Browsing by Subject "Security"
Now showing items 1-20 of 28
-
(2012-02-14)Data integrity and privacy are the two most important security requirements in wireless communication. Most mechanisms rely on pre-share key data encryption to prevent unauthorized users from accessing confidential ...
-
(2009-05-15)Previous efforts to apply risk analysis for water distribution systems (WDS) have not typically included explicit hydraulic simulations in their methodologies. A risk classification scheme is here employed for identifying ...
-
(2009-05-15)The prevalence of digital information management in an open network has driven the need to maintain balance between anonymity, authenticity and accountability (AAA). Anonymity allows a principal to hide its identity from ...
-
(2019-10-18)Modern processors rely heavily on speculation to provide performance. Techniques such as branch prediction, caching, prefetching, memory dependence prediction etc. use features from recent program behavior to predict the ...
-
(2020-03-25)
-
(2009-05-15)This dissertation studies the causes and mechanism of power system cascading outages and develops new methods and new tools to help detect, prevent and mitigate the outages. Three effective solutions: a steady state control ...
-
(2015-10-14)An Ad-hoc Mobile Cloud (AMC) is a new computing model that allows sharing computing power of multiple mobile devices. For a diverse group of individuals that employ such computing model, in an ad-hoc manner, secure ...
-
(2023-07-25)Embedded systems are ubiquitous, and more systems are continuing to be deployed through the recent development of the Internet of Things. Embedded systems are specialized computer systems that are designed to perform specific ...
-
(2015-05-22)The Kirchhoff-law-Johnson-noise (KLJN) system is a classical physical secure key exchange scheme based on the Kirchhoff’s circuit loop law and the fluctuation-dissipation theorem of statistical physics. This dissertation ...
-
(2019-07-11)Computer security is a very critical problem these days, as it has widespread consequences in case of a failure of computer systems security, like desktop machines, mobile phones, tablets and Internet of Things (IoT) ...
-
(Texas A&M University, 2004-11-15)The electric power utility industry is presently undergoing a change towards the deregulated environment. This has resulted in unbundling of generation, transmission and distribution services. The introduction of competition ...
-
(2017-11-08)This dissertation provides empirical evidence on the effects of visibility for promoting better healthcare delivery in hospital emergency departments (EDs). Visibility is defined as the level of visual connectivity among ...
-
(2016-12-09)Facebook has been a host to many different attack vectors, such as malicious apps that use their permissions to spread malware and compromise user accounts to spam inboxes and walls. We have discovered another method of ...
-
(2019-08-14)Deep learning is a machine learning technique that enables computers to learn directly from images, text, or sound in the same way that people do. It is a key technology which enables selfdriving cars and speech recognition. ...
-
(2019-04-10)Today’s smartphones, tablets, and notebooks are equipped with Wi-Fi Direct (the de facto adhoc communication mechanism for mobile devices) that allows users to establish a wireless network (without a wireless router) and ...
-
(2023-05-01)This thesis experimentally addresses the optimization problem that exists between urban security and quality of life in contemporary public space architecture, within the field of defensive architecture. This thesis examines ...
-
(2023-08-07)Emerging technologies are revolutionizing healthcare by improving accessibility and enhancing patient-provider interactions. With advancements in medical research and computational resources, diverse healthcare technologies ...
-
(2019-05-15)How do relationships between leaders influence world politics? I argue that shared identity between leaders makes cooperation more likely by increasing interpersonal trust. Leaders who share more similar social identities ...
-
(2021-05-03)A remote laboratory for radiation detection and physical security was developed and implemented to provide students and professionals with education and training in nuclear security. Beginning with a proof-of-concept remote ...
-
(2020-08-14)The safety and security of international development workers has been neglected in the research literature. Protecting the safety and security of international development workers is a central part of protecting human ...