Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Dakota State University (5)
- San Jose State University (2)
- University of Arkansas, Fayetteville (2)
- California Polytechnic State University, San Luis Obispo (1)
- California State University, San Bernardino (1)
-
- Dartmouth College (1)
- Embry-Riddle Aeronautical University (1)
- La Salle University (1)
- Langston University (1)
- Marshall University (1)
- Nova Southeastern University (1)
- Singapore Management University (1)
- The University of Southern Mississippi (1)
- University of New Orleans (1)
- University of Vermont (1)
- Western Michigan University (1)
- Keyword
-
- Cybersecurity (3)
- <p>Drone aircraft.</p> <p>Structural health monitoring.</p> <p>Machine learning -- Research.</p> (1)
- Accounting (1)
- Algorithms (1)
- Anomoly detection (1)
-
- Anonymous messaging (1)
- Arduino Uno Temperature Sensor Project (1)
- CSUSB Master Project (1)
- Client-side monitoring (1)
- Cloud computing (1)
- Computer Science (1)
- Computer Science Master Project (1)
- Computer Science and Engineering Master Project (1)
- Computer science (1)
- Computer vision (1)
- Cyber (1)
- Cyber security (1)
- Cyber threat detection (1)
- Cyberdefense (1)
- Cybereducation (1)
- DNS Tunneling (1)
- DNS-based attacks (1)
- Data Streams (1)
- Data science (1)
- Department of defense (1)
- Drone (1)
- Electronic data interchange (1)
- Entropy (1)
- Extreme value theorem (1)
- FACNET (1)
- Publication Year
- Publication
-
- Masters Theses & Doctoral Dissertations (5)
- Dissertations (2)
- Graduate Theses and Dissertations (2)
- Master's Projects (2)
- CCE Theses and Dissertations (1)
-
- Computer Science and Software Engineering (1)
- Dartmouth College Undergraduate Theses (1)
- Dissertations and Theses Collection (Open Access) (1)
- Doctoral Dissertations and Master's Theses (1)
- Electronic Theses, Projects, and Dissertations (1)
- Graduate College Dissertations and Theses (1)
- HON499 projects (1)
- McCabe Thesis Collection (1)
- Theses, Dissertations and Capstones (1)
- University of New Orleans Theses and Dissertations (1)
Articles 1 - 22 of 22
Full-Text Articles in Databases and Information Systems
Two Project On Information Systems Capabilities And Organizational Performance, Giridhar Reddy Bojja
Two Project On Information Systems Capabilities And Organizational Performance, Giridhar Reddy Bojja
Masters Theses & Doctoral Dissertations
Information systems (IS), as a multi-disciplinary research area, emphasizes the complementary relationship between people, organizations, and technology and has evolved dramatically over the years. IS and the underlying Information Technology (IT) application and research play a crucial role in transforming the business world and research within the management domain. Consistent with this evolution and transformation, I develop a two-project dissertation on Information systems capabilities and organizational outcomes.
Project 1 examines the role of hospital operational effectiveness on the link between information systems capabilities and hospital performance. This project examines the cross-lagged effects on a sample of 217 hospitals measured over …
Counting And Sampling Small Structures In Graph And Hypergraph Data Streams, Themistoklis Haris
Counting And Sampling Small Structures In Graph And Hypergraph Data Streams, Themistoklis Haris
Dartmouth College Undergraduate Theses
In this thesis, we explore the problem of approximating the number of elementary substructures called simplices in large k-uniform hypergraphs. The hypergraphs are assumed to be too large to be stored in memory, so we adopt a data stream model, where the hypergraph is defined by a sequence of hyperedges.
First we propose an algorithm that (ε, δ)-estimates the number of simplices using O(m1+1/k / T) bits of space. In addition, we prove that no constant-pass streaming algorithm can (ε, δ)- approximate the number of simplices using less than O( m 1+1/k / T ) bits of space. Thus …
Using Oracle To Solve Zookeeper On Two-Replica Problems, Ching-Chan Lee
Using Oracle To Solve Zookeeper On Two-Replica Problems, Ching-Chan Lee
Master's Projects
The project introduces an Oracle, a failure detector, in Apache ZooKeeper and makes it fault-tolerant in a two-node system. The project demonstrates the Oracle authorizes the primary process to maintain the liveness when the majority’s rule becomes an obstacle to continue Apache ZooKeeper service. In addition to the property of accuracy and completeness from Chandra et al.’s research, the project proposes the property of see to avoid losing transactions and the property of mutual exclusion to avoid split-brain issues. The hybrid properties render not only more sounder flexibility in the implementation but also stronger guarantees on safety. Thus, the Oracle …
Analysis Of Theoretical And Applied Machine Learning Models For Network Intrusion Detection, Jonah Baron
Analysis Of Theoretical And Applied Machine Learning Models For Network Intrusion Detection, Jonah Baron
Masters Theses & Doctoral Dissertations
Network Intrusion Detection System (IDS) devices play a crucial role in the realm of network security. These systems generate alerts for security analysts by performing signature-based and anomaly-based detection on malicious network traffic. However, there are several challenges when configuring and fine-tuning these IDS devices for high accuracy and precision. Machine learning utilizes a variety of algorithms and unique dataset input to generate models for effective classification. These machine learning techniques can be applied to IDS devices to classify and filter anomalous network traffic. This combination of machine learning and network security provides improved automated network defense by developing highly-optimized …
A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami
A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami
Doctoral Dissertations and Master's Theses
Social engineering attacks (SE-attacks) in enterprises are hastily growing and are becoming increasingly sophisticated. Generally, SE-attacks involve the psychological manipulation of employees into revealing confidential and valuable company data to cybercriminals. The ramifications could bring devastating financial and irreparable reputation loss to the companies. Because SE-attacks involve a human element, preventing these attacks can be tricky and challenging and has become a topic of interest for many researchers and security experts. While methods exist for detecting SE-attacks, our literature review of existing methods identified many crucial factors such as the national cultural, organizational, and personality traits of employees that enable …
Network-Based Detection And Prevention System Against Dns-Based Attacks, Yasir Faraj Mohammed
Network-Based Detection And Prevention System Against Dns-Based Attacks, Yasir Faraj Mohammed
Graduate Theses and Dissertations
Individuals and organizations rely on the Internet as an essential environment for personal or business transactions. However, individuals and organizations have been primary targets for attacks that steal sensitive data. Adversaries can use different approaches to hide their activities inside the compromised network and communicate covertly between the malicious servers and the victims. The domain name system (DNS) protocol is one of these approaches that adversaries use to transfer stolen data outside the organization's network using various forms of DNS tunneling attacks. The main reason for targeting the DNS protocol is because DNS is available in almost every network, ignored, …
Prediction, Recommendation And Group Analytics Models In The Domain Of Mashup Services And Cyber-Argumentation Platform, Md Mahfuzer Rahman
Prediction, Recommendation And Group Analytics Models In The Domain Of Mashup Services And Cyber-Argumentation Platform, Md Mahfuzer Rahman
Graduate Theses and Dissertations
Mashup application development is becoming a widespread software development practice due to its appeal for a shorter application development period. Application developers usually use web APIs from different sources to create a new streamlined service and provide various features to end-users. This kind of practice saves time, ensures reliability, accuracy, and security in the developed applications. Mashup application developers integrate these available APIs into their applications. Still, they have to go through thousands of available web APIs and chose only a few appropriate ones for their application. Recommending relevant web APIs might help application developers in this situation. However, very …
Analysis Of System Performance Metrics Towards The Detection Of Cryptojacking In Iot Devices, Richard Matthews
Analysis Of System Performance Metrics Towards The Detection Of Cryptojacking In Iot Devices, Richard Matthews
Masters Theses & Doctoral Dissertations
This single-case mechanism study examined the effects of cryptojacking on Internet of Things (IoT) device performance metrics. Cryptojacking is a cyber-threat that involves stealing the computational resources of devices belonging to others to generate cryptocurrencies. The resources primarily include the processing cycles of devices and the additional electricity needed to power this additional load. The literature surveyed showed that cryptojacking has been gaining in popularity and is now one of the top cyberthreats. Cryptocurrencies offer anyone more freedom and anonymity than dealing with traditional financial institutions which make them especially attractive to cybercriminals. Other reasons for the increasing popularity of …
Towards Identity Relationship Management For Internet Of Things, Mohammad Muntasir Nur
Towards Identity Relationship Management For Internet Of Things, Mohammad Muntasir Nur
Masters Theses & Doctoral Dissertations
Identity and Access Management (IAM) is in the core of any information systems. Traditional IAM systems manage users, applications, and devices within organizational boundaries, and utilize static intelligence for authentication and access control. Identity federation has helped a lot to deal with boundary limitation, but still limited to static intelligence – users, applications and devices must be under known boundaries. However, today’s IAM requirements are much more complex. Boundaries between enterprise and consumer space, on premises and cloud, personal devices and organization owned devices, and home, work and public places are fading away. These challenges get more complicated for Internet …
Network Traffic Analysis Framework For Cyber Threat Detection, Meshesha K. Cherie
Network Traffic Analysis Framework For Cyber Threat Detection, Meshesha K. Cherie
Masters Theses & Doctoral Dissertations
The growing sophistication of attacks and newly emerging cyber threats requires advanced cyber threat detection systems. Although there are several cyber threat detection tools in use, cyber threats and data breaches continue to rise. This research is intended to improve the cyber threat detection approach by developing a cyber threat detection framework using two complementary technologies, search engine and machine learning, combining artificial intelligence and classical technologies.
In this design science research, several artifacts such as a custom search engine library, a machine learning-based engine and different algorithms have been developed to build a new cyber threat detection framework based …
A Systematic Literature Survey Of Unmanned Aerial Vehicle Based Structural Health Monitoring, Sreehari Sreenath
A Systematic Literature Survey Of Unmanned Aerial Vehicle Based Structural Health Monitoring, Sreehari Sreenath
Theses, Dissertations and Capstones
Unmanned Aerial Vehicles (UAVs) are being employed in a multitude of civil applications owing to their ease of use, low maintenance, affordability, high-mobility, and ability to hover. UAVs are being utilized for real-time monitoring of road traffic, providing wireless coverage, remote sensing, search and rescue operations, delivery of goods, security and surveillance, precision agriculture, and civil infrastructure inspection. They are the next big revolution in technology and civil infrastructure, and it is expected to dominate more than $45 billion market value. The thesis surveys the UAV assisted Structural Health Monitoring or SHM literature over the last decade and categorize UAVs …
Predictive Analysis For Cloud Infrastructure Metrics, Paridhi Agrawal
Predictive Analysis For Cloud Infrastructure Metrics, Paridhi Agrawal
Master's Projects
In a cloud computing environment, enterprises have the flexibility to request resources according to their application demands. This elastic feature of cloud computing makes it an attractive option for enterprises to host their applications on the cloud. Cloud providers usually exploit this elasticity by auto-scaling the application resources for quality assurance. However, there is a setup-time delay that may take minutes between the demand for a new resource and it being prepared for utilization. This causes the static resource provisioning techniques, which request allocation of a new resource only when the application breaches a specific threshold, to be slow and …
Deaddrop: Message Passing Without Metadata Leakage, Davis Mike Arndt
Deaddrop: Message Passing Without Metadata Leakage, Davis Mike Arndt
Computer Science and Software Engineering
Even when network data is encrypted, observers can make inferences about content based on collected metadata. DeadDrop is an exploratory API designed to protect the metadata of a conversation from both outside observers and the facilitating server. To do so, DeadDrop servers are passed no recipient address, instead relying upon the recipient to check for messages of their own volition. In addition, the recipient downloads a copy of every encrypted message on the server to prevent even the server from knowing to whom each message is intended. To these purposes, DeadDrop is mostly successful. However, it does not obscure all …
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
HON499 projects
The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information includes …
Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad
Secure And Reliable Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad
Dissertations
Abstract
Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical …
A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio
A Web-Based Temperature Monitoring System For The College Of Arts And Letters, Rigoberto Solorio
Electronic Theses, Projects, and Dissertations
In general, server rooms have restricted access requiring that staff possess access codes, keys, etc. Normally, only administrators are provided access to protect the physical hardware and the data stored in the servers. Servers also have firewalls to restrict outsiders from accessing them via the Internet. Servers also cost a lot of money. For this reason, server rooms also need to be protected against overheating. This will prolong the lifecycle of the units and can prevent data loss from hardware failure.
The California State University San Bernardino (CSUSB), Specifically the College of Arts and Letters server room has faced power …
Use Of Entropy For Feature Selection With Intrusion Detection System Parameters, Frank Acker
Use Of Entropy For Feature Selection With Intrusion Detection System Parameters, Frank Acker
CCE Theses and Dissertations
The metric of entropy provides a measure about the randomness of data and a measure of information gained by comparing different attributes. Intrusion detection systems can collect very large amounts of data, which are not necessarily manageable by manual means. Collected intrusion detection data often contains redundant, duplicate, and irrelevant entries, which makes analysis computationally intensive likely leading to unreliable results. Reducing the data to what is relevant and pertinent to the analysis requires the use of data mining techniques and statistics. Identifying patterns in the data is part of analysis for intrusion detections in which the patterns are categorized …
Multi-Cost And Upgradable Spatial Network Databases, Yimin Lin
Multi-Cost And Upgradable Spatial Network Databases, Yimin Lin
Dissertations and Theses Collection (Open Access)
In this dissertation, we first consider data processing problems in multi-cost networks and in upgradable networks. These network types are motivated by real-life situations, which do not fall under the standard spatial network formulation and have not received much attention from database researchers. In a multi-cost network (MCN), each edge is associated with more than one weight type that may affect the user-specific perception of distance. We study two query types on MCNs, namely, the MCN skyline and the MCN top-k query. In an upgradable network, a subset of the edges are amenable to weight reduction, at a cost (e.g., …
An Exploratory Analysis Of Twitter Keyword-Hashtag Networks And Knowledge Discovery Applications, Ahmed A. Hamed
An Exploratory Analysis Of Twitter Keyword-Hashtag Networks And Knowledge Discovery Applications, Ahmed A. Hamed
Graduate College Dissertations and Theses
The emergence of social media has impacted the way people think, communicate, behave, learn, and conduct research. In recent years, a large number of studies have analyzed and modeled this social phenomena. Driven by commercial and social interests, social media has become an attractive subject for researchers. Accordingly, new models, algorithms, and applications to address specific domains and solve distinct problems have erupted. In this thesis, we propose a novel network model and a path mining algorithm called HashnetMiner to discover implicit knowledge that is not easily exposed using other network models. Our experiments using HashnetMiner have demonstrated anecdotal evidence …
Client-Based Qos Monitoring And Evaluation Architecture For Network Infrastructure And Services, Ammar Mohammed Kamel
Client-Based Qos Monitoring And Evaluation Architecture For Network Infrastructure And Services, Ammar Mohammed Kamel
Dissertations
Providing an efficient Quality-of-Service (QoS) measurement model is a challenging problem in today’s mobile computing and telecommunications networks. Currently, most of QoS techniques utilize service measurements that are collected by the network elements (i.e., network-side monitoring) to evaluate the network performance. However, this process does not take into account the service performance from the clients' perspective and might contradict with the Service Level Agreement (SLA). In order to overcome the limitations of service-side QoS monitoring, a number of research studies have been conducted to present alternative architectures and algorithms for client-side QoS service assessment in computer networks. The client-side QoS …
Reaper – Toward Automating Mobile Cloud Communication, Daniel R. Ward
Reaper – Toward Automating Mobile Cloud Communication, Daniel R. Ward
University of New Orleans Theses and Dissertations
Mobile devices connected to cloud based services are becoming a mainstream method of delivery up-to-date and context aware information to users. Connecting mobile applications to cloud service require significant developer effort. Yet this communication code usually follows certain patterns, varying accordingly to the specific type of data sent and received from the server. By analyzing the causes of theses variations, we can create a system that can automate the code creation for communication from a mobile device to a cloud server. To automate code creation, a general pattern must extracted. This general solution can then be applied to any database …
Impact Of The Adoption Of New Technology (Facnet) On A Minority-Owned Small Business In Colorado, Tamara L. James
Impact Of The Adoption Of New Technology (Facnet) On A Minority-Owned Small Business In Colorado, Tamara L. James
McCabe Thesis Collection
FACNET is a computer network that moves Electronic Data Interchange (EDI) from the Department of Defense (DoD) and federal buying sites to and from the certified Value Added Network (VAN).
This study is conducted to answer the following questions about the use FACNET by XYZ Communications:
1) Has FACNET helped reduce the cost of paper used in the business?
2) Has FACNET helped reduce the cost of long distance calls (telephone and fax) in the business?
3) Has FACNET helped reduce the cost of traveling expenses (hotel and transportation) in the business?
4)Has FACNET helped the business to conduct in …