Businesses and organizations such as retail stores, airports, and hospitals have begun to leverage the recent advances in localization technology to provide quality location-based services to their customers. Beacons are one example of this techno...
Smart grid is the modernization of the legacy electric power system in which cyber computing and communications are integrated with the physical world of power systems. A smart grid provides efficient and cost-effective management of the grid by a...
In recent years, we have witnessed a rise in quantity and sophistication of cyber attacks. Meanwhile, traditional defense techniques have not been adequate in addressing this status quo. This is because the focus has remained mostly on either iden...
Third-party mobile applications have become an essential component of modernecosystems such as Android and iOS. The number of these applications has growntremendously in recent years, for instance, the number of Android applications inthe market i...
JONATHAN WAGNER. Integrating Random Linear Code Based Encryption Scheme Rlce Algorithm Into Post-quantum Openssl. (Under the direction of DR. YONGGE WANG)This thesis discusses how the post-quantum encryption algorithm Random LinearCode-based Encry...
Security problems are both a large and growing concern today. Many security breaches are the result of security vulnerabilities introduced during the code construction phase. These vulnerabilities sometimes occur due to poor security training of t...
High-dimensional data becomes common in application areas such as environmental studies and healthcare. The high dimensionality presents opportunities for understanding how certain outcomes happen by identifying significant variables contributing ...