Purdue Federal Credit Union

Displaying 1-40 of 104 results

  • White Papers // Jan 2014

    A Fine-Grain Parallel Architecture Based on Barrier Synchronization

    Although barrier synchronization has long been considered a useful construct for parallel programming, it has generally been either layered on top of a communication system or used as a completely independent mechanism. Instead, the authors propose that all communication be made a side-effect of barrier synchronization. This is done by...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Parallel Dispatch Queue: A Queue-Based Programming Abstraction to Parallelize Fine-Grain Communication Protocols

    In this paper, the authors propose a novel queue-based programming abstraction, Parallel Dispatch Queue (PDQ) that enables efficient parallel execution of fine-grain software communication protocols. Parallel systems often use fine-grain software handlers to integrate a network message into computation. Executing such handlers in parallel requires access synchronization around resources. Much...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Sirocco: Cost-Effective Fine-Grain Distributed Shared Memory

    Software Fine-Grain Distributed Shared Memory (FGDSM) provides a simplified shared-memory programming interface with minimal or no hardware support. Originally software FGDSMs targeted uniprocessor-node parallel machines. This paper presents Sirocco, a family of software FGDSMs implemented on a network of low-cost SMPs. Sirocco takes full advantage of SMP nodes by implementing...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2014

    Effective Management of DRAM Bandwidth in Multicore Processors

    The two technology trends of increasing transistors per die and limited power budgets have driven every major processor vendor to multicore architectures. Technology trends are leading to increasing number of cores on chip. All these cores inherently share the DRAM bandwidth. The on-chip cache resources are limited and in many...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2013

    Parallel Maximum Clique Algorithms With Applications to Network Analysis and Storage

    The authors propose a fast, parallel maximum clique algorithm for large sparse graphs that is designed to exploit characteristics of social and information networks. The method exhibits a roughly linear runtime scaling over real-world networks ranging from 1000 to 100 million nodes. In a test on a social network with...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2013

    Network Hypothesis Testing Using Mixed Kronecker Product Graph Models

    The recent interest in networks - social, physical, communication, information, etc. - has fueled a great deal of research on the analysis and modeling of graphs. However, many of the analyses have focused on a single large network (e.g., a sub-network sampled from Facebook). Although several studies have compared networks...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2013

    IntroLib: Efficient and Transparent Library Call Introspection for Malware Forensics

    Dynamic malware analysis aims at revealing malware's runtime behavior. To evade analysis, advanced malware is able to detect the underlying analysis tool (e.g., one based on emulation.) On the other hand, existing malware-transparent analysis tools incur significant performance overhead, making them unsuitable for live malware monitoring and forensics. In this...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2013

    Balancing Privacy and Fidelity in Packet Traces for Security Evaluation

    Security mechanisms, such as firewalls and intrusion detection systems, protect networks by generating security alarms and possibly filtering attack traffic, according to a specified security policy. Evaluation of such security mechanisms remains a challenge. In this paper, the authors examine the problem of compiling a set of high fidelity traffic...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2013

    EasyScale: Easy Mapping for Large-Scale Network Security Experiments

    Network emulation enables network security evaluation using unmodified implementations. Experimental fidelity with emulation is higher than simulation through the integration of real hardware and systems, but the scalability of emulation testbeds is limited. Scaling techniques such as virtualization and real-time simulation enable larger scale experiments. Using scaling techniques for network...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    Exploring Smart Grid and Data Center Interactions for Electric Power Load Balancing

    The operation of a data center consumes a tremendous amount of electricity, and the energy cost accounts for a large portion of the data center's operation cost. This leads to a growing interest towards reducing the energy cost of data centers. One approach advocated in recent studies is to distribute...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    vTurbo: Accelerating Virtual Machine I/O Processing Using Designated Turbo-Sliced Core

    In a Virtual Machine (VM) consolidation environment, it has been observed that CPU sharing among multiple VMs will lead to I/O processing latency because of the CPU access latency experienced by each VM. In this paper, the authors present vTurbo, a system that accelerates I/O processing for VMs by offloading...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2013

    Using Systems Thinking to Teach ERP Project Implementation (TERPPJ)

    This paper presents a system model of ERP implementation based on now-a-days case study and literatures. The relationships in the model are designed to be simple and functional and do not necessarily represent any particular business environments. It is meant to be a generic ERP implementation conceptual model with implications...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2013

    Coordinating Accessibility versus Restrictions in Distributed Object Systems

    This paper aims to provide administrators with services for managing permissions in a distributed object system, by connecting business-level tasks to access controls on low level functions. Specifically, the techniques connect abilities (to complete externally invoked functions) to the access controls on individual functions, across all servers. The authors main...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2013

    Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection

    A Cross Site Request Forgery (CSRF) attack occurs when a user's web browser is instructed by a malicious webpage to send a request to a vulnerable web site, resulting in the vulnerable web site performing actions not intended by the user. CSRF vulnerabilities are very common, and consequences of such...

    Provided By Purdue Federal Credit Union

  • White Papers // Feb 2013

    Profit-Optimal and Stability-Aware Load Curtailment in Smart Grids

    A key feature of future smart grids is demand response. With the integration of a two-way communication infrastructure, a smart grid allows its operator to monitor the production and usage of power in real time. In this paper, the authors optimize operator profits for the different cases of load curtailment,...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Supero: A Sensor System for Unsupervised Residential Power Usage Monitoring

    As a key technology of home area networks in smart grids, fine-grained power usage monitoring may help conserve electricity. Several existing systems achieve this goal by exploiting appliances' power usage signatures identified in labor-intensive in situ training processes. Recent work shows that autonomous power usage monitoring can be achieved by...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Monitoring and Managing Cloud Computing Security using Denial of Service Bandwidth Allowance

    Over the next decade, cloud computing has a good chance of becoming a widely used technology. However, many challenges face the cloud to be overcome before the average user or business team will trust their vital information with a cloud server. Most of these challenges tie into developing sound security...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Secure Information Sharing in Digital Supply Chains

    Modern organizations interact with their partners through digital supply chain business processes for producing and delivering products and services to consumers. A partner in this supply chain can be a sub-contractor to whom work is outsourced. Each partner in a supply chain uses data, generates data and shares data with...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    On the Impact of Packet Spraying in Data Center Networks

    Modern data center networks are commonly organized in multi-rooted tree topologies. They typically rely on equal-cost multipath to split flows across multiple paths, which can lead to significant load imbalance. Splitting individual flows can provide better load balance, but is not preferred because of potential packet reordering that conventional wisdom...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    A Trust-Based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs

    Mobile Peer-To-Peer networks of Aerial Vehicles (AVs) have become significant in collaborative tasks including military missions and search and rescue operations. However, the nature of the communication between the nodes in these networks makes the disseminated data prone to interception by malicious parties, which could cause serious harm for the...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Outsourcing Privacy-Preserving Social Networks to a Cloud

    In the real world, companies would publish social networks to a third party, e.g., a cloud service provider, for marketing reasons. Preserving privacy when publishing social network data becomes an important issue. In this paper, the authors identify a novel type of privacy attack, termed 1-neighborhood attack. They assume that...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Pegasus: Precision Hunting for Icebergs and Anomalies in Network Flows

    Accurate online network monitoring is crucial for detecting attacks, faults, and anomalies, and determining traffic properties across the network. With high bandwidth links and consequently increasing traffic volumes, it is difficult to collect and analyze detailed flow records in an online manner. Traditional solutions that decouple data collection from analysis...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Capacity of P2P On-Demand Streaming with Simple, Robust and Decentralized Control

    The performance of large-scaled Peer-To-Peer (P2P) Video-on-Demand (VoD) streaming systems can be very challenging to analyze. In practical P2P VoD systems, each peer only interacts with a small number of other peers/neighbors. Further, its upload capacity may vary randomly and both its downloading position and content availability change dynamically. In...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Desired Compensation Adaptive Robust Control of Mobile Satellite Communication System with Disturbance and Model Uncertainties

    The tracking and stabilizing control of a typical ship-mounted Mobile Satellite Communication System (MSCS) is studied in this paper. Severe parametric uncertain-ties and uncertain nonlinearities exist in the dynamic model of the MSCS. Therefore, a discontinuous projection-based Desired Compensation Adaptive Robust Control (DCARC) strategy is adopted to compensate for both...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    A Sensor-Cyber Network Testbed for Plume Detection, Identification, and Tracking

    Detection, Identification, and Tracking (DIT) problems that arise in applications such as the protection of people and the environment against radiational, biological, and chemical plumes can be solved by combining the modalities of sensor and cyber networks. The sensor network provides information about physical space activities, such as the locations...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Spatio-Temporal Access Methods

    The rapid increase in spatio-temporal applications calls for new auxiliary indexing structures. A typical spatio-temporal application is one that tracks the behavior of moving objects through location-aware devices (e.g., GPS). Through the last decade, many spatio-temporal access methods are developed. Spatio-temporal access methods focus on two orthogonal directions: Indexing the...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    SEA-CNN: Scalable Processing of Continuous K-Nearest Neighbor Queries in Spatio-Temporal Databases

    Location-aware environments are characterized by a large number of objects and a large number of continuous queries. Both the objects and continuous queries may change their locations over time. In this paper, the authors focus on continuous k-nearest neighbor queries (CKNN, for short). They present a new algorithm, termed SEA-CNN,...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Scalable Multimedia Disk Scheduling

    A new multimedia disk scheduling algorithm, termed Cascaded-SFC, is presented. The Cascaded-SFC multimedia disk scheduler is applicable in environments where multimedia data requests arrive with different Quality of Service (QoS) requirements such as real-time deadline and user priority. Previous paper on disk scheduling has focused on optimizing the seek times...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Continuous Query Processing in Spatio-Temporal Databases

    In this paper, the authors aim to develop a framework for continuous query processing in spatio-temporal databases. The proposed framework distinguishes itself from other query processors by employing two main paradigms Scalability in terms of the number of concurrent continuous spatio-temporal queries. Incremental evaluation of continuous spatio-temporal queries. Scalability is...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    An Efficient Algorithm for Shortest Path Multicast Routing Under Delay and Delay Variation Constraints

    A new heuristic algorithm is proposed for constructing multicast tree for multimedia and interactive applications that require certain quality of services, QoS. The authors consider two main QoS parameters that are the delay and delay variation. The problem is formulated as constructing shortest path tree under delay and delay variation...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Scalable Spatio-Temporal Continuous Query Processing for Location-Aware Services

    Real-time spatio-temporal query processing needs to effectively handle a large number of moving objects and continuous spatio-temporal queries. In this paper, the authors use shared execution as a mechanism to support scalability in location-aware servers. Their main idea is to maintain a query table that stores information about continuous spatio-temporal...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy

    The authors introduce mechanisms for secure keyword searches on a document server. They propose protocols with computational privacy, query correctness assurances and minimal or no leaks: the server either correctly executes client queries or (if it behaves maliciously) is immediately detected. The client is then provided with strong assurances proving...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2012

    Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation

    In this paper, the authors use zero-sum Markov games to model these interactions subject to underlying uncertainties of real-world events and actions. They solve equilibrium mixed strategies of the players that maximize their respective minimum payoffs with a time-decayed metric. They also show how the defender can use deception as...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2012

    High Accuracy Attack Provenance Via Binary-Based Execution Partition

    An important aspect of cyber attack forensics is to understand the provenance of suspicious events, as it discloses the root cause and ramifications of cyber attacks. Traditionally, this is done by analyzing audit log. However, the presence of long running programs makes a live process receiving a large volume of...

    Provided By Purdue Federal Credit Union

  • White Papers // Nov 2012

    A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks

    Specialized ad hoc networks of Unmanned Aerial Vehicles (UAVs) have been playing increasingly important roles in military and emergency applications. Common resource virtualization techniques mainly designed for stable networks fall short in providing optimal performance in these kinds of networks due to the highly dynamic and unstable nature of Mobile...

    Provided By Purdue Federal Credit Union

  • White Papers // Nov 2012

    Is an MRM Tool Right for Your Marketing Department?

    Over the past decade, nearly every major company has invested in some form of enterprise software package to automate critical processes, to improve the efficiency of key parts of their organization, or to capture new information about its business. Marketing was largely left out of this run on enterprise packages,...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2012

    Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection

    In this paper, the authors show that when the players' current interest is a subset of the states only and they are willing to accept small inaccuracies in the game solutions; many Markov game states can be pruned. They present a pruning algorithm in which a threshold parameter is used...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Detecting the Unintended in BGP Policies

    Internet Service Providers (ISPs) use routing policies to implement the requirements of business contracts, manage traffic, address security concerns and increase scalability of their network. These routing policies are often a high-level expression of strategies or intentions of the ISP. They have meaning when viewed from a network-wide perspective (e.g.,...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Reducing the Complexity of BGP Stability Analysis With Hybrid Combinatorial-Algebraic Models

    Routing stability and correctness in the Internet have long been a concern. Despite this, few theoretical frameworks have been proposed to check BGP configurations for convergence and safety. The most popular approach is based on the Stable Paths Problem (SPP) model. Unfortunately, SPP requires enumeration of all possible control-plane paths,...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Optimal Node Placement in Underwater Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is expected to play a vital role in the exploration and monitoring of underwater areas which are not easily reachable by humans. However, underwater communication via acoustic waves is subject to several performance limitations that are very different from those used for terresstrial networks. In this...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Programming Model Support for Dependable, Elastic Cloud Applications

    An attractive approach to leveraging the ability of cloud-computing platforms to provide resources on demand is to build elastic applications, which can scale up or down based on resource requirements. To ease the development of elastic applications, it is useful for programmers to write applications with simple, inelastic semantics and...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    ABHRANTA: Locating Bugs that Manifest at Large System Scales

    A key challenge in developing large scale applications (both in system size and in input size) is finding bugs that are latent at the small scales of testing, only manifesting when a program is deployed at large scales. Traditional statistical techniques fail because no error-free run is available at deployment...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Optimal Node Placement in Underwater Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is expected to play a vital role in the exploration and monitoring of underwater areas which are not easily reachable by humans. However, underwater communication via acoustic waves is subject to several performance limitations that are very different from those used for terresstrial networks. In this...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2009

    Efficient Privacy Preserving Protocols for Decentralized Computation of Reputation

    Reputation systems represent a key technology for securing distributed applications from misuse by dishonest entities. A reputation system computes reputation scores of the entities in the system, which helps single out those that are exhibiting less than desirable behavior. Examples of reputation systems may be found in several application domains:...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2012

    On Hashing Graphs

    Collision resistant one-way hashing schemes are the basic building blocks of almost all crypto-systems. Use of graph-structured data models are on the rise - in graph databases, representation of biological and healthcare data as well as in modeling systems for representing system topologies. Therefore, the problem of hashing graphs with...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Reducing the Complexity of BGP Stability Analysis With Hybrid Combinatorial-Algebraic Models

    Routing stability and correctness in the Internet have long been a concern. Despite this, few theoretical frameworks have been proposed to check BGP configurations for convergence and safety. The most popular approach is based on the Stable Paths Problem (SPP) model. Unfortunately, SPP requires enumeration of all possible control-plane paths,...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2012

    Detecting the Unintended in BGP Policies

    Internet Service Providers (ISPs) use routing policies to implement the requirements of business contracts, manage traffic, address security concerns and increase scalability of their network. These routing policies are often a high-level expression of strategies or intentions of the ISP. They have meaning when viewed from a network-wide perspective (e.g.,...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2012

    Exercises for Graduate Students Using GENI

    GENI brings together a wide variety of heterogeneous networking infrastructure and technologies under a common platform. The authors propose programming exercises for graduate students to introduce GENI and enable students to conduct high fidelity networking experiments. In this paper, they focus on an exercise to study congestion control and reliability...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Desired Compensation Adaptive Robust Control of Mobile Satellite Communication System with Disturbance and Model Uncertainties

    The tracking and stabilizing control of a typical ship-mounted Mobile Satellite Communication System (MSCS) is studied in this paper. Severe parametric uncertain-ties and uncertain nonlinearities exist in the dynamic model of the MSCS. Therefore, a discontinuous projection-based Desired Compensation Adaptive Robust Control (DCARC) strategy is adopted to compensate for both...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Capacity of P2P On-Demand Streaming with Simple, Robust and Decentralized Control

    The performance of large-scaled Peer-To-Peer (P2P) Video-on-Demand (VoD) streaming systems can be very challenging to analyze. In practical P2P VoD systems, each peer only interacts with a small number of other peers/neighbors. Further, its upload capacity may vary randomly and both its downloading position and content availability change dynamically. In...

    Provided By Purdue Federal Credit Union

  • White Papers // Apr 2012

    Dynamic Activation Policies for Event Capture with Rechargeable Sensors

    In this paper, the authors first consider the single-sensor problem. Using dynamic control theory, they consider a full-information model in which, independent of its activation schedule, the sensor will know whether an event has occurred in the last time slot or not. In this case, the problem is framed as...

    Provided By Purdue Federal Credit Union

  • White Papers // May 2012

    Extended Abstract: Cipher Techniques to Protect Anonymized Mobility Traces from Privacy Attacks

    The authors study the problem of privacy protection of openly published mobility traces of people and other real-world entities, beyond standard protection techniques of anonymization and spatial/temporal cloaking. In this paper, they argue that a major challenge of more effective protection is the need to balance between secrecy for protection...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2009

    Optimizing Link Assignment to Enhance Service in Probabilistic Network

    In this paper, the authors make minor adaptations to the well-known notion of probabilistic network from the machine learning community and use it as their communication model. They then formally define the above optimization problem as the Link Assignment for Successful Service problem (LASS). While LASS can be reduced to...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2011

    Efficient and Robust Localization of Multiple Radiation Sources in Complex Environments

    There has been increasing interest in the detection and localization of radiation sources as part of the defense strategy against Radiological Dispersal Devices (RDD) commonly known as dirty bombs. In particular, the higher concentration of people in urban areas increases the susceptibility to coordinated dirty bomb attacks. Harmful radioactive substances...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2011

    A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems

    Cyber-physical systems encompass a wide range of systems such as sensor networks, cloud computing complexes, and communication networks. They require both the cyber and physical components to function, and hence are susceptible to attacks on either. In this paper, the authors present a number of game theoretic formulations of attack...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2011

    On Robustness of a Class of Cyber-Physical Network Infrastructures

    The authors consider a class of networked system infrastructures that rely on both cyber and physical components for their operation. Both components may be degraded by natural, incidental, or intentional factors. In this paper, they consider a class of Cyber-Physical Network Infrastructures (CPNI) that can be modeled as graphs, wherein...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2010

    Localization Leads to Improved Distributed Detection Under Non-Smooth Distributions

    The authors consider a detection network of sensors that measure intensity levels due to a source amidst background inside a two-dimensional monitoring area. The source intensity decays away from it possibly in discrete jumps, and the corresponding sensor measurements could be random due to the nature of source and background,...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2010

    Stochastic Steepest-Descent Optimization of Multiple-Objective Mobile Sensor Coverage

    In this paper, the authors propose a steepest descent method to compute control parameters for achieving an optimal tradeoff between multiple objectives in stateless stochastic scheduling. By stateless, they mean that the scheduling algorithm does not need any bookkeeping of prior service received by clients, but the scheduling decision is...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    A Sensor-Cyber Network Testbed for Plume Detection, Identification, and Tracking

    Detection, Identification, and Tracking (DIT) problems that arise in applications such as the protection of people and the environment against radiational, biological, and chemical plumes can be solved by combining the modalities of sensor and cyber networks. The sensor network provides information about physical space activities, such as the locations...

    Provided By Purdue Federal Credit Union

  • White Papers // Feb 2013

    Profit-Optimal and Stability-Aware Load Curtailment in Smart Grids

    A key feature of future smart grids is demand response. With the integration of a two-way communication infrastructure, a smart grid allows its operator to monitor the production and usage of power in real time. In this paper, the authors optimize operator profits for the different cases of load curtailment,...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2012

    Privacy Vulnerability of Published Anonymous Mobility Traces

    In this paper, the authors investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Their results quantify the loss of victim nodes' privacy as...

    Provided By Purdue Federal Credit Union

  • White Papers // Dec 2012

    Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation

    In this paper, the authors use zero-sum Markov games to model these interactions subject to underlying uncertainties of real-world events and actions. They solve equilibrium mixed strategies of the players that maximize their respective minimum payoffs with a time-decayed metric. They also show how the defender can use deception as...

    Provided By Purdue Federal Credit Union

  • White Papers // Oct 2012

    Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection

    In this paper, the authors show that when the players' current interest is a subset of the states only and they are willing to accept small inaccuracies in the game solutions; many Markov game states can be pruned. They present a pruning algorithm in which a threshold parameter is used...

    Provided By Purdue Federal Credit Union

  • White Papers // Jun 2010

    Cyber-Physical Trade-Offs in Distributed Detection Networks

    The authors consider a network of sensors that measure the scalar intensity due to the background or a source combined with background, inside a two-dimensional monitoring area. The sensor measurements may be random due to the underlying nature of the source and background or due to sensor errors or both....

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Supero: A Sensor System for Unsupervised Residential Power Usage Monitoring

    As a key technology of home area networks in smart grids, fine-grained power usage monitoring may help conserve electricity. Several existing systems achieve this goal by exploiting appliances' power usage signatures identified in labor-intensive in situ training processes. Recent work shows that autonomous power usage monitoring can be achieved by...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2011

    Cloud Computing Infrastructure Robustness: A Game Theory Approach

    A cloud computing infrastructure typically consists of a number of sites that house servers and are connected to the Internet. Its operation critically depends both on cyber components, including servers and routers, and physical components, including fiber and power routes. Both types of components are subject to attacks of different...

    Provided By Purdue Federal Credit Union

  • White Papers // Feb 2011

    Network Security for Virtual Machine in Cloud Computing

    Cloud computing is the next generation of networking computing, since it can deliver both software and hardware as on-demand resources and services over the Internet. Undoubtedly, one of the significant concerns in cloud computing is security. Virtualization is a key feature of cloud computing. In this paper, the authors focus...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2011

    Process Implanting: A New Active Introspection Framework for Virtualization

    Previous research on virtual machine introspection proposed "Out-of-box" approach by moving out security tools from the guest operating system. However, compared to the traditional "In-the-box" approach, it remains a challenge to obtain a complete semantic view due to the semantic gap between the guest VM and the hypervisor. In this...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Monitoring and Managing Cloud Computing Security using Denial of Service Bandwidth Allowance

    Over the next decade, cloud computing has a good chance of becoming a widely used technology. However, many challenges face the cloud to be overcome before the average user or business team will trust their vital information with a cloud server. Most of these challenges tie into developing sound security...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    A Trust-Based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs

    Mobile Peer-To-Peer networks of Aerial Vehicles (AVs) have become significant in collaborative tasks including military missions and search and rescue operations. However, the nature of the communication between the nodes in these networks makes the disseminated data prone to interception by malicious parties, which could cause serious harm for the...

    Provided By Purdue Federal Credit Union

  • White Papers // Jan 2013

    Secure Information Sharing in Digital Supply Chains

    Modern organizations interact with their partners through digital supply chain business processes for producing and delivering products and services to consumers. A partner in this supply chain can be a sub-contractor to whom work is outsourced. Each partner in a supply chain uses data, generates data and shares data with...

    Provided By Purdue Federal Credit Union

  • White Papers // Nov 2012

    A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks

    Specialized ad hoc networks of Unmanned Aerial Vehicles (UAVs) have been playing increasingly important roles in military and emergency applications. Common resource virtualization techniques mainly designed for stable networks fall short in providing optimal performance in these kinds of networks due to the highly dynamic and unstable nature of Mobile...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2012

    An End-to-End Security Auditing Approach for Service Oriented Architectures

    Service-Oriented Architecture (SOA) is becoming a major paradigm for distributed application development in the recent explosion of Internet services and cloud computing. However, SOA introduces new security challenges not present in the single-hop client-server architectures due to the involvement of multiple service providers in a service request. The interactions of...

    Provided By Purdue Federal Credit Union

  • White Papers // Feb 2011

    A Mobile-Cloud Pedestrian Crossing Guide for the Blind

    The ability to detect the status of pedestrian signals at street intersections is a critical aspect of safe outdoor navigation for the blind and visually-impaired, especially in unfamiliar environments. Existing outdoor navigation devices for the blind prove insufficient in providing such guidance due to their reliance on limited mobile computational...

    Provided By Purdue Federal Credit Union

  • White Papers // Mar 2011

    Privacy in Cloud Computing Through Identity Management

    The migration of web applications to cloud computing platform has raised concerns about the privacy of sensitive data belonging to the consumers of cloud services. The traditional form of security tokens like username/password used to access cloud services are prone to phishing attacks and hence do not provide complete security....

    Provided By Purdue Federal Credit Union

  • White Papers // Nov 2010

    A Kolmogorov Complexity Approach for Measuring Attack Path Complexity

    The difficulty associated with breaching an enterprise net-work is commensurate with the security of that network. A security breach, or a security policy violation, occurs as a result of an attacker successfully executing some attack path. The difficulty associated with this attack path, then, is critical to understanding how secure...

    Provided By Purdue Federal Credit Union

  • White Papers // Aug 2010

    An Entity-centric Approach for Privacy and Identity Management in Cloud Computing

    Entities (e.g., users, services) have to authenticate themselves to Service Providers (SPs) in order to use their services. An entity provides Personally Identifiable Information (PII) that uniquely identifies it to an SP. In the traditional application-centric IDentity Management (IDM) model, each application keeps trace of identities of the entities that...

    Provided By Purdue Federal Credit Union

  • White Papers // Aug 2010

    A Mobile-Cloud Collaborative Traffic Lights Detector for Blind Navigation

    Context-awareness is a critical aspect of safe navigation, especially for the blind and visually-impaired in unfamiliar environments. Existing mobile devices for context-aware navigation fall short in many cases due to their dependence on specific infrastructure requirements as well as having limited access to resources that could provide a wealth of...

    Provided By Purdue Federal Credit Union

  • White Papers // Jul 2009

    Developing Attack Defense Ideas for Ad Hoc Wireless Networks

    Ad hoc networks are natively cooperative systems in the sense that their nodes have to relay data to one another. The inherent drawback of this scheme is that it renders these networks susceptible to intruders. Collaborative attacks, in which various attackers may coordinate actions to hit the network stronger, are...

    Provided By Purdue Federal Credit Union

  • White Papers // Sep 2011

    Precise, Scalable, and Online Request Tracing for Multi-Tier Services of Black Boxes

    As more and more multi-tier services are developed from commercial off-the-shelf components or heterogeneous middleware without source code available, both developers and administrators need a request tracing tool to exactly know how a user request of interest travels through services of black boxes and obtain macro-level user request behaviors of...

    Provided By Purdue Federal Credit Union