Recent Submissions

  • Cross-Spectral Biometric Performance Analysis on High-Resolution Face Images 

    Pandian Shanmuganathan, Praveen Kumar (2016-12)
    Biometrics is increasingly being used to authenticate the identity of individuals in critical use case devices like smart phones, laptops, and several other access-control systems in our day-to-day lives. Additionally, ...
  • Open Census for Addressing False Identity Attacks in Decentralized Social Networks 

    Qin, Song (2017-05)
    We address the problem of estimating the population of a given area (e.g., a city). Unlike a centralized census where identities are reported to a single principal agency (e.g., U.S. Census Bureau) and are stored on a ...
  • Digital Quorum Sensing for Self-Organizing Malware 

    Fioravanti, Mark Edward (2016-12)
    INTRODUCTION: Malware authors present an interesting problem for the security community as they evolve and adapt to overcome network and host defenses. The determined adversary is a special class of malware author who ...
  • Soteria: A Persuasive eSecurity Assistant 

    Bhardwaj, Punica (2016-12)
    “…security is only as good as the weakest link, and people are the weakest link in the chain.” – B Schneier, 2002 Humans are often referred to as the “weakest link” in the security chain because of the poor security ...
  • A Self-Organized Approach For Detecting Communities in Networks 

    Collingsworth, Bennett C (2016-12)
    The community structure of networks reveals hidden information about the whole network structure that cannot be discerned using other topological properties. Yet, the importance of identifying community structure in ...
  • Studies with Dynamic Nuclear Imaging Image Reconstruction Algorithm 

    Chang, Haoran (2016-12)
    Non-negative matrix factorization (NMF) is a useful method for those non-negative multivariate data. In nuclear imaging, NMF, which is also called factor analysis, is used to analyze the 4D image of positron emission ...
  • Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments 

    Alshehry, Badr (2016-12)
    Contemporary security systems attempt to provide protection against distributed denial-of-service (DDoS) attacks; however, they mostly use a variety of computing and hardware resources for load distribution and request ...
  • Robotic Arm Tracing Curves Recognized by Camera 

    Findling, Timothy Karl (2016-12)
    Applications such like soldering require robot arms to follow the soldering line as present on a surface. We assume here that the surface to be soldered is remote from the robotic arm, that the soldering is performed via ...