Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

OS and Networks

Theses/Dissertations

Institution
Keyword
Publication Year
Publication

Articles 1 - 22 of 22

Full-Text Articles in Databases and Information Systems

Two Project On Information Systems Capabilities And Organizational Performance, Giridhar Reddy Bojja May 2022

Two Project On Information Systems Capabilities And Organizational Performance, Giridhar Reddy Bojja

Masters Theses & Doctoral Dissertations

Information systems (IS), as a multi-disciplinary research area, emphasizes the complementary relationship between people, organizations, and technology and has evolved dramatically over the years. IS and the underlying Information Technology (IT) application and research play a crucial role in transforming the business world and research within the management domain. Consistent with this evolution and transformation, I develop a two-project dissertation on Information systems capabilities and organizational outcomes.

Project 1 examines the role of hospital operational effectiveness on the link between information systems capabilities and hospital performance. This project examines the cross-lagged effects on a sample of 217 hospitals measured over …


Counting And Sampling Small Structures In Graph And Hypergraph Data Streams, Themistoklis Haris Jun 2021

Counting And Sampling Small Structures In Graph And Hypergraph Data Streams, Themistoklis Haris

Dartmouth College Undergraduate Theses

In this thesis, we explore the problem of approximating the number of elementary substructures called simplices in large k-uniform hypergraphs. The hypergraphs are assumed to be too large to be stored in memory, so we adopt a data stream model, where the hypergraph is defined by a sequence of hyperedges.

First we propose an algorithm that (ε, δ)-estimates the number of simplices using O(m1+1/k / T) bits of space. In addition, we prove that no constant-pass streaming algorithm can (ε, δ)- approximate the number of simplices using less than O( m 1+1/k / T ) bits of space. Thus …


Using Oracle To Solve Zookeeper On Two-Replica Problems, Ching-Chan Lee May 2021

Using Oracle To Solve Zookeeper On Two-Replica Problems, Ching-Chan Lee

Master's Projects

The project introduces an Oracle, a failure detector, in Apache ZooKeeper and makes it fault-tolerant in a two-node system. The project demonstrates the Oracle authorizes the primary process to maintain the liveness when the majority’s rule becomes an obstacle to continue Apache ZooKeeper service. In addition to the property of accuracy and completeness from Chandra et al.’s research, the project proposes the property of see to avoid losing transactions and the property of mutual exclusion to avoid split-brain issues. The hybrid properties render not only more sounder flexibility in the implementation but also stronger guarantees on safety. Thus, the Oracle …


Analysis Of Theoretical And Applied Machine Learning Models For Network Intrusion Detection, Jonah Baron May 2021

Analysis Of Theoretical And Applied Machine Learning Models For Network Intrusion Detection, Jonah Baron

Masters Theses & Doctoral Dissertations

Network Intrusion Detection System (IDS) devices play a crucial role in the realm of network security. These systems generate alerts for security analysts by performing signature-based and anomaly-based detection on malicious network traffic. However, there are several challenges when configuring and fine-tuning these IDS devices for high accuracy and precision. Machine learning utilizes a variety of algorithms and unique dataset input to generate models for effective classification. These machine learning techniques can be applied to IDS devices to classify and filter anomalous network traffic. This combination of machine learning and network security provides improved automated network defense by developing highly-optimized …


A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami May 2021

A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami

Doctoral Dissertations and Master's Theses

Social engineering attacks (SE-attacks) in enterprises are hastily growing and are becoming increasingly sophisticated. Generally, SE-attacks involve the psychological manipulation of employees into revealing confidential and valuable company data to cybercriminals. The ramifications could bring devastating financial and irreparable reputation loss to the companies. Because SE-attacks involve a human element, preventing these attacks can be tricky and challenging and has become a topic of interest for many researchers and security experts. While methods exist for detecting SE-attacks, our literature review of existing methods identified many crucial factors such as the national cultural, organizational, and personality traits of employees that enable …


Network-Based Detection And Prevention System Against Dns-Based Attacks, Yasir Faraj Mohammed May 2021

Network-Based Detection And Prevention System Against Dns-Based Attacks, Yasir Faraj Mohammed

Graduate Theses and Dissertations

Individuals and organizations rely on the Internet as an essential environment for personal or business transactions. However, individuals and organizations have been primary targets for attacks that steal sensitive data. Adversaries can use different approaches to hide their activities inside the compromised network and communicate covertly between the malicious servers and the victims. The domain name system (DNS) protocol is one of these approaches that adversaries use to transfer stolen data outside the organization's network using various forms of DNS tunneling attacks. The main reason for targeting the DNS protocol is because DNS is available in almost every network, ignored, …


Prediction, Recommendation And Group Analytics Models In The Domain Of Mashup Services And Cyber-Argumentation Platform, Md Mahfuzer Rahman May 2021

Prediction, Recommendation And Group Analytics Models In The Domain Of Mashup Services And Cyber-Argumentation Platform, Md Mahfuzer Rahman

Graduate Theses and Dissertations

Mashup application development is becoming a widespread software development practice due to its appeal for a shorter application development period. Application developers usually use web APIs from different sources to create a new streamlined service and provide various features to end-users. This kind of practice saves time, ensures reliability, accuracy, and security in the developed applications. Mashup application developers integrate these available APIs into their applications. Still, they have to go through thousands of available web APIs and chose only a few appropriate ones for their application. Recommending relevant web APIs might help application developers in this situation. However, very …


Analysis Of System Performance Metrics Towards The Detection Of Cryptojacking In Iot Devices, Richard Matthews Mar 2021

Analysis Of System Performance Metrics Towards The Detection Of Cryptojacking In Iot Devices, Richard Matthews

Masters Theses & Doctoral Dissertations

This single-case mechanism study examined the effects of cryptojacking on Internet of Things (IoT) device performance metrics. Cryptojacking is a cyber-threat that involves stealing the computational resources of devices belonging to others to generate cryptocurrencies. The resources primarily include the processing cycles of devices and the additional electricity needed to power this additional load. The literature surveyed showed that cryptojacking has been gaining in popularity and is now one of the top cyberthreats. Cryptocurrencies offer anyone more freedom and anonymity than dealing with traditional financial institutions which make them especially attractive to cybercriminals. Other reasons for the increasing popularity of …


Towards Identity Relationship Management For Internet Of Things, Mohammad Muntasir Nur Mar 2021

Towards Identity Relationship Management For Internet Of Things, Mohammad Muntasir Nur

Masters Theses & Doctoral Dissertations

Identity and Access Management (IAM) is in the core of any information systems. Traditional IAM systems manage users, applications, and devices within organizational boundaries, and utilize static intelligence for authentication and access control. Identity federation has helped a lot to deal with boundary limitation, but still limited to static intelligence – users, applications and devices must be under known boundaries. However, today’s IAM requirements are much more complex. Boundaries between enterprise and consumer space, on premises and cloud, personal devices and organization owned devices, and home, work and public places are fading away. These challenges get more complicated for Internet …


Network Traffic Analysis Framework For Cyber Threat Detection, Meshesha K. Cherie Mar 2020

Network Traffic Analysis Framework For Cyber Threat Detection, Meshesha K. Cherie

Masters Theses & Doctoral Dissertations

The growing sophistication of attacks and newly emerging cyber threats requires advanced cyber threat detection systems. Although there are several cyber threat detection tools in use, cyber threats and data breaches continue to rise. This research is intended to improve the cyber threat detection approach by developing a cyber threat detection framework using two complementary technologies, search engine and machine learning, combining artificial intelligence and classical technologies.

In this design science research, several artifacts such as a custom search engine library, a machine learning-based engine and different algorithms have been developed to build a new cyber threat detection framework based …


A Systematic Literature Survey Of Unmanned Aerial Vehicle Based Structural Health Monitoring, Sreehari Sreenath Jan 2020

A Systematic Literature Survey Of Unmanned Aerial Vehicle Based Structural Health Monitoring, Sreehari Sreenath

Theses, Dissertations and Capstones

Unmanned Aerial Vehicles (UAVs) are being employed in a multitude of civil applications owing to their ease of use, low maintenance, affordability, high-mobility, and ability to hover. UAVs are being utilized for real-time monitoring of road traffic, providing wireless coverage, remote sensing, search and rescue operations, delivery of goods, security and surveillance, precision agriculture, and civil infrastructure inspection. They are the next big revolution in technology and civil infrastructure, and it is expected to dominate more than $45 billion market value. The thesis surveys the UAV assisted Structural Health Monitoring or SHM literature over the last decade and categorize UAVs …


Predictive Analysis For Cloud Infrastructure Metrics, Paridhi Agrawal May 2019

Predictive Analysis For Cloud Infrastructure Metrics, Paridhi Agrawal

Master's Projects

In a cloud computing environment, enterprises have the flexibility to request resources according to their application demands. This elastic feature of cloud computing makes it an attractive option for enterprises to host their applications on the cloud. Cloud providers usually exploit this elasticity by auto-scaling the application resources for quality assurance. However, there is a setup-time delay that may take minutes between the demand for a new resource and it being prepared for utilization. This causes the static resource provisioning techniques, which request allocation of a new resource only when the application breaches a specific threshold, to be slow and …


Deaddrop: Message Passing Without Metadata Leakage, Davis Mike Arndt Jun 2018

Deaddrop: Message Passing Without Metadata Leakage, Davis Mike Arndt

Computer Science and Software Engineering

Even when network data is encrypted, observers can make inferences about content based on collected metadata. DeadDrop is an exploratory API designed to protect the metadata of a conversation from both outside observers and the facilitating server. To do so, DeadDrop servers are passed no recipient address, instead relying upon the recipient to check for messages of their own volition. In addition, the recipient downloads a copy of every encrypted message on the server to prevent even the server from knowing to whom each message is intended. To these purposes, DeadDrop is mostly successful. However, it does not obscure all …


Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly Nov 2016

Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly

HON499 projects

The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information includes …


Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad May 2015

Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad

Dissertations

Abstract

Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical …


A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio Mar 2015

A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio

Electronic Theses, Projects, and Dissertations

In general, server rooms have restricted access requiring that staff possess access codes, keys, etc. Normally, only administrators are provided access to protect the physical hardware and the data stored in the servers. Servers also have firewalls to restrict outsiders from accessing them via the Internet. Servers also cost a lot of money. For this reason, server rooms also need to be protected against overheating. This will prolong the lifecycle of the units and can prevent data loss from hardware failure.

The California State University San Bernardino (CSUSB), Specifically the College of Arts and Letters server room has faced power …


Use Of Entropy For Feature Selection With Intrusion Detection System Parameters, Frank Acker Jan 2015

Use Of Entropy For Feature Selection With Intrusion Detection System Parameters, Frank Acker

CCE Theses and Dissertations

The metric of entropy provides a measure about the randomness of data and a measure of information gained by comparing different attributes. Intrusion detection systems can collect very large amounts of data, which are not necessarily manageable by manual means. Collected intrusion detection data often contains redundant, duplicate, and irrelevant entries, which makes analysis computationally intensive likely leading to unreliable results. Reducing the data to what is relevant and pertinent to the analysis requires the use of data mining techniques and statistics. Identifying patterns in the data is part of analysis for intrusion detections in which the patterns are categorized …


Multi-Cost And Upgradable Spatial Network Databases, Yimin Lin Jul 2014

Multi-Cost And Upgradable Spatial Network Databases, Yimin Lin

Dissertations and Theses Collection (Open Access)

In this dissertation, we first consider data processing problems in multi-cost networks and in upgradable networks. These network types are motivated by real-life situations, which do not fall under the standard spatial network formulation and have not received much attention from database researchers. In a multi-cost network (MCN), each edge is associated with more than one weight type that may affect the user-specific perception of distance. We study two query types on MCNs, namely, the MCN skyline and the MCN top-k query. In an upgradable network, a subset of the edges are amenable to weight reduction, at a cost (e.g., …


An Exploratory Analysis Of Twitter Keyword-Hashtag Networks And Knowledge Discovery Applications, Ahmed A. Hamed Jan 2014

An Exploratory Analysis Of Twitter Keyword-Hashtag Networks And Knowledge Discovery Applications, Ahmed A. Hamed

Graduate College Dissertations and Theses

The emergence of social media has impacted the way people think, communicate, behave, learn, and conduct research. In recent years, a large number of studies have analyzed and modeled this social phenomena. Driven by commercial and social interests, social media has become an attractive subject for researchers. Accordingly, new models, algorithms, and applications to address specific domains and solve distinct problems have erupted. In this thesis, we propose a novel network model and a path mining algorithm called HashnetMiner to discover implicit knowledge that is not easily exposed using other network models. Our experiments using HashnetMiner have demonstrated anecdotal evidence …


Client-Based Qos Monitoring And Evaluation Architecture For Network Infrastructure And Services, Ammar Mohammed Kamel Dec 2013

Client-Based Qos Monitoring And Evaluation Architecture For Network Infrastructure And Services, Ammar Mohammed Kamel

Dissertations

Providing an efficient Quality-of-Service (QoS) measurement model is a challenging problem in today’s mobile computing and telecommunications networks. Currently, most of QoS techniques utilize service measurements that are collected by the network elements (i.e., network-side monitoring) to evaluate the network performance. However, this process does not take into account the service performance from the clients' perspective and might contradict with the Service Level Agreement (SLA). In order to overcome the limitations of service-side QoS monitoring, a number of research studies have been conducted to present alternative architectures and algorithms for client-side QoS service assessment in computer networks. The client-side QoS …


Reaper – Toward Automating Mobile Cloud Communication, Daniel R. Ward Aug 2013

Reaper – Toward Automating Mobile Cloud Communication, Daniel R. Ward

University of New Orleans Theses and Dissertations

Mobile devices connected to cloud based services are becoming a mainstream method of delivery up-to-date and context aware information to users. Connecting mobile applications to cloud service require significant developer effort. Yet this communication code usually follows certain patterns, varying accordingly to the specific type of data sent and received from the server. By analyzing the causes of theses variations, we can create a system that can automate the code creation for communication from a mobile device to a cloud server. To automate code creation, a general pattern must extracted. This general solution can then be applied to any database …


Impact Of The Adoption Of New Technology (Facnet) On A Minority-Owned Small Business In Colorado, Tamara L. James May 1997

Impact Of The Adoption Of New Technology (Facnet) On A Minority-Owned Small Business In Colorado, Tamara L. James

McCabe Thesis Collection

FACNET is a computer network that moves Electronic Data Interchange (EDI) from the Department of Defense (DoD) and federal buying sites to and from the certified Value Added Network (VAN).

This study is conducted to answer the following questions about the use FACNET by XYZ Communications:

1) Has FACNET helped reduce the cost of paper used in the business?

2) Has FACNET helped reduce the cost of long distance calls (telephone and fax) in the business?

3) Has FACNET helped reduce the cost of traveling expenses (hotel and transportation) in the business?

4)Has FACNET helped the business to conduct in …