# Browse Dissertations and Theses - Electrical and Computer Engineering by Contributor "Hu, Yih-Chun"

• (2019-04-18)
In the modern Internet, Distributed Denial-of-Service (DDoS) has been a constant threat to all web services. An attacker may send a flood of requests with a botnet to the victim system, so that the system will waste all ...

application/pdf

PDF (361kB)
• (2011-08-25)
We consider using passive RFID technology beyond its traditional purpose, namely, identification. Instead we consider passive tags being densely distributed in space, providing the infrastructure for distributed, physical ...

application/pdf

PDF (4MB)
• (2014-01-16)
Traditionally, wireless network protocols have been developed for performance. Subsequently, as attacks are identified, patches or defenses have been developed. This has led to an arms race,'' where one is never confident ...

application/pdf

PDF (1MB)
• (2015-10-15)
Being able to exactly detect large network flows under an arbitrary time win- dow model is expected in many current and future applications like Denial- of-Service (DoS) flow detection, bandwidth guarantee, etc. However, ...

application/pdf

PDF (606kB)
• (2021-04-27)
Detecting shared bottlenecks among network flows is crucial in TCP Multipath to ensure TCP fairness and other applications related to cross-flow congestion control. The problem of whether two flows share a bottleneck has ...

application/pdf

PDF (899kB)
• (2015-03-16)
Defending the Internet against distributed denial of service (DDoS) attacks is a fundamental problem. Despite over a decade of research, little progress has been made on the real-world deployment of proposed approaches due ...

application/pdf

PDF (1MB)
• (2019-04-19)
Over the decades, with the prevalence of advanced computer networks, the problem of denial of service (DDoS) attack has become more serious. In the past years, many approaches have been proposed to mitigate DDoS attacks, ...

application/pdf

PDF (1MB)
• (2017-07-11)
Networked systems now have significant impact on human lives: the Internet, connecting the world globally, is the foundation of our information age, the data centers, running hundreds of thousands of servers, drive the era ...

application/pdf

PDF (3MB)
• (2011-08-25)
Providing safety applications is one of the principal motivations behind deploying vehicular ad hoc networks (VANETs), where each vehicle is equipped with a wireless transmitter and receiver. These applications require ...

application/pdf

PDF (416kB)
• (2012-02-01)
Availability, together with confidentiality and integrity, form the basic concepts of information security. Indeed, a device, protocol, or network can enjoy the highest level of confidentiality and integrity, but still ...

application/pdf

PDF (5MB)
• (2012-02-06)
One of the primary advantages of spread spectrum communication is its resistance to interference and jamming. However, it has the drawback of requiring the pre-establishment of a secret code between sender and receiver. ...

application/pdf

PDF (284kB)
• (2013-08-22)
Since wireless networks share a communication medium, multiple transmissions on the same channel cause interference to each other and degrade the channel quality, much as multiple people talking at the same time make ...

application/pdf

PDF (2MB)
• (2012-09-18)
This dissertation reports research conducted in two aspects of secure network resource management: strengthening security by proposing a defense architecture with stronger security property and increasing deployability. ...

application/pdf

PDF (2MB)
• (2010-08-20)
In vehicular ad hoc networks (VANETs), vehicles communicate with other vehicles or fixed infrastructure, called road-side units (RSUs). One of the main goals for VANETs is to improve vehicle safety. Work has begun on ...

application/pdf

PDF (2MB)
• (2013-05-28)
With the growing popularity and variety of unmanned aircraft technologies and increasing number of aircraft present in the skies, the Federal Aviation Administration has followed the lead of the European Cascade program ...

application/pdf

PDF (761kB)
• (2012-09-18)
Medium access control (MAC) protocol security is important in wireless networks due to the lack of physical access control that normally exists in wired networks in the form of connecting a cable. Most efforts in standards ...

application/pdf

PDF (5MB)
• (2017-07-10)
Many attacks that threaten service providers and legitimate users are anomalous behaviors out of specification, and this dissertation mainly focuses on detecting “large” Internet flows consuming more resources than those ...

application/pdf

PDF (2MB)
• (2014-01-16)
The Universal Serial Bus protocol was designed to be, and has become, the single standard used for interfacing with computer peripherals and electronic components. The proliferation of this protocol has resulted in USB ...

application/pdf

PDF (158kB)
• (2015-11-30)
Many recent biometric authentication methods using heart signals in the form of ECG and its components have been proposed to be used as a unique security key for body area networks (BANs) to authenticate individuals ...

application/pdf

PDF (16MB)
• (2010-08-31)
We, via a model and optimization-based approach, address three issues related to wireless networks: clock synchronization, medium access control (MAC) and scalable video streaming. In Chapter 2 we develop, study and ...

application/pdf

PDF (2MB)