Search results
-
-
Title
-
Advances in Modern Botnet Understanding and the Accurate Enumeration of Infected Hosts
-
Author
-
Nunnery, Christopher
-
Date Created
-
2011
-
Subjects--Topical
-
Information technology, Information science
-
Description
-
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to ...
-
-
Title
-
Assured Information Sharing for Ad-hoc Collaboration
-
Author
-
Jin, Jing
-
Date Created
-
2009
-
Subjects--Topical
-
Computer engineering, Information technology
-
Description
-
Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping wi...
-
-
Title
-
CONFIGURATION OF APPLICATION PERMISSIONS WITH CONTEXTUAL ACCESS CONTROL
-
Author
-
Besmer, Andrew
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Users are burdened with the task of configuring access control policies on many different application platforms used by mobile devices and social network sites. Many of these platforms employ access control mechanisms to configure application perm...
-
-
Title
-
Communities of Purpose
-
Author
-
Stukes, Felesia
-
Date Created
-
2016
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Communities of Purpose are commonly known to enact their purposes through social movements, grassroots efforts, semi-formal groups, and through organizations in the voluntary sector. They carry out charitable missions and goals and are often commi...
-
-
Title
-
Development of a multi-layered botmaster based analysis framework
-
Author
-
Paxton, Napoleon
-
Date Created
-
2011
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Botnets are networks of compromised machines called bots that come together to form the tool of choice for hackers in the exploitation and destruction of computer networks. Most malicious botnets have the ability to be rented out to a broad range ...
-
-
Title
-
Healthy vs Unhealthy: Food Related Tweets and Image Classification
-
Author
-
Oduru, Tejaswini
-
Date Created
-
2020
-
Subjects--Topical
-
Information technology
-
Description
-
Many studies have proved that the rise in obesity among the world population is due to an increase in calorie intake coupled with a lack of adequate physical activity. Food is an essential part of everyday life and has significant effects on our h...
-
-
Title
-
INTERACTION SUPPORT FOR INFORMATION FINDING AND COMPARATIVE ANALYSIS IN ONLINE VIDEO
-
Author
-
Xia, Jinyue
-
Date Created
-
2017
-
Subjects--Topical
-
Information technology
-
Description
-
Current online video interaction is typically designed with a focus on straightforward distribution and passive consumption of individual videos. This "click play, sit back and watch" context is typical of videos for entertainment. However, there ...
-
-
Title
-
SECURING THE DATA STORAGE AND PROCESSING IN CLOUD COMPUTING ENVIRONMENT
-
Author
-
Owens, Rodney
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issue...
-
-
Title
-
SYSTEMATIC POLICY ANALYSIS AND MANAGEMENT
-
Author
-
Xu, Wenjuan
-
Date Created
-
2010
-
Subjects--Topical
-
Information technology
-
Description
-
Determining whether a given policy meets a site's high-level security goals has been a challenging task, due to the low-level nature and complexity of the policy language, various security requirements and the multiple policy violation patterns. I...
-
-
Title
-
Software-Defined Cyber Agility for Active Cyber Defense
-
Author
-
Gillani, Syed Fida
-
Date Created
-
2017
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
The scale and sophistication of stealthy and persistent cyber-attacks like distributed denial-of-service (DDoS) and man-in-the-middle (MitM) have been rapidly increasing in recent years. There are fundamental Internet properties, attributed to the...
-
-
Title
-
Topology-aware approach for the emergence of social norms in multiagent systems
-
Author
-
Hasan, Mohammad
-
Date Created
-
2014
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Social norms facilitate agent coordination and conflict resolution without explicit communication. Norms generally involve restrictions on a set of actions or behaviors of agents to a particular strategy and can significantly reduce the cost of co...
-
-
Title
-
Using audience-centric design and community feedback to manage complex privacy settings
-
Author
-
Watson, Jason
-
Date Created
-
2014
-
Subjects--Topical
-
Information technology
-
Description
-
Today, technology is enabling people to share information on an unprecedented scale. Although much of this information is intended to be shared with a large group of people or even the public, some disclosure is intended for smaller audiences-a su...