Search results
-
-
Title
-
Advances in Modern Botnet Understanding and the Accurate Enumeration of Infected Hosts
-
Author
-
Nunnery, Christopher
-
Date Created
-
2011
-
Subjects--Topical
-
Information technology, Information science
-
Description
-
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to ...
-
-
Title
-
Assured Information Sharing for Ad-hoc Collaboration
-
Author
-
Jin, Jing
-
Date Created
-
2009
-
Subjects--Topical
-
Computer engineering, Information technology
-
Description
-
Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping wi...
-
-
Title
-
Behavioral Health Stigma: Breaking the code with Stigma Index
-
Author
-
Tokmic, Farah
-
Date Created
-
2018
-
Subjects--Topical
-
Medical sciences, Information science
-
Description
-
Social labeling of people with behavioral health disorders falls under the umbrella of "stigma" and plays a key role in limiting the access to behavioral healthcare. Currently, the U.S. spends an estimated $201B on behavioral health disorders ever...
-
-
Title
-
CONFIGURATION OF APPLICATION PERMISSIONS WITH CONTEXTUAL ACCESS CONTROL
-
Author
-
Besmer, Andrew
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Users are burdened with the task of configuring access control policies on many different application platforms used by mobile devices and social network sites. Many of these platforms employ access control mechanisms to configure application perm...
-
-
Title
-
Communities of Purpose
-
Author
-
Stukes, Felesia
-
Date Created
-
2016
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Communities of Purpose are commonly known to enact their purposes through social movements, grassroots efforts, semi-formal groups, and through organizations in the voluntary sector. They carry out charitable missions and goals and are often commi...
-
-
Title
-
Deep Learning for Sentiment and Emotion Detection in Multilingual Contexts
-
Author
-
Abdullah, Malak
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
Social media is growing as a communication medium where people can express online their feelings and opinions on a variety of topics in ways they rarely do in person. Detecting sentiments and emotions in texts have gained a considerable amount of ...
-
-
Title
-
Development of a multi-layered botmaster based analysis framework
-
Author
-
Paxton, Napoleon
-
Date Created
-
2011
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Botnets are networks of compromised machines called bots that come together to form the tool of choice for hackers in the exploitation and destruction of computer networks. Most malicious botnets have the ability to be rented out to a broad range ...
-
-
Title
-
ESIDE: The integration of secure programming education into the IDE
-
Author
-
Whitney, Michael
-
Date Created
-
2015
-
Subjects--Topical
-
Computer science
-
Description
-
Securing the world's technological resources has become one of the largest challenges of modern day. From healthcare to national security, power grids to public safety, the world is reliant on computer systems and their ability to perform in a saf...
-
-
Title
-
Healthy vs Unhealthy: Food Related Tweets and Image Classification
-
Author
-
Oduru, Tejaswini
-
Date Created
-
2020
-
Subjects--Topical
-
Information technology
-
Description
-
Many studies have proved that the rise in obesity among the world population is due to an increase in calorie intake coupled with a lack of adequate physical activity. Food is an essential part of everyday life and has significant effects on our h...
-
-
Title
-
INTERACTION SUPPORT FOR INFORMATION FINDING AND COMPARATIVE ANALYSIS IN ONLINE VIDEO
-
Author
-
Xia, Jinyue
-
Date Created
-
2017
-
Subjects--Topical
-
Information technology
-
Description
-
Current online video interaction is typically designed with a focus on straightforward distribution and passive consumption of individual videos. This "click play, sit back and watch" context is typical of videos for entertainment. However, there ...
-
-
Title
-
Interactive Static Analysis for Application Security
-
Author
-
Zhu, Jun
-
Date Created
-
2015
-
Subjects--Topical
-
Computer science
-
Description
-
Software vulnerabilities have become increasingly pervasive and result in severe data and financial loss to organizations and individuals. One leading source of software vulnerabilities is the insecure code written by developers. Although vulnerab...
-
-
Title
-
Reasoning about recognizability in security protocols
-
Author
-
Li, Zhiwei
-
Date Created
-
2012
-
Subjects--Topical
-
Computer science
-
Description
-
Although verifying a message has long been recognized as an important concept, which has been used explicitly or implicitly in security protocol analysis, there is no consensus on its exact meaning. Such a lack of formal treatment of the concept m...
-
-
Title
-
SECURING THE DATA STORAGE AND PROCESSING IN CLOUD COMPUTING ENVIRONMENT
-
Author
-
Owens, Rodney
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issue...