Now showing items 1-4 of 4

    • Addressing Insider Threats from Smart Devices 

      Webb, Allen T (2017-07-05)
      Smart devices have unique security challenges and are becoming increasingly common. They have been used in the past to launch cyber attacks such as the Mirai attack. This work is focused on solving the threats posed to and ...
    • Scalable OS Fingerprinting: Classification Problems and Applications 

      Shamsi, Zain Sarfaraz (2017-04-07)
      The Internet has become ubiquitous in our lives today. With its rapid adoption and widespread growth across the planet, it has drawn many research efforts that attempt to understand and characterize this complex system. ...
    • Understanding and Detecting Malicious Cyber Infrastructures 

      Zhang, Jialong (2016-11-28)
      Malware (e.g., trojans, bots, and spyware) is still a pervasive threat on the Internet. It is able to infect computer systems to further launch a variety of malicious activities such as sending spam, stealing sensitive ...
    • Wavelet methods and statistical applications: network security and bioinformatics 

      Kwon, Deukwoo (Texas A&M University, 2005-11-01)
      Wavelet methods possess versatile properties for statistical applications. We would like to explore the advantages of using wavelets in the analyses in two different research areas. First of all, we develop an integrated ...