Search results
-
-
Title
-
Advances in Modern Botnet Understanding and the Accurate Enumeration of Infected Hosts
-
Author
-
Nunnery, Christopher
-
Date Created
-
2011
-
Subjects--Topical
-
Information technology, Information science
-
Description
-
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to ...
-
-
Title
-
Assured Information Sharing for Ad-hoc Collaboration
-
Author
-
Jin, Jing
-
Date Created
-
2009
-
Subjects--Topical
-
Computer engineering, Information technology
-
Description
-
Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping wi...
-
-
Title
-
CONFIGURATION OF APPLICATION PERMISSIONS WITH CONTEXTUAL ACCESS CONTROL
-
Author
-
Besmer, Andrew
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Users are burdened with the task of configuring access control policies on many different application platforms used by mobile devices and social network sites. Many of these platforms employ access control mechanisms to configure application perm...
-
-
Title
-
Development of a multi-layered botmaster based analysis framework
-
Author
-
Paxton, Napoleon
-
Date Created
-
2011
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Botnets are networks of compromised machines called bots that come together to form the tool of choice for hackers in the exploitation and destruction of computer networks. Most malicious botnets have the ability to be rented out to a broad range ...
-
-
Title
-
ESIDE: The integration of secure programming education into the IDE
-
Author
-
Whitney, Michael
-
Date Created
-
2015
-
Subjects--Topical
-
Computer science
-
Description
-
Securing the world's technological resources has become one of the largest challenges of modern day. From healthcare to national security, power grids to public safety, the world is reliant on computer systems and their ability to perform in a saf...
-
-
Title
-
Healthy vs Unhealthy: Food Related Tweets and Image Classification
-
Author
-
Oduru, Tejaswini
-
Date Created
-
2020
-
Subjects--Topical
-
Information technology
-
Description
-
Many studies have proved that the rise in obesity among the world population is due to an increase in calorie intake coupled with a lack of adequate physical activity. Food is an essential part of everyday life and has significant effects on our h...
-
-
Title
-
INTERACTION SUPPORT FOR INFORMATION FINDING AND COMPARATIVE ANALYSIS IN ONLINE VIDEO
-
Author
-
Xia, Jinyue
-
Date Created
-
2017
-
Subjects--Topical
-
Information technology
-
Description
-
Current online video interaction is typically designed with a focus on straightforward distribution and passive consumption of individual videos. This "click play, sit back and watch" context is typical of videos for entertainment. However, there ...
-
-
Title
-
Reasoning about recognizability in security protocols
-
Author
-
Li, Zhiwei
-
Date Created
-
2012
-
Subjects--Topical
-
Computer science
-
Description
-
Although verifying a message has long been recognized as an important concept, which has been used explicitly or implicitly in security protocol analysis, there is no consensus on its exact meaning. Such a lack of formal treatment of the concept m...
-
-
Title
-
SECURING THE DATA STORAGE AND PROCESSING IN CLOUD COMPUTING ENVIRONMENT
-
Author
-
Owens, Rodney
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issue...
-
-
Title
-
SYSTEMATIC POLICY ANALYSIS AND MANAGEMENT
-
Author
-
Xu, Wenjuan
-
Date Created
-
2010
-
Subjects--Topical
-
Information technology
-
Description
-
Determining whether a given policy meets a site's high-level security goals has been a challenging task, due to the low-level nature and complexity of the policy language, various security requirements and the multiple policy violation patterns. I...
-
-
Title
-
Software-Defined Cyber Agility for Active Cyber Defense
-
Author
-
Gillani, Syed Fida
-
Date Created
-
2017
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
The scale and sophistication of stealthy and persistent cyber-attacks like distributed denial-of-service (DDoS) and man-in-the-middle (MitM) have been rapidly increasing in recent years. There are fundamental Internet properties, attributed to the...
-
-
Title
-
Topology-aware approach for the emergence of social norms in multiagent systems
-
Author
-
Hasan, Mohammad
-
Date Created
-
2014
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Social norms facilitate agent coordination and conflict resolution without explicit communication. Norms generally involve restrictions on a set of actions or behaviors of agents to a particular strategy and can significantly reduce the cost of co...
-
-
Title
-
Toward a better understanding of viewers' perceptions of tag clouds: relative size judgment
-
Author
-
Dhou, Khaldoon
-
Date Created
-
2013
-
Subjects--Topical
-
Computer science, Cognitive psychology
-
Description
-
This dissertation focuses on viewers' perception of the relative size of words presented in tag clouds. A tag cloud is a representation of the word content of a source document where the relative frequency, or importance, of the keywords (i.e., ta...
-
-
Title
-
Understanding and Designing for Sharing and Privacy in Wearable Fitness Platforms
-
Author
-
Alqhatani, Abdulmajeed
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
Commercial wearable devices that collect health and fitness data are widely used. These devices sense and collect a variety of personal data, which can be shared by users with other people and with third parties. Yet, the collection of personal da...
-
-
Title
-
Understanding and Designing for Sharing and Privacy in Wearable Fitness Platforms
-
Author
-
Alqhatani, Abdulmajeed
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
Commercial wearable devices that collect health and fitness data are widely used. These devices sense and collect a variety of personal data, which can be shared by users with other people and with third parties. Yet, the collection of personal da...
-
-
Title
-
Using audience-centric design and community feedback to manage complex privacy settings
-
Author
-
Watson, Jason
-
Date Created
-
2014
-
Subjects--Topical
-
Information technology
-
Description
-
Today, technology is enabling people to share information on an unprecedented scale. Although much of this information is intended to be shared with a large group of people or even the public, some disclosure is intended for smaller audiences-a su...