Master's Theses and Projects: Recent submissions
Now showing items 1-20 of 171
-
An Analysis of a Signature-based Approach for an Intrusion Detection System in a Wireless Body Area Network (WBAN) using Data Mining Techniques
(SUNY Polytechnic Institute, 2020)Wireless Body Area Networks (WBANs) use biosensors worn on, or in the human body, which collect and monitor a patient’s medical condition. WBANs have become increasingly more beneficial in the medical field by lowering ... -
An Empirical Wi-Fi Intrusion Detection System
(SUNY Polytechnic Institute, 2020-05)Today, the wireless network devices are growing rapidly, and it is of utmost importance for securing those devices. Attackers or hackers use new methods and techniques to trick the system and steal the most important data. ... -
5G Networks Security: Attack Detection Using the J48 and the Random Forest Tree Classifiers
(SUNY Polytechnic Institute, 2020)5G is the next generation of cellular networks succeeding and improving upon the last generation of 4G Long Term Evolution (LTE) networks. With the introduction of 5G comes significant improvements over the previous ... -
Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems
(SUNY Polytechnic Institute, 2020)In this report, we discuss some of our hacking and security solutions that we developed at our Advanced Cybersecurity Research Lab (ACRL). This report consists of the following five main experimental packages: 1) Exploiting ... -
?Generic Datasets, Beamforming Vectors Prediction of 5G Celleular Networks
(SUNY Polytechnic Institute, 2020)The early stages of 5G evolution revolves around delivering higher data speeds, latency improvements and the functional redesign of mobile networks to enable greater agility, efficiency and openness. The millimeter-wave ... -
A Wireless Intrusion Detection for the Next Generation (5G) Networks
(SUNY Polytechnic Institute, 2020-05)5G data systems are closed to delivery to the public. The question remains how security will impact the release of this cutting edge architecture. 5G data systems will be sending massive amounts of personal data due to the ... -
Cyber Security Advantages of Optical Communications in SATCOM Networks
(SUNY Polytechnic Institute, 2020-12)Space-based communications, whether it is ground-to-space or inter-satellite communications, have so far been primarily within the RF spectrum. With the increase in space missions and the need for larger amounts of data ... -
Evaluating Variant Deep Learning and Machine Learning Approaches for the Detection of Cyberattacks on the Next Generation 5G Systems
(SUNY Polytechnic Institute, 2020)5G technology promises to completely transform telecommunication networks, introducing a wealth of benefits such as faster download speeds, lower download times, low latency, high network capacity. These benefits will pave ... -
Building an Educational Website Dedicated to the Study of Violent Crime Perpetuated Through Social Media
(2019-04)Computing technology has taken over every aspect of life, from business to socializing, the world is entirely dependent on the Internet. Social engineering, hacking, and phishing attempts have made protecting private ... -
Using Video Tutorials to Aid Coherence of Failed or Unchangeable Designs
(2019-05)Information design exists to convey information to users. When users have trouble understanding or using the information, the design has failed its primary purpose (Katz 17). When a design has failed and cannot be ... -
Validating Network Security with Predictive Analytics: A Design Guide to Bridge Stochastic Modeling into a Computationally Intelligent Dashboard
(2019-05)Network posture has historically relied on traditional and reactionary methods for protection. These methods most commonly consist of network segmentation, intrusion detection systems, intrusion prevention systems, and ... -
A Genetic Algorithm for Locating Acceptable Structure Models of Systems (Reconstructability Analysis)
(2018-05)The emergence of the field of General Systems Theory (GST) can be best attributed to the belief that all systems, irrespective of context, share simple, organizational principles capable of being mathematically modeled w ... -
Enhancing Community and Creating Unity Using a Mobile Application
(SUNY Polytechnic Institute, 2019-05)This project involves the creation of a prototype mobile application for a multi-cultural community center in Utica, NY, the Midtown Utica Community Center (MUCC). It is an inclusive multicultural and refugee-friendly space ... -
The Synchronological Charting of The Evolution of Electronic Communications
(SUNY Polytechnic Institute, 2019-05)From 1850s to the present time, electronic communications have been evolving from the analog transmission of harmonics over a singular wire connected to boxes with a single hole for transmitting and receiving to texting, ... -
Designing an Educational Game Application for Learning Receptive Fingerspelling
(SUNY Polytechnic Institute, 2019-05)The goal of this project is to design an educational game application to learn receptive fingerspelling. The design product is presented as a series of screenshots and diagrams in these pages and also as an online interactive ... -
Design of an Online Technical Communication Course Using the Open SUNY Online Course Quality Rubric
(SUNY Polytechnic Institute, 2019-05)This project is a one-semester, online technical communication class for undergraduates at a four-year university. The audience includes students who are taking the class to learn about writing but who generally have majors ... -
E-Orientation for Clinton Community College
(SUNY Polytechnic Institute, 2019-05)Clinton Community College has faced continued declining enrollments for the last five years, resulting in the College’s active pursuit of proven student retention mechanisms to assist with enrollment stabilization. The ... -
SECURITY CHALLENGES IN SDN IMPLEMENTATION
(2018-05)This study analyzes how security challenges caused by data and control layer separation in the SDN, such as Denial of Service attacks and unauthorized access attacks, limit SDN deployment. This study also offers network ... -
Password Habits of Security Literate Individuals
(2018-05)In the age of the Internet, the common user has accounts on multiple websites. Basic account authentication has a username and a password. While username may be common knowledge, passwords are secret, and it is important ... -
OBJECT ORIENTED ARTIFICIAL NEURAL NETWORK SIMULATOR IN TEXT AND SYMBOL RECOGNITION
(1993)Objected oriented languages and artificial neural networks are new areas of research and development. This thesis investigates the application of artificial neural networks using an object oriented C++ backpropagation ...