Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 601 - 630 of 5950

Full-Text Articles in Physical Sciences and Mathematics

A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat Jan 2023

A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat

Electrical & Computer Engineering Faculty Publications

IoT security is one of the prominent issues that has gained significant attention among the researchers in recent times. The recent advancements in IoT introduces various critical security issues and increases the risk of privacy leakage of IoT data. Implementation of Blockchain can be a potential solution for the security issues in IoT. This review deeply investigates the security threats and issues in IoT which deteriorates the effectiveness of IoT systems. This paper presents a perceptible description of the security threats, Blockchain based solutions, security characteristics and challenges introduced during the integration of Blockchain with IoT. An analysis of different …


Quantum Efficiency And Lifetime Study For Negative Electron Affinity Gaas Nanopillar Array Photocathode, Md Aziz Ar Rahman, Md Abdullah Mamun, Shukui Zhang, Hani E. Elsayed-Ali Jan 2023

Quantum Efficiency And Lifetime Study For Negative Electron Affinity Gaas Nanopillar Array Photocathode, Md Aziz Ar Rahman, Md Abdullah Mamun, Shukui Zhang, Hani E. Elsayed-Ali

Electrical & Computer Engineering Faculty Publications

Recent studies showed significant improvement in quantum efficiency (QE) by negative electron affinity (NEA) GaAs nanopillar array (NPA) photocathodes over their flat surface peers, particularly at 500 ─ 800 nm waveband. However, the underlying physics is yet to be well understood for further improvement in its performance. In this report, NEA GaAs NPA photocathodes with different dimensions were studied. The diameter of the nanopillars varied from 200 ─ 360 nm, the height varied from 230 ─ 1000 nm and the periodicity varied from 470 ─ 630 nm. The QE and photocathode lifetime were measured. Mie-resonance enhancement was observed at tunable …


Comparison Of Machine Learning Methods For Classification Of Alexithymia In Individuals With And Without Autism From Eye-Tracking Data, Furkan Iigin, Megan A. Witherow, Khan M. Iftekharuddin Jan 2023

Comparison Of Machine Learning Methods For Classification Of Alexithymia In Individuals With And Without Autism From Eye-Tracking Data, Furkan Iigin, Megan A. Witherow, Khan M. Iftekharuddin

Electrical & Computer Engineering Faculty Publications

Alexithymia describes a psychological state where individuals struggle with feeling and expressing their emotions. Individuals with alexithymia may also have a more difficult time understanding the emotions of others and may express atypical attention to the eyes when recognizing emotions. This is known to affect individuals with Autism Spectrum Disorder (ASD) differently than neurotypical (NT) individuals. Using a public data set of eye-tracking data from seventy individuals with and without autism who have been assessed for alexithymia, we train multiple traditional machine learning models for alexithymia classification including support vector machines, logistic regression, decision trees, random forest, and multilayer perceptron. …


Special Section Editorial: Artificial Intelligence For Medical Imaging In Clinical Practice, Claudia Mello-Thoms, Karen Drukker, Sian Taylor-Phillips, Khan Iftekharuddin, Marios Gavrielides Jan 2023

Special Section Editorial: Artificial Intelligence For Medical Imaging In Clinical Practice, Claudia Mello-Thoms, Karen Drukker, Sian Taylor-Phillips, Khan Iftekharuddin, Marios Gavrielides

Electrical & Computer Engineering Faculty Publications

This editorial introduces the JMI Special Section on Artificial Intelligence for Medical Imaging in Clinical Practice.


Implications Of Cyberbiosecurity In Advanced Agriculture, Simone Stephen, Keitavius Alexander, Lucas Potter, Xavier-Lewis Palmer Jan 2023

Implications Of Cyberbiosecurity In Advanced Agriculture, Simone Stephen, Keitavius Alexander, Lucas Potter, Xavier-Lewis Palmer

Electrical & Computer Engineering Faculty Publications

The world is currently undergoing a rapid digital transformation sometimes referred to as the fourth industrial revolution. During this transformation, it is increasingly clear that many scientific fields are not prepared for this change. One specific area is agriculture. As the sector which creates global food supply, this critical infrastructure requires detailed assessment and research via newly developed technologies (Millett et al, 2019; Peccoud et al, 2018) . Despite its fundamental significance to modern civilization, many aspects of industrial agriculture have not yet adapted to the digital world. This is evident in the many vulnerabilities currently present within agricultural systems, …


Electron Beam Treatment For The Removal Of 1,4-Dioxane In Water And Wastewater, Robert Pearce, Xi Li, John Vennekate, Gianluigi Ciovati, Charles Bott Jan 2023

Electron Beam Treatment For The Removal Of 1,4-Dioxane In Water And Wastewater, Robert Pearce, Xi Li, John Vennekate, Gianluigi Ciovati, Charles Bott

Electrical & Computer Engineering Faculty Publications

Electron beam (e-beam) treatment uses accelerated electrons to form oxidizing and reducing radicals when applied to water without the use of external chemicals. In this study, electron beam treatment was used to degrade 1,4-dioxane in several water matrices. Removal improved in the progressively cleaner water matrices and removals as high as 94% to 99% were observed at a dose of 2.3 kGy in secondary effluent. 1,4-dioxane removal was confirmed to be primarily through hydroxyl radical oxidation. The calculated electrical energy per order was found to be 0.53, 0.26, and 0.08 kWh/m3/order for secondary effluent (Avg. total organic carbon …


Elevation-Distributed Multistage Reverse Osmosis Desalination With Seawater Pumped Storage, Hani E. Elsayed-Ali Jan 2023

Elevation-Distributed Multistage Reverse Osmosis Desalination With Seawater Pumped Storage, Hani E. Elsayed-Ali

Electrical & Computer Engineering Faculty Publications

A seawater reverse osmosis (RO) plant layout based on multistage RO with stages located at different elevations above sea level is described. The plant uses the weight of a seawater column from pumped storage as head pressure for RO (gravity-driven multistage RO) or to supplement high-pressure pumps used in RO (gravity-assisted multistage RO). The use of gravitational force reduces the specific energy for RO compared to using high-pressure pumps. By locating the RO stages at different elevations based on demand sites, the total specific energy consumption for RO and permeate transport to different elevations above sea level is reduced from …


Light Auditor: Power Measurement Can Tell Private Data Leakage Through Iot Covert Channels, Woosub Jung, Kailai Cui, Kenneth Koltermann, Junjie Wang, Chunsheng Xin, Gang Zhou Jan 2023

Light Auditor: Power Measurement Can Tell Private Data Leakage Through Iot Covert Channels, Woosub Jung, Kailai Cui, Kenneth Koltermann, Junjie Wang, Chunsheng Xin, Gang Zhou

Electrical & Computer Engineering Faculty Publications

Despite many conveniences of using IoT devices, they have suffered from various attacks due to their weak security. Besides well-known botnet attacks, IoT devices are vulnerable to recent covert-channel attacks. However, no study to date has considered these IoT covert-channel attacks. Among these attacks, researchers have demonstrated exfiltrating users' private data by exploiting the smart bulb's capability of infrared emission.

In this paper, we propose a power-auditing-based system that defends the data exfiltration attack on the smart bulb as a case study. We first implement this infrared-based attack in a lab environment. With a newly-collected power consumption dataset, we pre-process …


Mwirgan: Unsupervised Visible-To Mwir Image Translation With Generative Adversarial Network, Mohammad Shahab Uddin, Chiman Kwan, Jiang Li Jan 2023

Mwirgan: Unsupervised Visible-To Mwir Image Translation With Generative Adversarial Network, Mohammad Shahab Uddin, Chiman Kwan, Jiang Li

Electrical & Computer Engineering Faculty Publications

Unsupervised image-to-image translation techniques have been used in many applications, including visible-to-Long-Wave Infrared (visible-to-LWIR) image translation, but very few papers have explored visible-to-Mid-Wave Infrared (visible-to-MWIR) image translation. In this paper, we investigated unsupervised visible-to-MWIR image translation using generative adversarial networks (GANs). We proposed a new model named MWIRGAN for visible-to-MWIR image translation in a fully unsupervised manner. We utilized a perceptual loss to leverage shape identification and location changes of the objects in the translation. The experimental results showed that MWIRGAN was capable of visible-to-MWIR image translation while preserving the object’s shape with proper enhancement in the translated images and …


Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty Jan 2023

Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty

Electrical & Computer Engineering Faculty Publications

There is a great demand for an efficient security framework which can secure IoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IoT considering the dynamic and distributed nature of IoT. This motivates the researchers to focus more on investigating the role of machine learning (ML) in the designing of security models. A brief analysis of different ML algorithms for IoT security is discussed along with the advantages and limitations of ML algorithms. Existing studies state that ML algorithms suffer from the problem of high computational overhead and risk of privacy leakage. …


Adaptive Critic Network For Person Tracking Using 3d Skeleton Data, Joseph G. Zalameda, Alex Glandon, Khan M. Iftekharuddin, Mohammad S. Alam (Ed.), Vijayan K. Asari (Ed.) Jan 2023

Adaptive Critic Network For Person Tracking Using 3d Skeleton Data, Joseph G. Zalameda, Alex Glandon, Khan M. Iftekharuddin, Mohammad S. Alam (Ed.), Vijayan K. Asari (Ed.)

Electrical & Computer Engineering Faculty Publications

Analysis of human gait using 3-dimensional co-occurrence skeleton joints extracted from Lidar sensor data has been shown a viable method for predicting person identity. The co-occurrence based networks rely on the spatial changes between frames of each joint in the skeleton data sequence. Normally, this data is obtained using a Lidar skeleton extraction method to estimate these co-occurrence features from raw Lidar frames, which can be prone to incorrect joint estimations when part of the body is occluded. These datasets can also be time consuming and expensive to collect and typically offer a small number of samples for training and …


Long-Range Aceo Phenomena In Microfluidic Channel, Diganta Dutta, Keifer Smith, Xavier Palmer Jan 2023

Long-Range Aceo Phenomena In Microfluidic Channel, Diganta Dutta, Keifer Smith, Xavier Palmer

Electrical & Computer Engineering Faculty Publications

Microfluidic devices are increasingly utilized in numerous industries, including that of medicine, for their abilities to pump and mix fluid at a microscale. Within these devices, microchannels paired with microelectrodes enable the mixing and transportation of ionized fluid. The ionization process charges the microchannel and manipulates the fluid with an electric field. Although complex in operation at the microscale, microchannels within microfluidic devices are easy to produce and economical. This paper uses simulations to convey helpful insights into the analysis of electrokinetic microfluidic device phenomena. The simulations in this paper use the Navier–Stokes and Poisson Nernst–Planck equations solved using COMSOL …


Deep-Learning-Based Classification Of Digitally Modulated Signals Using Capsule Networks And Cyclic Cumulants, John A. Snoap, Dimitrie C. Popescu, James A. Latshaw, Chad M. Spooner Jan 2023

Deep-Learning-Based Classification Of Digitally Modulated Signals Using Capsule Networks And Cyclic Cumulants, John A. Snoap, Dimitrie C. Popescu, James A. Latshaw, Chad M. Spooner

Electrical & Computer Engineering Faculty Publications

This paper presents a novel deep-learning (DL)-based approach for classifying digitally modulated signals, which involves the use of capsule networks (CAPs) together with the cyclic cumulant (CC) features of the signals. These were blindly estimated using cyclostationary signal processing (CSP) and were then input into the CAP for training and classification. The classification performance and the generalization abilities of the proposed approach were tested using two distinct datasets that contained the same types of digitally modulated signals, but had distinct generation parameters. The results showed that the classification of digitally modulated signals using CAPs and CCs proposed in the paper …


A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen Jan 2023

A Survey Of Using Machine Learning In Iot Security And The Challenges Faced By Researchers, Khawlah M. Harahsheh, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The Internet of Things (IoT) has become more popular in the last 15 years as it has significantly improved and gained control in multiple fields. We are nowadays surrounded by billions of IoT devices that directly integrate with our lives, some of them are at the center of our homes, and others control sensitive data such as military fields, healthcare, and datacenters, among others. This popularity makes factories and companies compete to produce and develop many types of those devices without caring about how secure they are. On the other hand, IoT is considered a good insecure environment for cyber …


Social-Engineering, Bio-Economies, And Nation-State Ontological Security: A Commentary, Brandon Griffin, Keitavius Alexander, Xavier-Lewis Palmer, Lucas Potter Jan 2023

Social-Engineering, Bio-Economies, And Nation-State Ontological Security: A Commentary, Brandon Griffin, Keitavius Alexander, Xavier-Lewis Palmer, Lucas Potter

Electrical & Computer Engineering Faculty Publications

Biocybersecurity is an evolving discipline that aims to identify the gaps and risks associated with the convergence of Biology (the science of life and living organisms) and cybersecurity (the science, study, and theory of cyberspace and cybernetics) to protect the bioeconomy. The biological industries’ increased reliance on digitization, automation, and computing power has resulted in benefits for the scientific community, it has simultaneously multiplied the risk factors associated with industrial espionage and the protection of data both commercial and proprietary. The sensitive and potentially destructive power of this data and its access inherently poses a risk to the national and …


A Reflection Of Typology And Verification Flaws In Consideration Of Biocybersecurity/Cyberbiosecurity: Just Another Gap In The Wall, Luke Potter, Kim Mossberg, Xavier Palmer Jan 2023

A Reflection Of Typology And Verification Flaws In Consideration Of Biocybersecurity/Cyberbiosecurity: Just Another Gap In The Wall, Luke Potter, Kim Mossberg, Xavier Palmer

Electrical & Computer Engineering Faculty Publications

Verification is central to any process in a functional and enduring cyber-secure organization. This verification is how the validity or accuracy of a state of being is assessed (Schlick, 1936; Balci, 1998). Conversely, breakdown in verification procedures is core to the interruption of normal operations for an organization. A key problem for organizations that utilize biology as an interlock within their systems is that personnel lack sufficient ability to verify all practically relevant biological information for procedures such as a nurse logging a blood draw, or a molecular biology technician preparing agar to culture microbes for study. This has several …


Is Cybersecurity Training Practical Or Not?, Bhawnish Sharma Dec 2022

Is Cybersecurity Training Practical Or Not?, Bhawnish Sharma

Cybersecurity Undergraduate Research Showcase

With technology growing, there has been an increase in cybercrime. Because of this, private and public sectors face global problems, i.e., phishing, security breaches, and identity theft. With cybersecurity software available on the internet, anyone can access it. As technology advances, cybersecurity experts must answer the tough question of, “is cybersecurity training practical or not”?


Federated Learning And Applications In Cybersecurity, Ani Sreekumar Dec 2022

Federated Learning And Applications In Cybersecurity, Ani Sreekumar

Cybersecurity Undergraduate Research Showcase

Machine learning is a subfield of artificial intelligence that focuses on making predictions about some outcome based on information from a dataset. In cybersecurity, machine learning is often used to improve intrusion detection systems and identify trends in data that could indicate an oncoming cyber attack. Data privacy is an extremely important aspect of cybersecurity, and there are many industries that have more demanding laws to ensure the security of user data. Due to these regulations, machine learning algorithms can not be widely utilized in these industries to improve outcomes and accuracy of predictions. However, federated learning is a recent …


Ethical Concerns In Self-Driving Cars, Victoria Shand Dec 2022

Ethical Concerns In Self-Driving Cars, Victoria Shand

Cybersecurity Undergraduate Research Showcase

Automobiles have been in existence since 1672 and only went up from there. Self-driving cars are a fantastic piece of technology; they can self-park, laser ranger finder, and near vision; they can map the road in advance, understand road signs, and, in some cases, handle certain variables on the road.

When talking about any form of technology, the possibilities are endless technology is a continuously evolving idea. When discussing self-driving cars, they have some fantastic and encouraging benefits and ideas. Some ideas would be that vehicles could communicate with each other, we could eliminate the need for traffic lights, and …


A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood Dec 2022

A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood

Cybersecurity Undergraduate Research Showcase

While autonomous vehicles accounted for about 31.4 million vehicles on the road in 2019 (Placek). They have continued to flood the market and have a projected growth to 58 million in just 8 years from now (Placek) As well as a market cap in the billions of dollars. Even the comparatively new AV company Tesla has over 3 times the market cap value of the leading non AV brand Toyota (Market Cap) who are also working toward AVs as well, like their level 2 teammate driver assistance. Following Moore’s Law, as technology continues to improve, their social impact and ethical …


Investigating Privacy Policies Using Policylint Tool, Tricia Camaya Dec 2022

Investigating Privacy Policies Using Policylint Tool, Tricia Camaya

Cybersecurity Undergraduate Research Showcase

Organizations essentially inform clients about data collection and sharing practices through privacy policies. Recent research has proposed tools to help users better comprehend these lengthy and intricate legal documents that summarize collection and sharing. However, these instruments have a significant flaw. They overlook the possibility of contradictions within a particular policy. This paper introduces PolicyLint, a tool for analyzing privacy policies that simultaneously considers negation and varying semantic levels of data objects and entities. PolicyLint accomplishes this by using sentence-level natural language processing to automatically create ontologies from a large corpus of privacy policies and capturing both positive and negative …


A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan Dec 2022

A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan

Cybersecurity Undergraduate Research Showcase

Since the 1980’s and creation of the World Wide Web, Internet utilization is a common and arguably, necessary, part of daily life. The internet is young and still relatively new, but as of 2016, 3.4 billion people were online, and that number has since grown [1]. This is a significant number, but as such a common part of daily life, how elements of the internet or its infrastructure work is complex. The world would very likely be thrown into dark ages if DNS or any other significant aspect of the internet's infrastructure were to succumb to an attack. The Colonial …


Measuring The Economic Impact Of Recurrent Flooding On Workforce Productivity And Property, Joshua G. Behr, Wie Yusuf, George Mcleod, Sarah Stafford, Derek Loftis, Afi Anuar, Rafael Diaz Dec 2022

Measuring The Economic Impact Of Recurrent Flooding On Workforce Productivity And Property, Joshua G. Behr, Wie Yusuf, George Mcleod, Sarah Stafford, Derek Loftis, Afi Anuar, Rafael Diaz

Presentations, Lectures, Posters, Reports

From the Executive Summary:

This research draws upon expertise across multiple disciplines and fields. Leveraged are natural systems data and social-behavioral data. The high-level objective is to advance our understanding of how very recent recurrent flooding has impacted residents within the City of Portsmouth, and then forecast these impacts under projections of sea level rise. While this research draws upon data for the City of Portsmouth, the findings may be generalized to the broader Hampton Roads region.


Npgreat: Assembly Of The Human Subtelomere Regions With The Use Of Ultralong Nanopore Reads And Linked Reads, Eleni Adam, Desh Ranjan, Harold Riethman Dec 2022

Npgreat: Assembly Of The Human Subtelomere Regions With The Use Of Ultralong Nanopore Reads And Linked Reads, Eleni Adam, Desh Ranjan, Harold Riethman

Computer Science Faculty Publications

Background: Human subtelomeric DNA regulates the length and stability of adjacent telomeres that are critical for cellular function, and contains many gene/pseudogene families. Large evolutionarily recent segmental duplications and associated structural variation in human subtelomeres has made complete sequencing and assembly of these regions difficult to impossible for many loci, complicating or precluding a wide range of genetic analyses to investigate their function.

Results: We present a hybrid assembly method, NanoPore Guided REgional Assembly Tool (NPGREAT), which combines Linked-Read data with mapped ultralong nanopore reads spanning subtelomeric segmental duplications to potentially overcome these difficulties. Linked-Read sets of DNA sequences identified …


Dual Energy Electron Storage Ring Cooler Design For Relativistic Ion Beams, Bhawin Dhital Dec 2022

Dual Energy Electron Storage Ring Cooler Design For Relativistic Ion Beams, Bhawin Dhital

Physics Theses & Dissertations

Collider experiments demand small beam emittances in order to achieve high luminosity. For light particles such as electrons, there exists a natural synchrotron radiation damping resulting in low emittance beams at equilibrium. In the case of heavy particle beams such as proton or ion beams, there is no significant synchrotron radiation damping effect and some cooling mechanism is needed to get to low emittance beams. A dual energy storage ring cooler is a novel concept proposed to cool hadron beams at higher energies. The design consists of two rings: a low energy ring and a high energy ring connected by …


Case Study Of A District-University Partnership: Developing Culturally Responsive Educators In A Rural Setting, Trenice Shauntel Durio Dec 2022

Case Study Of A District-University Partnership: Developing Culturally Responsive Educators In A Rural Setting, Trenice Shauntel Durio

Educational Leadership & Workforce Development Theses & Dissertations

Using a theoretical framework of critical race theory and conceptual frameworks of cultural education, this study explores the intersection of district-university partnerships and culturally responsive education. The purpose of this mixed methods case study was to examine the formulation and outcomes of a district-university partnership established to offer a college level course focused on anti-discrimination, equity and inclusion, and social justice in schools. Using survey data, I explored the relationship between participation in the course and the participants’ self-reflection in the areas of empathic concern and perspective taking, preparation for culturally responsive teaching and equitable practices, and comfortability with discussions …


Numerical Simulation Of Electroosmotic Flow Of Viscoelastic Fluid In Microchannel, Jianyu Ji Dec 2022

Numerical Simulation Of Electroosmotic Flow Of Viscoelastic Fluid In Microchannel, Jianyu Ji

Mechanical & Aerospace Engineering Theses & Dissertations

Electroosmotic flow (EOF) has been widely used in various biochemical microfluidic applications, many of which often involve the use of viscoelastic non-Newtonian fluids. Due to the existence of the elastic effect, the viscoelastic EOF develops into chaotic flow under extremely low Reynolds numbers, which is known as elastic turbulence. The mechanism of elastic turbulence in electroosmotic flow remains unclear. Numerical simulation plays an important role in understanding the mechanisms of elastic turbulence. This dissertation is aimed to study the EOF of viscoelastic fluids in constriction microchannels under various direct current (DC) and alternating current (AC) electric fields. First, the EOF …


Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque Dec 2022

Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque

Electrical & Computer Engineering Theses & Dissertations

Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components dealing with physical processes and real-time computations, along with networking. CPSs often incorporate approaches merging from different scientific fields such as embedded systems, control systems, operational technology, information technology systems (ITS), and cybernetics. Today critical infrastructures (CIs) (e.g., energy systems, electric grids, etc.) and other CPSs (e.g., manufacturing industries, autonomous transportation systems, etc.) are experiencing challenges in dealing with cyberattacks. Major cybersecurity concerns are rising around CPSs because of their ever-growing use of information technology based automation. Often the security concerns are limited to probability-based possible attack …


Kinetic Simulations Of Active Nematic Polymers In Channel Flow, Lacey Savoie Schenk Dec 2022

Kinetic Simulations Of Active Nematic Polymers In Channel Flow, Lacey Savoie Schenk

Mathematics & Statistics Theses & Dissertations

Suspensions of active nematic liquid crystalline polymers exhibit complex phenomena such as spontaneous flows, pattern formations, and defects. They have many applications in industry, commercial settings, and our daily lives. We employ the Kinetic Model for our research, an extensive model that couples the Smoluchowski Equation and the incompressible Navier-Stokes Equations to solve for the active nanorod number density function–a function dependent on the polymer’s physical orientation and space at a given time. Using this function, we can derive the polymer’s polarity and nematic orientations as well as other rheological properties. In this research, we conduct numerical simulations of active, …


A Relevance Model For Threat-Centric Ranking Of Cybersecurity Vulnerabilities, Corren G. Mccoy Dec 2022

A Relevance Model For Threat-Centric Ranking Of Cybersecurity Vulnerabilities, Corren G. Mccoy

Computer Science Theses & Dissertations

The relentless and often haphazard process of tracking and remediating vulnerabilities is a top concern for cybersecurity professionals. The key challenge they face is trying to identify a remediation scheme specific to in-house, organizational objectives. Without a strategy, the result is a patchwork of fixes applied to a tide of vulnerabilities, any one of which could be the single point of failure in an otherwise formidable defense. This means one of the biggest challenges in vulnerability management relates to prioritization. Given that so few vulnerabilities are a focus of real-world attacks, a practical remediation strategy is to identify vulnerabilities likely …