Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
In recent years, studies have shown that independent/sparse components of local windows of natural images resemble the receptive fields of cells in the early stages of the mammalian visual pathway. However, the role of the independence...
With the advancement information and communication technologies, networked computing devices have been adopted to address real-world challenges due to their efficiency and programmability while maintaining scalability, sustainability, ...
In real-world mission planning, the environment can be quite complex, and a path planner has thepotential to enable an agent to fulfill its goals in spite of unanticipated events and unexpected situations. A sound path planner defines a...
Most algorithms for Group Key distribution were not created with ad hoc networks in mind. In a wired network with a distinct infrastructure, generating a key distribution algorithm is based on a static environment and, therefore, more...
Wireless sensor networks are undoubtedly one of the largest growing types of networks today. Much research has been done to make these networks operate more efficiently including the application of data aggregation. Recently, more...
With globalization and the 4th industrial revolution, the world has become emerged in technology. A smartphone is now capable of holding an entire identity of a person within. It is easy to interpret human behavior using the behavioral...
An Analysis of the Secure Routing Protocol for Mobile Ad Hoc Network Route Discovery: Using Intuitive Reasoning and Formal Verification to Identify Flaws
With this work we analyze the Secure Routing Protocol (SRP) proposed by Papadimitratos and Haas as a means for securing source-driven route discovery in ad hoc networks. We discuss aws in SRP's design and expose SRP's shortcomings with...
Digital image steganography is the art and science of hidden information. Currently, steganographic (stego) algorithms are rapidly evolving and reducing their artifacts. There-fore, detecting of altered cover images, i.e. steganalysis, ...
The amount of sensitive data stored on electronic media increases as the use of computers and mobile devices becomes more prevalent. For example, home computers and devices may store financial information (e.g., Quicken files or tax...
Routing in mobile ad hoc networks presents many challenging problems not faced when routing in static networks with infrastructure. While much research has been done in this area, there is still much progress left to make before routing...
At its heart, a password cracking attack is just a guessing attack. An attacker makes guesses about a user's password until they guess correctly or they give up. While the defender may limit the number of guesses an attacker is allowed, ...
Intrusion Detection has become an essential component of security mechanisms for information systems. Traditional Intrusion Detection Systems generally apply a single detection model and data source. Thus, they tend to suffer from large...
Quasi-Monte Carlo methods are a variant of ordinary Monte Carlo methods that employ highly uniform quasirandom numbers in place of Monte Carlo's pseudorandom numbers. Monte Carlo methods offer statistical error estimates; however, while...
Mobile ad hoc networks, or MANETs, are wireless networks that do not depend on a fixed infrastructure. The wide array of uses for ad hoc networks creates many different levels of security requirements. This work begins by exploring...
In this thesis we adapt the concept of visual cryptography to digital projectors as opposed to over-head projectors. Digital projectors are used to project the images from the computer monitor, whereas over-head projectors display the...
The Prisoners' Problem can be stated as follows: Two prisoners, Alice and Bob, want to communicate a secret escape plan under the surveillance of a warden, Wendy. To be indiscernible, the communication must appear to Wendy to be `...
Mobile agent systems provide a new method for computer communication. A mobile agent can migrate from platform to platform, performing a task or computation for its originator. Mobile agents are a promising new technology; however, there...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.