Network intrusion systems work on many models, but at their core they rely on algorithms to process data and determine if the network traffic is malicious in nature. Snort is the most widely-used open source network based Intrusion Prevention System / Intrusion Detection System (IPS/IDS) system. It works by comparing network traffic to a list or lists of rules to determine if and what action should be taken. These rules are referred to as signatures, since they are intended to identify a single pattern of network traffic just like a physical signature identifies a single author. I have developed an algorithm that accepts as input any file or a directory and outputs Snort signatures. This action allows a quick turnaround in creating a rule t...
Power side-channel attacks are a growing concern as they allow attackers to extract sensitive inform...
While unknown to most people, hardware implementation attacks provide a serious adversary for system...
With an ever increasing number of attacks on networks that have an even more increasing amount of in...
The growth of android applications is causing a threat and a serious issue towards Android’s securit...
Recent data breaches have motivated a desire to remove all trust storage platforms (e.g., the cloud)...
Research on the criminological side of system trespassing (i.e. unlawfully gaining access to a compu...
technical reportSWIG is a tool for solving problems. More specifically, SWIG is a simple tool for bu...
A thesis presented to the faculty of the College of Science and Technology at Morehead State Univers...
This project focuses on the design and implementation of an intelligent Explosive Ordinance Disposal...
Monitoring end-to-end available bandwidth is critical in helping applications and users efficiently ...
In this study a modified artificial bee colony algorithm and the cooperative-swarm variant of partic...
Personally identifiable information (PII) is information regarding things such as bank accounts, ret...
This research project details the design and implementation of the Obstacle Avoidance Subsystem for ...
Using compromised or malicious sites to launch attacks against client systems is a growing attack ve...
Journal ArticlePrototyping is an important activity in engineering. Prototype development is a good ...
Power side-channel attacks are a growing concern as they allow attackers to extract sensitive inform...
While unknown to most people, hardware implementation attacks provide a serious adversary for system...
With an ever increasing number of attacks on networks that have an even more increasing amount of in...
The growth of android applications is causing a threat and a serious issue towards Android’s securit...
Recent data breaches have motivated a desire to remove all trust storage platforms (e.g., the cloud)...
Research on the criminological side of system trespassing (i.e. unlawfully gaining access to a compu...
technical reportSWIG is a tool for solving problems. More specifically, SWIG is a simple tool for bu...
A thesis presented to the faculty of the College of Science and Technology at Morehead State Univers...
This project focuses on the design and implementation of an intelligent Explosive Ordinance Disposal...
Monitoring end-to-end available bandwidth is critical in helping applications and users efficiently ...
In this study a modified artificial bee colony algorithm and the cooperative-swarm variant of partic...
Personally identifiable information (PII) is information regarding things such as bank accounts, ret...
This research project details the design and implementation of the Obstacle Avoidance Subsystem for ...
Using compromised or malicious sites to launch attacks against client systems is a growing attack ve...
Journal ArticlePrototyping is an important activity in engineering. Prototype development is a good ...
Power side-channel attacks are a growing concern as they allow attackers to extract sensitive inform...
While unknown to most people, hardware implementation attacks provide a serious adversary for system...
With an ever increasing number of attacks on networks that have an even more increasing amount of in...