Now showing items 24-36 of 36

    • Password Habits of Security Literate Individuals 

      Mahesh, Namrata; Hash, Larry; Advisor; Marsh, John; Reviewer; White, Joshua; Reviewer (2018-05)
      In the age of the Internet, the common user has accounts on multiple websites. Basic account authentication has a username and a password. While username may be common knowledge, passwords are secret, and it is important ...
    • People’s Perception of Smart Home Devices in their Homes & the Factors which Influence this Perception 

      Thakur, Versha; Hash, Larry; Adviser; Marsh, John; Reviewer; Tekeoglu, Ali; Reviewer (2016-12-01)
      This thesis is to determine people’s perception of Smart home devices and the factors which influence this perception. Smart Home devices are becoming more common as many companies are launching various such devices. ...
    • Representational State Transfer as a Web Service 

      Desai, Dhruv; Sengupta, Sam; Adviser; Novillo, Jorge; Reviewer; Andriamanalimanana, Bruno; Reviewer (2015-12-01)
      This report is a study on Representational State Transfer architectural style and its usefulness for implementing web service. This report will highlight the differences in perceiving REST as an architectural style and as ...
    • Routing Protocols for MANETs 

      Muchintala, Priyanka Reddy; Hash, Larry; Advisor (2016-08)
      This technology case study focuses on the routing protocols used in mobile ad-hoc networks. For any wireless ad-hoc network, routing is the main concept. Proactive and reactive routing protocols are two such approaches. ...
    • Secure Routing in Mobile Ad-hoc Networks 

      Jadhav, Sumedh; Hash, Larry; Adviser (2016-05-01)
      The detailed study investigates the various problems faced by Mobile Ad hoc Networks because of their inherent characteristics. The characteristics make these networks vulnerable to various attacks. The attack known to be ...
    • SECURITY CHALLENGES IN SDN IMPLEMENTATION 

      Patil, Pradnya; Hash, Larry; Advisor; White, Joshua; Reviewer; Tekeoglu, Ali, Reviewer (2018-05)
      This study analyzes how security challenges caused by data and control layer separation in the SDN, such as Denial of Service attacks and unauthorized access attacks, limit SDN deployment. This study also offers network ...
    • Social Media Emoji Analysis, Correlations and Trust Modeling 

      Preisendorfer, Matthew; Sengupta, Sam; Adviser; White, Joshua; Adviser; Tekeoglu, Ali; Adviser (2018-01-18)
      Twitter is an ever-growing social-media platform where users post tweets, or small messages, for all of their followers to see and react to. This is old news of course, as the platform first launched over ten years ago. ...
    • Spanning Tree Protocol 

      Kasu, Sivalasya; Hash, Larry; Adviser; Marsh, John; Reviewer; Bull, Ronny; Reviewer (2015-05-21)
      This technology case study focuses on Spanning Tree Protocol (STP). The Spanning Tree Protocol is a layer2 protocol that ensures a loop free topology for any LAN network. The basic function of STP is to prevent loops in ...
    • Study of Brain Computer Interfacing (BCI) with Cochlear Implant as an Example 

      Roy, Debsuta; Hash, Larry; Advisor (2016-08)
      Brain Computer interfacing (BCI) has been under constant research to improvise the pathway amongst the brain and outside subject in several characteristics. This technology is being widely appreciated as the world tends ...
    • Swarm Intelligence in the Multi Agent System Environment 

      Bollam, Sravani; Sengupta, Saumendra; Adviser; Chiang, Chen-Fu; Reviewer; Rezk, Mohamed; Reviewer (2016-12-20)
      This thesis is focused on the use of naturally occurring concept of “swarm intelligence” to multiagentcsystems, namely the relatively new system-theoretic framework known as Swarm Intelligence Systems (SIS). In this work, ...
    • A Technology Case Study on Integrating Open Stack with SDN for Internet Connectivity using BGP 

      Gonuguntla, Raja Bhushan Rao; Hash, Larry; Advisor (2016-12)
      There were many developments in Internet usage, which resulted in significant increase in Internet routing. With existing networking infrastructure, it is difficult to meet these requirements and causing more cost and less ...
    • Technology Case Study on Web Real-Time Communications (WebRTC) 

      Karnati, Nagarjuna; Hash, Larry; Adviser (2016-05-01)
      Web real-time communication (WebRTC) is the latest technology standard which enables web browsers to communicate directly without having to install any internal or external plug-ins. WebRTC fills a critical gap in the web ...
    • What Do Customers Really Seek From Their Mobile Service Providers? 

      Ramkrishna, Deepa; Hash, Larry; Adviser; Marsh, John; Reviewer (2016-12-17)
      With the number of smartphone and wireless internet users set to increase at a rapid pace over the next few years, there is an increased need for a next generation mobile wireless technology such as 5G. Before discussing ...