Browsing by Author "Lin, Xiaodong"
Now showing items 1-12 of 12
-
Component-based modeling for Android application testing
Gao, Yatian (2017-04-01)The rising popularity of Android and the component-based structure of its apps have motivated the need for automated model-based testing techniques on Android plat- form. Prior researches have primarily focused on the ... -
Data hiding and detection in Office Open XML (OOXML) documents
Raffay, Mohammad Ali (2011-03-01)With the rapid development and popularity of information technology, criminals and mischievous computer users are given avenues to commit crimes and malicious activities. One of the commonly used tactics, called steganography, ... -
Detecting vulnerabilities of broadcast receivers in Android applications
Tian, Di (2016-01-01)As being a representative mobile operating system in the world, Android OS has been part of users' daily life. Unfortunately, the rapid expansion of Android third-markets introduces malware aiming at Android applications ... -
E-fencing detection: mining online classified ad websites for stolen property.
Carver, Christopher (2014-09-01)With the emergence of e-fencing, there presents a need to automate both the detection of ads selling stolen property and the reporting process for victims. This thesis presents a framework that dynamically retrieves and ... -
Forensic analysis of unallocated space
Lei, Zhenxing (2011-06-01)Computer forensics has become an important technology in providing evidence in investigations of computer misuse, attacks against computer systems and more traditional crimes like money laundering and fraud where digital ... -
A framework for privacy-preserving data sharing in smart grid
Alharbi, Khalid (2016-01-01)While smart grid introduces a lot of enhancements to the traditional power grid and improves managing and controlling consumers demands, it also introduces security and privacy issues. Therefore, failure to address them ... -
Genetic sun shadow positioning model for digital forensics
Zhou, Yanwen (2017-11-07)Extensively growing a set of methodologies to collect, provide, and analyze geoinformation in this decade. While due to the privacy concerns or elevated consideration, only less than half of videos and pictures bring ... -
Secure and compromise-resilient architecture for advanced metering infrastructure
Alfaheid, Khalid (2011-03-01)In recent years, the Smart Grid has grown to be the solution for future electrical energy that promises to avoid blackouts as well as to be energy efficient, environmentally and customer-friendly. In Smart Grid, the ... -
Secure and privacy-preserving fog-assisted vehicular crowdsensing
Basudan, Sultan (2018-08-01)Vehicular crowdsensing (VCS) is an emerging paradigm where vehicles use onboard sensors to collect and share data with the aim of measuring phenomena of common interest. VCS has allowed for automated control as well as ... -
A secure and privacy-preserving incentive framework for vehicular cloud
Alamer, Abdulrahman (2018-04-01)Vehicular Cloud Computing (VCC) plays a critical role in data generation where a large number of vehicles collect various kinds of sensing resources with large-volume features. While the information that should be collected ... -
Social-based trustworthy data forwarding in vehicular delay tolerant networks
Alganas, Abdulelah (2011-03-01)Vehicular ad hoc network (VANET) is an emerging new communication technol-ogy which has attracted a lot of research attention from academic community and indus-try. For many applications in VANETs, information has to be ... -
Towards secure and privacy preserving e-health data exchanges through consent based access control
Bacchus, Abel Bradley Saed (2017-09-01)How we administer healthcare continues to evolve alongside the advancement of information technology. As we become more connected, the Internet of Things and our want to share information in a timely manner encourage us ...