Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Raymond, David Richard"'
Autor:
Raymond, David Richard
As wireless sensor platforms become less expensive and more powerful, the promise of their wide-spread use for everything from health monitoring to military sensing continues to increase. Like other networks, sensor networks are vulnerable to malicio
Externí odkaz:
http://hdl.handle.net/10919/26629
http://scholar.lib.vt.edu/theses/available/etd-04042008-152245/
http://scholar.lib.vt.edu/theses/available/etd-04042008-152245/
Autor:
Salman, Mohammed, Welch, Brian, Raymond, David Richard, Marchany, Randolph C., Tront, Joseph G.
With wider adoption of micro-service based architectures in cloud and distributed systems, logging and monitoring costs have become increasingly relevant topics of research. There are a large number of log analysis tools such as the ELK(ElasticSearch
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2485::62b5a52666c5c7e7010989151cc0bb3c
https://hdl.handle.net/10919/77388
https://hdl.handle.net/10919/77388
Autor:
Beauchamp, Cheryl Lynn
According to a report from McAfee, the global cost of cybercrime for 2020 was over one trillion dollars (Smith, Z. et al., 2020). Cybersecurity breaches and attacks have not only cost businesses and organizations millions of dollars but have also thr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2485::8708a8d189f3909cc6d2c31c5afbced8
https://hdl.handle.net/10919/109524
https://hdl.handle.net/10919/109524
Autor:
Cain, Chandler Lee
As the practice of renting remote computing resources from a cloud computing platform becomes increasingly popular, the security of such systems is a subject of continued scrutiny. This thesis explores the current state of cloud computing security al
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2485::8c96cce703acffa9f7282ac18c4b739e
https://hdl.handle.net/10919/101869
https://hdl.handle.net/10919/101869
Autor:
Yom, Jinwoo
Most modern software attacks are rooted in memory corruption vulnerabilities. They redirect security-sensitive data values (e.g., return address, function pointer, and heap metadata) to an unintended value. Current state-of-the-art policies, such as
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2485::61ddaa13a35c0a5e119d8e3ad1db6b6d
https://hdl.handle.net/10919/106593
https://hdl.handle.net/10919/106593
Autor:
Zeitz, Kimberly Ann
As the use of low-power and low-resource embedded devices continues to increase dramatically with the introduction of new Internet of Things (IoT) devices, security techniques are necessary which are compatible with these devices. This research advan
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2485::d5da432a8b5b9ec267ca0693fc274119
https://hdl.handle.net/10919/102446
https://hdl.handle.net/10919/102446
Autor:
Hsu, Alexander Sirui
Due to the ever increasing supply of new Internet of Things (IoT) devices being added onto a network, it is vital secure the devices from incoming cyber threats. The manufacturing process of creating and developing a new IoT device allows many new co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2485::e80f0434dc67aa65c8acb5ed5d665b8c
https://hdl.handle.net/10919/88421
https://hdl.handle.net/10919/88421
Autor:
Stroud, Caleb Zachary
Wireless networks collect vast amounts of log data concerning usage of the network. This data aids in informing operational needs related to performance, maintenance, etc., but it is also useful for outside researchers in analyzing network operation
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2485::6cf1222b5604d31a73412edb1201a400
https://hdl.handle.net/10919/84548
https://hdl.handle.net/10919/84548
Autor:
Wang, Chun
Leaked passwords from data breaches can pose a serious threat if users reuse or slightly modify the passwords for other services. With more and more online services getting breached today, there is still a lack of large-scale quantitative understandi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2485::130e1b6b0f7e2448a9e04f15ccda437e
https://hdl.handle.net/10919/83471
https://hdl.handle.net/10919/83471
Autor:
DeYoung, Mark E.
The problem of revealing accurate statistics about a population while maintaining privacy of individuals is extensively studied in several related disciplines. Statisticians, information security experts, and computational theory researchers, to name
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2485::dfbe45cbc41f329006f7ada507751d05
https://hdl.handle.net/10919/82909
https://hdl.handle.net/10919/82909