Browse Dissertations and Theses - Electrical and Computer Engineering by Contributor "Nicol, David M."

  • Lemay, Elizabeth (2012-02-06)
    Quantitative metrics can aid decision-makers in making informed trade-off decisions. In system-level security decisions, quantitative security metrics allow decision-makers to compare the relative security of different ...

    application/pdf

    application/pdfPDF (3MB)
  • Nguyen, Hoang Hai (2018-10-29)
    Attack graphs used in network security analysis are analyzed to determine sequences of exploits that lead to successful acquisition of privileges or data at critical assets. An attack graph edge corresponds to a vulnerability, ...

    application/pdf

    application/pdfPDF (1MB)
  • Dutta, Sudipta (2013-02-03)
    The Smart Grid represents a transition of the power and energy industry into a new era of improved efficiency, reliability, availability, and security, while contributing to economic and environmental health. However, ...

    application/pdf

    application/pdfPDF (3MB)
  • Rogers, Katherine (2012-02-06)
    As power system data becomes more abundant, there is an increasing need for applications which can make appropriate use of this data to perform power system analysis tasks. Data provides opportunities for performing event ...

    application/pdf

    application/pdfPDF (10MB)
  • Houmansadr, Amir (2012-09-18)
    Linking network flows is an important problem in several security-related applications including intrusion detection and anonymity. The flows of interest in these applications are commonly relayed by several low-latency ...

    application/pdf

    application/pdfPDF (2MB)
  • Aquino-Lugo, Angel A. (2011-01-14)
    The introduction of remotely controlled network devices is transforming the way the power system is operated and studied. The ability to provide real and reactive power support can be achieved at the end-user level. In ...

    application/pdf

    application/pdfPDF (2MB)
  • Lefever, Ryan M. (2011-05-25)
    An important approach for software dependability is the use of diversity to detect and/or tolerate errors. We develop and evaluate an approach for automated program diversity called Diverse Partial Memory Replication ...

    application/pdf

    application/pdfPDF (781kB)
  • Jin, Dong (2010-05-19)
    Ethernet is the most widely implemented low-level networking technology used today, with Gigabit Ethernet seen as the emerging standard implementation. The backbones of many large scale networks (e.g., data centers, ...

    application/pdf

    application/pdfPDF (1MB)
  • Hosseinabadi, Ghazale (2014-01-16)
    Because a wireless channel is a shared medium, messages sent on the wireless links might be overheard by the neighboring stations. The information obtained from the overheard messages can be used in order to design more ...

    application/pdf

    application/pdfPDF (1MB)
  • Edwards, Nathan (2013-01-09)
    Along with an increase in cyber security concerns for critical infrastructure applications, there is a growing concern and lack of solutions for cyber-based supply chain and device life-cycle threats. The challenge for ...

    application/pdf

    application/pdfPDF (5MB)
  • Konigsmark, Sven Tenzing Choden (2017-03-13)
    The security of hardware implementations is of considerable importance, as even the most secure and carefully analyzed algorithms and protocols can be vulnerable in their hardware realization. For instance, numerous ...

    application/pdf

    application/pdfPDF (3MB)
  • Nellikar, Suraj (2010-05-19)
    Insider threat problems are widespread in industry today. They have resulted in huge losses to organizations. The security reports by leading organizations point out the fact that there have been many more insider attacks ...

    application/pdf

    application/pdfPDF (1MB)
  • Zhu, Huaiyu (2015-01-21)
    Advanced metering infrastructure (AMI) is envisioned to be able to revolutionize the power grid and turn it into the “smart grid”. AMI, through the use of “smart meters” and high-speed networks, promises to strengthen both ...

    application/pdf

    application/pdfPDF (2MB)
  • Yordy, Zachary (2013-08-22)
    NetAPT is a tool that helps enterprise and utility customers validate their network security policy. While the tool gives helpful results, it relies on lots of external programs to help it perform its powerful analysis. ...

    application/pdf

    application/pdfPDF (3MB)
  • Eskins, Douglas (2013-02-03)
    The actions of human participants in complex systems can greatly affect system outcomes. In particular, the security of cyber-human systems (CHSs) can be highly influenced by the actions, especially the decisions, of ...

    application/pdf

    application/pdfPDF (3MB)
  • Thomas, Kurt A. (2010-06-22)
    As the popularity of social networks expands, the information users expose to the public has potentially dangerous implications for individual privacy. While social networks allow users to restrict access to their personal ...

    application/pdf

    application/pdfPDF (1MB)
  • Davis, Charles (2009-06-01)
    The main focus of this work is to efficiently determine the double-outage contingencies that threaten the operation of the power system. This work is necessary because enormous numbers of double-outage contingencies exist ...

    application/pdf

    application/pdfPDF (2MB)
  • Jin, Dong (2013-08-22)
    The United States and many other countries are conducting a major upgrade of their electrical grids. The new “smart grid” is not a physically isolated network like the older power grid was, but a complicated network of ...

    application/pdf

    application/pdfPDF (3MB)
  • Bergman, David C. (2010-05-19)
    The Virtual Power System Testbed (VPST) at the University of Illinois at Urbana-Champaign is part of the Trustworthy Cyber Infrastructure for the Power Grid (TCIP) and is maintained by members of the Information Trust Institute ...

    application/pdf

    application/pdfPDF (1MB)
  • Kumar, Rakesh (2019-11-27)
    The operational integrity of the infrastructure systems is critical for a nation state’s economic and security interests. Such systems rely on automation to perform complex control tasks to avoid malfunction caused by human ...

    application/pdf

    application/pdfPDF (6MB)