Browsing Electronic Theses and Dissertations by Author "El-Khatib, Khalil"
Now showing items 1-14 of 14
-
Cluster-based target tracking in vehicular ad hoc networks
Khakpour, Sanaz (2015-01-01)Recently Vehicular Ad-hoc Networks (VANETs) have drawn the attention of academic and industry researchers due to their potential applications in enabling Intelligent Transportation System (ITS), including safe driving, ... -
Community-oriented architecture for smart cities
Jalali, Roozbeh (2017-12-01)With the widespread use of smartphone devices, a surge in mobile sensing, progress in wireless communication and networking techniques, as well as the development of the Internet of Things (IoT) and cloud computing, ... -
Determining optimal flight paths for cellular network connectivity for the transmission of real-time physiological data in support of big data analytics during airborne critical care transport
Greer, Robert (2017-02-01)This thesis presents a methodology for determining the optimal flight paths between two geographical points based on distance and cellular reception over the path. This methodology consists of two main concepts: coverage ... -
DL-based defense against polymorphic network attacks
Sabeel, Ulya (2024-01-01)Network security is of vital importance in our world dominated by internet systems. These systems are vulnerable to large-scale rapidly evolving attacks by sophisticated cyber attackers who can have an upper edge over the ... -
MAVIDS: an intelligent intrusion detection system for autonomous unmanned aerial vehicles
Whelan, Jason P. (2021-07-01)Unmanned Aerial Vehicles (UAVs) face a large threat landscape, being used in numerous industries in hostile environments while relying on wireless communication. As attacks against UAVs increase, an intelligent Intrusion ... -
A mixed-method approach to analyze the robustness of natural language processing classifiers
Laughlin, Brandon (2021-04-01)Natural language processing algorithms (NLP) have become an essential approach for processing large amounts of textual information with applications such as spam, phishing and content moderation. Malicious actors can craft ... -
On the potential of intent-based access control (IBAC) in preventing insider threats
Almehmadi, Abdulaziz (2015-11-01)Existing access control mechanisms are based on the concepts of identity enrollment and recognition, and assume that recognized identity is synonymous with ethical actions. However, statistics over the years show that the ... -
Publish-subscribe based middleware for heterogeneous critical infrastructure systems communication.
Okathe, Titus (2014-07-01)Critical Infrastructures (CIs) are physical assets and organizations responsible for the production and distribution of society’s vital goods and services. The increasing interconnection of CIs has resulted in interdependencies ... -
Spectrum sensing based on capon power spectral density estimation
Mohammed, Ola Ashour (2015-04-01)Cognitive radio (CR) technology has evolved to solve the spectrum scarcity problem and improve spectrum utilization. Spectrum sensing is a CR function that allows secondary users to efficiently utilize the spectrum without ... -
Towards measuring privacy
Kosa, Tracy Ann (2015-04-01)The acceptable threshold for privacy is an individual choice, informed by culture, tradition and experience. That it is important, conversely, is self-evident. We use it to moderate personal information disclosure, how ... -
UniNet: A mixed reality driving simulator
Arppe, David F. (2019-08-01)Driving simulators play an important role in vehicle research. However, existing virtual reality simulators do not give users a true sense of presence. UniNet is our driving simulator, designed to allow users to interact ... -
An unmanned aerial vehicle-based assessment method for quantifying computer vision models
Hills, Zachary (2019-04-01)Computer vision is a growing field in computer science. Since the advancement of Machine learning, Computer vision solutions have been trending. As a result of the growing number of solutions and performance increases in ... -
Using detection in depth to counter SCADA-specific advanced persistent threats
Hayes, Garrett (2014-04-01)A heavy focus has recently been placed on the current state of each country’s critical infrastructure security. Unfortunately, widely deployed supervisory control and data acquisition (SCADA) protocols provide little ... -
Vehicular infotainment forensics: collecting data and putting it into perspective
Lacroix, Jesse (2017-01-01)In today’s transportation system, countless numbers of vehicles are on the road and later generations have become mobile computers. Vehicles now have embedded infotainment systems that enable user-friendliness and ...