Search results
-
-
Title
-
An Approach Towards an Autonomic Computing Prototype Reference Architecture
-
Author
-
Williams, Trevon
-
Date Created
-
2019
-
Subjects--Topical
-
Computer science, Information technology, System theory
-
Description
-
Autonomic Computing is a grand challenge that strives to create self-regulating environments. The end goal, is to create an environment that can self-optimize, self-protect, self-heal and self-configure based on built-in, formulated, and generated...
-
-
Title
-
Discovering Zero-day Attacks By Leveraging Cyber Threat Intelligence
-
Author
-
Niakanlahiji, Amirreza
-
Date Created
-
2019
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Cyber attacks cost companies and organizations billions of dollars each year. To alleviate this issue, security professionals and companies continuously attempt to discover new vulnerabilities, and also to share their cyber threat information abou...
-
-
Title
-
HYBRID COMPARATIVE PREDICTIVE MODELING
-
Author
-
Nawaz, Mohammad
-
Date Created
-
2017
-
Subjects--Topical
-
Information technology
-
Description
-
In this research, a hybrid predictive model was proposed for the decision-making process. Predictive models can be built through the use of Machine Learning using different classifiers/algorithms to predict results as well as provide recommendatio...
-
-
Title
-
Intrusion Detection and Deterrence for Critical Infrastructures
-
Author
-
Ali, Muhammad
-
Date Created
-
2016
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Critical infrastructures are the systems and networks that are so vital that their unavailability would have a major impact on national security, economy, safety, or any combination thereof. Examples of critical infrastructure are power systems, f...
-
-
Title
-
TOWARDS AN AGENT-BASED APPROACH TO SIMULATING HUMANS FALLING FOR PHISHING ATTACKS
-
Author
-
Robles Perez, Anibal
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
In this project, we explore methods of implementing an autonomous agent that simulates human behaviour, in order to produce common mistakes that create vulnerabilities in enterprise networks. The objective of this research is to aid in testing the...
-
-
Title
-
User Centric Policy Management
-
Author
-
Cheek, Gorrell
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protect...
-
-
Title
-
Vulnerability Assessment and Policy Enforcement for Hybrid Mobile Applications
-
Author
-
Mohanty, Abhinav
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Hybrid mobile apps are becoming increasingly popular for building cross-platform mobile applications, where the core business code of apps is written using web technologies, such as HTML, JavaScript (JS), and Cascading Style Sheets (CSS). This tec...