Now showing items 35-44 of 44

    • Secure Routing in Mobile Ad-hoc Networks 

      Jadhav, Sumedh; Hash, Larry; Adviser (2016-05-01)
      The detailed study investigates the various problems faced by Mobile Ad hoc Networks because of their inherent characteristics. The characteristics make these networks vulnerable to various attacks. The attack known to be ...
    • SECURITY CHALLENGES IN SDN IMPLEMENTATION 

      Patil, Pradnya; Hash, Larry; Advisor; White, Joshua; Reviewer; Tekeoglu, Ali, Reviewer (2018-05)
      This study analyzes how security challenges caused by data and control layer separation in the SDN, such as Denial of Service attacks and unauthorized access attacks, limit SDN deployment. This study also offers network ...
    • Social Media Emoji Analysis, Correlations and Trust Modeling 

      Preisendorfer, Matthew; Sengupta, Sam; Adviser; White, Joshua; Adviser; Tekeoglu, Ali; Adviser (2018-01-18)
      Twitter is an ever-growing social-media platform where users post tweets, or small messages, for all of their followers to see and react to. This is old news of course, as the platform first launched over ten years ago. ...
    • Spanning Tree Protocol 

      Kasu, Sivalasya; Hash, Larry; Adviser; Marsh, John; Reviewer; Bull, Ronny; Reviewer (2015-05-21)
      This technology case study focuses on Spanning Tree Protocol (STP). The Spanning Tree Protocol is a layer2 protocol that ensures a loop free topology for any LAN network. The basic function of STP is to prevent loops in ...
    • Study of Brain Computer Interfacing (BCI) with Cochlear Implant as an Example 

      Roy, Debsuta; Hash, Larry; Advisor (2016-08)
      Brain Computer interfacing (BCI) has been under constant research to improvise the pathway amongst the brain and outside subject in several characteristics. This technology is being widely appreciated as the world tends ...
    • Swarm Intelligence in the Multi Agent System Environment 

      Bollam, Sravani; Sengupta, Saumendra; Adviser; Chiang, Chen-Fu; Reviewer; Rezk, Mohamed; Reviewer (2016-12-20)
      This thesis is focused on the use of naturally occurring concept of “swarm intelligence” to multiagentcsystems, namely the relatively new system-theoretic framework known as Swarm Intelligence Systems (SIS). In this work, ...
    • A Technology Case Study on Integrating Open Stack with SDN for Internet Connectivity using BGP 

      Gonuguntla, Raja Bhushan Rao; Hash, Larry; Advisor (2016-12)
      There were many developments in Internet usage, which resulted in significant increase in Internet routing. With existing networking infrastructure, it is difficult to meet these requirements and causing more cost and less ...
    • Technology Case Study on Web Real-Time Communications (WebRTC) 

      Karnati, Nagarjuna; Hash, Larry; Adviser (2016-05-01)
      Web real-time communication (WebRTC) is the latest technology standard which enables web browsers to communicate directly without having to install any internal or external plug-ins. WebRTC fills a critical gap in the web ...
    • What Do Customers Really Seek From Their Mobile Service Providers? 

      Ramkrishna, Deepa; Hash, Larry; Adviser; Marsh, John; Reviewer (2016-12-17)
      With the number of smartphone and wireless internet users set to increase at a rapid pace over the next few years, there is an increased need for a next generation mobile wireless technology such as 5G. Before discussing ...
    • A Wireless Intrusion Detection for the Next Generation (5G) Networks 

      Ferrucci, Richard; Kholidy, Hisham A.; Advisor (SUNY Polytechnic Institute, 2020-05)
      5G data systems are closed to delivery to the public. The question remains how security will impact the release of this cutting edge architecture. 5G data systems will be sending massive amounts of personal data due to the ...