Search results
-
-
Title
-
A Holistic Approach to Securing Memory Error Vulnerabilities in IoT Firmware
-
Author
-
Obaidat, Islam
-
Date Created
-
2023
-
Subjects--Topical
-
Computer science
-
Description
-
A staggering number of Internet-of-Things (IoT) devices harbor intrinsic security vulnerabilities within their firmware. Memory errors especially predominate as a potent category among these vulnerabilities. Memory errors not only permit remote at...
-
-
Title
-
A LANGUAGE-BASED APPROACH FOR SECURING ACTIONSCRIPT/FLASH VULNERABILITIES
-
Author
-
Yilmaz, Fadi
-
Date Created
-
2020
-
Subjects--Topical
-
Computer science
-
Description
-
Web technologies enable web users to share files, images, audios, videos with each other worldwide. The accessibility provided by the web lures web pirates to perform unauthorized, malicious activities in victim machines remotely by exploiting des...
-
-
Title
-
AUTOMATIC UNIT TESTING TO DETECT SECURITY VULNERABILITIES IN WEB APPLICATIONS
-
Author
-
Mohammadi, Mahmoud
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
Web applications consume data from different inputs. Some of these inputs originate from untrusted sources, such as user inputs which will be rendered in browsers or browser-based applications such as mobile apps. Many applications with these func...
-
-
Title
-
Active Cyber Defense Planning and Orchestration
-
Author
-
Islam, Md Mazharul
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
The overwhelming number of recent data breaches reported that hundreds of terabytes of highly sensitive information, including national, financial, and personal, have been stolen from different organizations, indicating a clear asymmetric disadvan...
-
-
Title
-
Art Authentication in an Untagged Art Database
-
Author
-
Dobbs, Bryan
-
Date Created
-
2022
-
Subjects--Topical
-
Computer science, Art--Historiography, Mathematics
-
Description
-
The identification of the artist of a painting is also known as art authentication, and the answer to this question is manifest through art gallery exhibition and is reinforced through financial transactions. Art authentication has visual influenc...
-
-
Title
-
Automated Classification and Mitigation of Cybersecurity Vulnerabilities
-
Author
-
Aghaei, Ehsan
-
Date Created
-
2022
-
Subjects--Topical
-
Computer science
-
Description
-
With the widespread use of computers and networks today, cybersecurity has emerged as a crucial concern for many businesses as they fight with growing cyber threats by vulnerability exploitation. To identify and mitigate zero-day or unpatched vuln...
-
-
Title
-
Autonomous Cyber Defense: Formal Models and Applications
-
Author
-
Dutta, Ashutosh
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science, Information science, Information technology
-
Description
-
With technological advancements, cyber attacks are highly automated and organized with asymmetric advantages over defenders regarding cost and efforts.Attackers employ sophisticated and diversified approaches to achieve attack objectives while bei...
-
-
Title
-
Aviatar- An Augmented Reality System to Improve Pilot Performance for Unmanned Aerial Systems
-
Author
-
Abbott, Robert
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science, Aerospace engineering, Cognitive psychology
-
Description
-
In the modern airspace, small unmanned aircraft systems (UAS) such as drones are becoming increasingly popular with both amateur enthusiasts as well as professional pilots. In the three years following the initiation of the small drone registratio...
-
-
Title
-
BIO-INSPIRED CYBER SECURITY AND THREAT ANALYTICS
-
Author
-
Rauf, Usman
-
Date Created
-
2020
-
Subjects--Topical
-
Computer science, Information science
-
Description
-
After decades of deploying cyber-security systems, it is a well-known fact that theexisting cyber infrastructure has numerous inherent limitations that not only makethe maintenance of the current network security devices difficult but also provide...
-
-
Title
-
Behavioral Health Stigma: Breaking the code with Stigma Index
-
Author
-
Tokmic, Farah
-
Date Created
-
2018
-
Subjects--Topical
-
Medical sciences, Information science
-
Description
-
Social labeling of people with behavioral health disorders falls under the umbrella of "stigma" and plays a key role in limiting the access to behavioral healthcare. Currently, the U.S. spends an estimated $201B on behavioral health disorders ever...
-
-
Title
-
Building an Efficient and Scalable Learning System on Heterogeneous Cluster
-
Author
-
Yang, Donglin
-
Date Created
-
2022
-
Subjects--Topical
-
Computer science
-
Description
-
Deep Learning (DL) has been widely applied in both academia and industry. System innovations can continue to squeeze more efficiency out of modern hardware. Existing systems such as TensorFlow, MXNet, and PyTorch have emerged to assist researchers...