Search results
-
-
Title
-
Access Control Design and Implementation for Direct Memory Access Attack
-
Author
-
Hughes, Marcus
-
Date Created
-
2021
-
Subjects--Topical
-
Electrical engineering
-
Description
-
With technology advancements and becoming prevalent in everyday lives, the need for robust and comprehensive security measures is growing. To defend against brute force type of attacks, encryption algorithms have been used to keep user information...
-
-
Title
-
Assured Information Sharing for Ad-hoc Collaboration
-
Author
-
Jin, Jing
-
Date Created
-
2009
-
Subjects--Topical
-
Computer engineering, Information technology
-
Description
-
Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping wi...
-
-
Title
-
Essays on Exploitation and Exploration in Software Development
-
Author
-
Temizkan, Orcun
-
Date Created
-
2012
-
Subjects--Topical
-
Information technology, Business, Information science
-
Description
-
Software development includes two types of activities: software improvement activities by correcting faults and software enhancement activities by adding new features. Based on organizational theory, we propose that these activities can be classif...
-
-
Title
-
Formal Techniques for Cyber Resilience: Modeling, Synthesis, and Verification
-
Author
-
Alsaleh, Mohammed Noraden
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
As cyber vulnerability and complexity increases, cyber attacks become highly sophisticated and inevitable. Therefore, cyber resilience is necessary to make cyber capable of misleading attackers in reaching their goals, resisting their progress, an...
-
-
Title
-
SECURING MOBILE HYBRID APPLICATIONS THROUGH CONFIGURATIONS - FIRST LINE OF DEFENSE
-
Author
-
AlJarrah, Abeer
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
Mobile hybrid apps have the potential to dominate the mobile and IoTs apps market. Cross-platform or hybrid apps are providing a promising development choice that appeals to a great body of developers. This development approach \wraps" standard we...
-
-
Title
-
Secure Key Updates for Dynamically Reconfigurable Logic Locked Designs
-
Author
-
Williams, Gregory
-
Date Created
-
2022
-
Subjects--Topical
-
Computer engineering
-
Description
-
Due to globalization and the shift to the horizontal business model, there areemerging security concerns in the semiconductor industry including FPGAs. Mod- ern FPGAs are system on a chip platforms that integrates a processing system with programm...
-
-
Title
-
Secure RISCV Design for Side-Channel Evaluation Platform
-
Author
-
Thakar, Bhavin
-
Date Created
-
2021
-
Subjects--Topical
-
Electrical engineering
-
Description
-
In the era of smart technology, IoT technology has been an integral part of the system. IoT systems are susceptible to many type of attacks such as buffer overflow attack and execution flow attacks. Information flow tracking is a technique to moni...
-
-
Title
-
Secure RISCV Design for Side-Channel Evaluation Platform
-
Author
-
Thakar, Bhavin
-
Date Created
-
2021
-
Subjects--Topical
-
Electrical engineering
-
Description
-
In the era of smart technology, IoT technology has been an integral part of the system. IoT systems are susceptible to many type of attacks such as buffer overflow attack and execution flow attacks. Information flow tracking is a technique to moni...
-
-
Title
-
Security Improvement in Cloud Computing Environment through Memory Analysis
-
Author
-
Xie, Xiongwei
-
Date Created
-
2017
-
Subjects--Topical
-
Computer science
-
Description
-
Cloud computing has attracted a lot of research efforts in recent years.More and more companies start to move their data and operations to cloud computing environment. However, the security issues in cloud computing environment have not been studi...