technical Issues For Text And Data Mining In Greece, Maria Kanellopoulou - Botti, Marinos Papadopoulos, Christos Zampakolas, Paraskevi Ganatsiou May 2019

Legal And Technical Issues For Text And Data Mining In Greece, Maria Kanellopoulou - Botti, Marinos Papadopoulos, Christos Zampakolas, Paraskevi Ganatsiou

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

Web harvesting and archiving pertains to the processes of collecting from the web and archiving of works that reside on the Web. Web harvesting and archiving is one of the most attractive applications for libraries which plan ahead for their future operation. When works retrieved from the Web are turned into archived and documented material to be found in a library, the amount of works that can be found in said library can be far greater than the number of works harvested from the Web. The proposed participation in the 2019 CEPE Conference aims at presenting certain issues related to …


On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky May 2019

On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In this paper we explore an issue that is different from whether developers are responsible for the direct impact of the software they write. We examine, instead, in what ways, and to what degree, developers are responsible for the way their software is used “downstream.” We review some key scholarship analyzing responsibility in computing ethics, including some recent work by Floridi. We use an adaptation of a mechanism developed by Floridi to argue that there are features of software that can be used as guides to better distinguish situations where a software developer might share in responsibility for the software’s …


A Dual Nanostructured Approach To Sers Amenable To Large-Scale Production, Kory Brian Castro Apr 2019

A Dual Nanostructured Approach To Sers Amenable To Large-Scale Production, Kory Brian Castro

Chemistry & Biochemistry Theses & Dissertations

A SERS device was made using a dual-nanostructured surface comprised of silver nanoparticle and silver nanowires. The ability of each nanostructure to produce a uniform surface was characterized and the surface-enhanced Raman scattering (SERS) response of the resulting surfaces were examined using the reporter molecule 4-aminothiolphenol (ATP) and a 638 nm excitation laser.

A synthetic method was developed to produce silver nanowires with lengths of ~20 μm and diameters of ~100 nm with a narrow size distribution. The method utilized a simple, one-pot synthesis that is amenable to large-scale production. A selective precipitation method was used to the isolate the …


Variable Speed Limit Control At Sag Curves Through Connected Vehicles: Implications Of Alternative Communications And Sensing Technologies, Reza Vatani Nezafat Apr 2019

Variable Speed Limit Control At Sag Curves Through Connected Vehicles: Implications Of Alternative Communications And Sensing Technologies, Reza Vatani Nezafat

Civil & Environmental Engineering Theses & Dissertations

Connected vehicles (CVs) will enable new applications to improve traffic flow. This study’s focus is to investigate how potential implementation of variable speed limit (VSL) through different types of communication and sensing technologies on CVs may improve traffic flow at a sag curve. At sag curves, the gradient changes from negative to positive values which causes a reduction in the roadway capacity and congestion. A VSL algorithm is developed and implemented in a simulation environment for controlling the inflow of vehicles to a sag curve on a freeway to minimize delays and increase throughput. Both vehicle-to-vehicle (V2V) and infrastructure-to-vehicle (I2V) …


Cyber Security- A New Secured Password Generation Algorithm With Graphical Authentication And Alphanumeric Passwords Along With Encryption, Akash Rao Apr 2019

Cyber Security- A New Secured Password Generation Algorithm With Graphical Authentication And Alphanumeric Passwords Along With Encryption, Akash Rao

Electrical & Computer Engineering Theses & Dissertations

Graphical passwords are always considered as an alternative of alphanumeric passwords for their better memorability and usability [1]. Alphanumeric passwords provide an adequate amount of satisfaction, but they do not offer better memorability compared to graphical passwords [1].

On the other hand, graphical passwords are considered less secured and provide better memorability [1]. Therefore many researchers have researched on graphical passwords to overcome the vulnerability. One of the most significant weaknesses of the graphical passwords is "Shoulder Surfing Attack," which means, sneaking into a victim's computer to learn the whole password or part of password or some confidential information. Such …


Quantifying Impact Of Cyber Actions On Missions Or Business Processes: A Multilayer Propagative Approach, Unal Tatar Apr 2019

Quantifying Impact Of Cyber Actions On Missions Or Business Processes: A Multilayer Propagative Approach, Unal Tatar

Engineering Management & Systems Engineering Theses & Dissertations

Ensuring the security of cyberspace is one of the most significant challenges of the modern world because of its complexity. As the cyber environment is getting more integrated with the real world, the direct impact of cybersecurity problems on actual business frequently occur. Therefore, operational and strategic decision makers in particular need to understand the cyber environment and its potential impact on business. Cyber risk has become a top agenda item for businesses all over the world and is listed as one of the most serious global risks with significant financial implications for businesses.

Risk analysis is one of the …