Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Existing solutions that address data loss, theft, and corruption of information and resources in networks rely on deep content analysis, central policy management, and attempt to achieve broad content protection across multiple platforms...
The Internet email system as a popular online communication tool has been increasingly misused by ill-willed users to carry out malicious activities including spamming and phishing. Alarmingly, in recent years the nature of the email...
Research into routing protocol development for mobile ad hoc networks has been a significant undertaking since the late 1990's. Secure routing protocols for mobile ad hoc networks provide the necessary functionality for proper network...
Since the growth of electronic voting systems in the United States after the year 2000, electronic voting products have received significant scrutiny and examination. Subsequently, studies and reports have identified vulnerabilities as...
Wireless networks have been widely adopted in homes, offices and public hot spots. Two problems with wireless networks are the limited range and unavoidable packet loss. Much effort has been investigated in these problems, such as packet...
Topology Aggregation is concerned about summarizing a network domain in a concise manner. This thesis deals with topology aggregation for networks with two additive metrics. Summarizing such a network domain is difficult for a number of...
Traditionally, if two files are considered identical, they are understood to be byte-by-byte equivalent. However, many files are semantically identical without being byte-to-byte identical. We assert that by using a contextual or...
With the maturity of mobile technologies, voice biometrics is becoming increasingly popular as a promising alternative to traditional passwords for user authentication on smartphones. Moreover, with the popularity of voice user interface...
Memory system hierarchy has remained unchanged for many years, leading to a growing gap between main memory access times and a local disk's paging latencies. This trend has especially become a performance bottleneck for memory intensive...
Instant messaging has been and still is a revolutionary technology, bringing people in communication with each other faster and easier. Its characteristic as sending messaging in real-time make it even more appealing than e-mail itself....
Digital image steganography is the art and science of hidden information. Currently, steganographic (stego) algorithms are rapidly evolving and reducing their artifacts. There-fore, detecting of altered cover images, i.e. steganalysis, ...
Random numbers are used in a variety of applications including simulation, sampling, and cryptography. Fortunately, there exist many well-established methods of random number generation. An example of a well-known pseudorandom number...
Wireless mesh network is usually used to provide Internet access to communities or citywide. Opportunistic Routing (OR) exploits overheard packets in a wireless network and has been proven to be effective for wireless mesh networks....
Existing wireless ad hoc routing protocols, such as DSDV, AODV, DSR, TORA and GPSR, rely heavily upon the use of a large number of control messages to build and maintain routes between communicating mobile end-points. In this thesis, we...
Modern day high performance computing (HPC) clusters and data centers require a large number of computing and storage elements to be interconnected. Interconnect performance is considered a major bottleneck to the overall performance of...
In this paper we show that botnets and specifically peer-to-peer botnets, pose a considerable threat to our national security. We examine the rise of the botnet threat and the technology that makes this threat possible. We also examine...
The computing capabilities of the high performance computing systems have increased manyfold over the span of years following Moores law and have achieved petascale recently. Following the trend, the computation cababilities are expected...
There are a wide variety of clustering and optimization algorithms which work in vector spaces, but relatively fewer that work on graphs. An algorithm to embed road network metrics into vector spaces is presented in this document, which...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.