Search
Skip to Search Results- 15Computer security
- 4Internet of things
- 3Cloud computing
- 3Mobile communication systems
- 25G mobile communication systems
- 2Cryptocurrencies
- 5Kaur, Sandeep (Supervisor)
- 3Noonari, Juned (Supervisor)
- 2MacGregor, Mike (Advisor)
- 1Bhat, Shriya
- 1Dhayanidhi, Glory
- 1Kaur, Jaskiran
-
Implementation Security, or a Language-theoretic Security Analysis of OpenFlow and What I Found There
Download2013-11-01
Implementation is the most immediate aspect of security in the construction of real-world distributed computing systems; designs have flaws but vulnerabilities themselves manifest in implementations. The challenge of securing systems during implementation is apparent from observing the computing...
-
2021-10-28
General Security Concepts, Preface: Systems Administrators, Security Administrators, Network Administrators; whatever title they have, they are tasked with building, maintaining and most importantly, protecting the IT systems from malicious software, intentional intrusions from both internal and...
-
Research on IoT Threats & Implementation of AI/ML to Address Emerging Cybersecurity Issues in IoT with Cloud Computing
Download2022-03-31
Internet of Things (IoT) has become one of the progressive innovations and inviting space of interest for the research world and financially captivating for the business world. Integrating different devices and associating devices with humans requires artificial intelligence/ machine learning...
-
Research, Implementation and Security Analysis of Connected and Autonomous Vehicles (CAVs) using Machine Learning Algorithms
Download2022-03-17
Efforts linked to connected and autonomous vehicles (CAVs) have exploded in the last several years, and they are already beginning to impact people's daily lives. A growing number of businesses and academic institutions have made public announcements about their CAV efforts, and a few have even...