Welcome to the SUNY Digital Repository
The SUNY Digital Repository (SDR) is a centrally managed online repository that stores, indexes, and makes available materials with a focus on historical and special collections from SUNY campuses and SUNY System Administration. The SDR also includes Open Educational Resources (OER) Collections and reports from the Innovative Instructional Technology Grants (IITG). Select a community listed below to browse its collections. Please note, there is also the SUNY Open Access Repository (SOAR) that makes available open access scholarly and creative works of SUNY faculty, students, and staff.
Communities in DSpace
Select a community to browse its collections.
Monroe Community College [962]
Stony Brook University [14160]
SUNY Adirondack [405]
SUNY Canton [1]
SUNY Cobleskill [261]
SUNY College at Cortland [475]
SUNY College at Fredonia [1263]
SUNY College at Oswego [1125]
SUNY College at Purchase [245]
SUNY Morrisville [1]
SUNY OER Repository [197]
SUNY Old Westbury [21]
SUNY Oneonta [13]
SUNY Plattsburgh [338]
SUNY System Administration [1204]
University at Albany [48]
Recently Added
-
An Analysis of a Signature-based Approach for an Intrusion Detection System in a Wireless Body Area Network (WBAN) using Data Mining Techniques
(SUNY Polytechnic Institute, 2020)Wireless Body Area Networks (WBANs) use biosensors worn on, or in the human body, which collect and monitor a patient’s medical condition. WBANs have become increasingly more beneficial in the medical field by lowering ... -
An Empirical Wi-Fi Intrusion Detection System
(SUNY Polytechnic Institute, 2020-05)Today, the wireless network devices are growing rapidly, and it is of utmost importance for securing those devices. Attackers or hackers use new methods and techniques to trick the system and steal the most important data. ... -
5G Networks Security: Attack Detection Using the J48 and the Random Forest Tree Classifiers
(SUNY Polytechnic Institute, 2020)5G is the next generation of cellular networks succeeding and improving upon the last generation of 4G Long Term Evolution (LTE) networks. With the introduction of 5G comes significant improvements over the previous ... -
Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems
(SUNY Polytechnic Institute, 2020)In this report, we discuss some of our hacking and security solutions that we developed at our Advanced Cybersecurity Research Lab (ACRL). This report consists of the following five main experimental packages: 1) Exploiting ... -
?Generic Datasets, Beamforming Vectors Prediction of 5G Celleular Networks
(SUNY Polytechnic Institute, 2020)The early stages of 5G evolution revolves around delivering higher data speeds, latency improvements and the functional redesign of mobile networks to enable greater agility, efficiency and openness. The millimeter-wave ...