Master's Theses and Projects
Collections in this community
-
College of Engineering, SUNY Polytechnic Institute [44]
Collection of Master's Theses and Final Projects for Programs within the Department of Engineering, including computer science and network security
Recent Submissions
-
An Analysis of a Signature-based Approach for an Intrusion Detection System in a Wireless Body Area Network (WBAN) using Data Mining Techniques
(SUNY Polytechnic Institute, 2020)Wireless Body Area Networks (WBANs) use biosensors worn on, or in the human body, which collect and monitor a patient’s medical condition. WBANs have become increasingly more beneficial in the medical field by lowering ... -
An Empirical Wi-Fi Intrusion Detection System
(SUNY Polytechnic Institute, 2020-05)Today, the wireless network devices are growing rapidly, and it is of utmost importance for securing those devices. Attackers or hackers use new methods and techniques to trick the system and steal the most important data. ... -
5G Networks Security: Attack Detection Using the J48 and the Random Forest Tree Classifiers
(SUNY Polytechnic Institute, 2020)5G is the next generation of cellular networks succeeding and improving upon the last generation of 4G Long Term Evolution (LTE) networks. With the introduction of 5G comes significant improvements over the previous ... -
Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems
(SUNY Polytechnic Institute, 2020)In this report, we discuss some of our hacking and security solutions that we developed at our Advanced Cybersecurity Research Lab (ACRL). This report consists of the following five main experimental packages: 1) Exploiting ... -
?Generic Datasets, Beamforming Vectors Prediction of 5G Celleular Networks
(SUNY Polytechnic Institute, 2020)The early stages of 5G evolution revolves around delivering higher data speeds, latency improvements and the functional redesign of mobile networks to enable greater agility, efficiency and openness. The millimeter-wave ... -
A Wireless Intrusion Detection for the Next Generation (5G) Networks
(SUNY Polytechnic Institute, 2020-05)5G data systems are closed to delivery to the public. The question remains how security will impact the release of this cutting edge architecture. 5G data systems will be sending massive amounts of personal data due to the ... -
Cyber Security Advantages of Optical Communications in SATCOM Networks
(SUNY Polytechnic Institute, 2020-12)Space-based communications, whether it is ground-to-space or inter-satellite communications, have so far been primarily within the RF spectrum. With the increase in space missions and the need for larger amounts of data ... -
Evaluating Variant Deep Learning and Machine Learning Approaches for the Detection of Cyberattacks on the Next Generation 5G Systems
(SUNY Polytechnic Institute, 2020)5G technology promises to completely transform telecommunication networks, introducing a wealth of benefits such as faster download speeds, lower download times, low latency, high network capacity. These benefits will pave ... -
A Genetic Algorithm for Locating Acceptable Structure Models of Systems (Reconstructability Analysis)
(2018-05)The emergence of the field of General Systems Theory (GST) can be best attributed to the belief that all systems, irrespective of context, share simple, organizational principles capable of being mathematically modeled w ... -
SECURITY CHALLENGES IN SDN IMPLEMENTATION
(2018-05)This study analyzes how security challenges caused by data and control layer separation in the SDN, such as Denial of Service attacks and unauthorized access attacks, limit SDN deployment. This study also offers network ... -
Password Habits of Security Literate Individuals
(2018-05)In the age of the Internet, the common user has accounts on multiple websites. Basic account authentication has a username and a password. While username may be common knowledge, passwords are secret, and it is important ... -
OBJECT ORIENTED ARTIFICIAL NEURAL NETWORK SIMULATOR IN TEXT AND SYMBOL RECOGNITION
(1993)Objected oriented languages and artificial neural networks are new areas of research and development. This thesis investigates the application of artificial neural networks using an object oriented C++ backpropagation ... -
Applicability of the Julia Programming Language to Forward Error-Correction Coding in Digital Communications Systems
(2018-05)Traditionally SDR has been implemented in C and C++ for execution speed and processor efficiency. Interpreted and high-level languages were considered too slow to handle the challenges of digital signal processing (DSP). ... -
NYS Fair Events Mobile Application With Client-Side Caching
(2017-12)NYS Fair Events collects data about fair events which happen in New York state throughout the year, bundles them, displays the upcoming events and useful information about the event itself, the weather and forecast prediction, ... -
Social Media Emoji Analysis, Correlations and Trust Modeling
(2018-01-18)Twitter is an ever-growing social-media platform where users post tweets, or small messages, for all of their followers to see and react to. This is old news of course, as the platform first launched over ten years ago. ... -
Comparison of Network Switch Architectures by CISCO
(2016-02-01)This project is targeted to compare two major switching architectures provided by CISCO. CISCO is a network device manufacturer who has contributed to networking world by inventing many networking protocols which are used ... -
The Deep Space Network - A Technology Case Study and What Improvements to the Deep Space Network are Needed to Support Crewed Missions to Mars?
(2017-05-28)The purpose of this thesis research is to find out what experts and interested people think about Deep Space Network (DSN) technology for the crewed Mars mission in the future. The research document also addresses possible ... -
A Technology Case Study on Integrating Open Stack with SDN for Internet Connectivity using BGP
(2016-12)There were many developments in Internet usage, which resulted in significant increase in Internet routing. With existing networking infrastructure, it is difficult to meet these requirements and causing more cost and less ... -
A Normative Architecture for an Online Agent-Based Healthcare System
(2017-05)In this thesis, we envisage an opportunistic Multi-Agent System (MAS) system in Health Care Domain by using wearable and ingestible body sensors. This thesis develops an integrated and an emergent normative logical collection, ... -
Accessible Formal Methods: A Study of the Java Modeling Language
(2017-04-17)While formal methods offer the highest level of confidence that software behaves as intended, they are notoriously difficult to use. The Java Modeling Language and the associated OpenJML tool aim to make formal specification ...