Browse by Subject "security"

  • Marsan, Robert (2013-05-24)
    With the unprecedented growth in the diversity of digital distribution platforms, there has been an increasing concern about privacy of the content being produced by the different types of applications users are installing ...

    application/pdf

    application/pdfPDF (6Mb)
  • Van Der Woude, Joel (2013-05)
    Stuxnet, a computer virus found in Iranian nuclear facilities, proved the feasibility of an attack on an industrial control system. Similar attacks on critical infrastructure such as the power grid or clean water supply ...

    application/pdf

    application/pdfPDF (431Kb)Restricted to U of Illinois
  • Wang, Gary (2014-05)
    With the advent of cloud computing, integrity of virtualization technologies (e.g., hypervisors) has become more important. Insight into hypervisor activity could allow normal users to identify suspicious behavior and ...

    application/pdf

    application/pdfPDF (635Kb)Restricted to U of Illinois
  • Ho, Shuyuan Mary; Treglia, Joseph Vincent (2009-02-08)
    The purpose of this panel is to identify and discuss high-level parameters and social issues regarding the implementation of a national behavioral anomaly detection platform. This platform would provide a “statistical ...

    application/pdf

    application/pdfPDF (94Kb)
  • Chan, Ellick M. (2011-05-25)
    Current techniques used by forensic investigators during incident response and search and seizure operations generally involve pulling the power on suspect machines and performing traditional dead box post-mortem analysis ...

    application/pdf

    application/pdfPDF (2Mb)
  • Krishnamurthy, Prashant (2008-02-28)
    Vehicular networks aimed toward providing roadside services such as traffic alerts, estimated time to reach a destination, alternative routes, and in general improve the efficiency and safety on the road are emerging ...

    application/pdf

    application/pdfPDF (370Kb)
  • Thomas, Kurt A. (2010-06-22)
    As the popularity of social networks expands, the information users expose to the public has potentially dangerous implications for individual privacy. While social networks allow users to restrict access to their personal ...

    application/pdf

    application/pdfPDF (1Mb)
  • Said, Hisham M. (2010-08-31)
    Planning the site layout of construction projects is a crucial task that has a significant impact on construction cost, productivity, and safety. It involves the positioning and dynamic relocation of temporary facilities ...

    application/pdf

    application/pdfPDF (5Mb)
  • Schear, Nabil A. (2011-05-25)
    Many existing encrypted Internet protocols leak information through packet sizes and timing. Though seemingly innocuous, prior work has shown that such leakage can be used to recover part or all of the plaintext being ...

    application/pdf

    application/pdfPDF (1Mb)
  • Hasan, Ragib; Sion, Radu; Winslett, Marianne (2009-05-24)

    application/pdf

    application/pdfPDF (647Kb)
  • Naveed, Muhammad; Ayday, Erman; Clayton, Ellen W.; Fellay, Jacques; Gunter, Carl A.; Hubaux, Jean-Pierre; Malin, Bradley, A.; Wang, XiaoFeng (2014-05-08)
    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, ...

    application/pdf

    application/pdfPDF (2Mb)
  • Wang, Qiyan (2013-08-22)
    A key challenge in censorship circumvention is being able to direct legitimate users to redirection proxies while preventing censors, posing as insiders, from discovering their addresses and blocking them. In this thesis, ...

    application/pdf

    application/pdfPDF (2Mb)
  • Criswell, John (2014-09-16)
    Commodity operating systems are entrusted with providing security to the applications we use everyday, and yet they suffer from the same security vulnerabilities as user-space applications: they are susceptible to memory ...

    application/pdf

    application/pdfPDF (3Mb)
  • Haas, Jason J. (2010-08-20)
    In vehicular ad hoc networks (VANETs), vehicles communicate with other vehicles or fixed infrastructure, called road-side units (RSUs). One of the main goals for VANETs is to improve vehicle safety. Work has begun on ...

    application/pdf

    application/pdfPDF (2Mb)
  • Simmons, Patrick (2011-04-23)
    Disk encryption has become an important security measure for a multitude of clients, including governments, corporations, activists, security-conscious professionals, and privacy-conscious individuals. Unfortunately, recent ...

    application/pdf

    application/pdfPDF (227Kb)
  • Bernazzoli, Richelle (2013-08-22)
    This dissertation presents a multi-faceted and nuanced study of the multi-level governance of the Euro-Atlantic arena, or the area covered by the North Atlantic Treaty Organization and the European Union. Using various ...

    application/pdf

    application/pdfPDF (1Mb)Restricted to U of Illinois
  • Rogers, Michael (2014-01-16)
    The Universal Serial Bus protocol was designed to be, and has become, the single standard used for interfacing with computer peripherals and electronic components. The proliferation of this protocol has resulted in USB ...

    application/pdf

    application/pdfPDF (158Kb)
  • Chu, Jonathan (2014-05-30)
    In cyber security, engineers need to devise ways to protect their systems from hackers. One of the ways that they do this is through intrusion detection. Host based intrusion detection systems reside on the computer and ...

    application/pdf

    application/pdfPDF (503Kb)
  • XSEDE Security Working Group (2014-04-29)
    Through acceptance of the XSEDE Level 1 SP Security Agreement and other contracts, providers of XSEDE central services agree to follow this security baseline document approved by the XSEDE Security Working Group (XSWoG). ...

    application/pdf

    application/pdfPDF (766Kb)
  • XSEDE Security Working Group (2013-10-10)
    This is a set of standard security controls that are to be applied at each Level 1 Service Provider along with additional guidelines for securing XSEDE resources.

    application/pdf

    application/pdfPDF (119Kb)