ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.
- Ahn, Gail-Joon
- Arizona State University
- 24 Huang, Dijiang
- 15 Doupé, Adam
- 14 Zhao, Ziming
- 11 Zhang, Yanchao
- 9 Doupe, Adam
- more
- 7 Dasgupta, Partha
- 7 Xue, Guoliang
- 6 Yau, Stephen S
- 5 Syrotiuk, Violet R
- 5 Yau, Sik-Sang
- 4 Davulcu, Hasan
- 4 Lee, Joohyung
- 4 Yau, Stephen S.
- 3 Baral, Chitta
- 3 Bazzi, Rida
- 3 Santanam, Raghu
- 2 Mabey, Michael Kent
- 2 Shakarian, Paulo
- 2 Ye, Jieping
- 2 Ying, Lei
- 2 Zhang, Junshan
- 1 Alshalan, Abdullah O.
- 1 Alshamrani, Adel
- 1 An, Hogeun
- 1 Bapat, Namrata
- 1 Barbier, Geoffrey
- 1 Bazzi, Rida A
- 1 Buduru, Arun Balaji
- 1 Burleson, Winslow
- 1 Candan, Selcuk
- 1 Casolary, Michael
- 1 Chandramouli, Sai Prashanth
- 1 Chung, Chun-Jen
- 1 Colbourn, Charles J
- 1 Collofello, James
- 1 Cooke, Nancy
- 1 Cooke, Nancy J
- 1 Dixit, Vaibhav Hemant
- 1 Dsouza, Clinton Vernon
- 1 Fainekos, Georgios
- 1 Gentz, Reinhard Werner
- 1 Gibson, Aaron Scott
- 1 Guha, Sayantan
- 1 Gundecha, Pritam Sureshlal
- 1 Gupta, Poonam
- 1 Gupta, Saurabh
- 1 Gutierrez, Garrett
- 1 Han, Wonkyu
- 1 Herlihy, Maurice
- 1 Holmes, James Edward
- 1 Hu, Hongxin
- 1 Janssen, Marcus
- 1 Jing, Yiming
- 1 Kadne, Aniruddha Kishor
- 1 Khairnar, Tejas
- 1 Khatkar, Pankaj Kumar
- 1 Kilari, Vishnu Teja
- 1 Kulkarni, Ketan Ashok
- 1 Kyung, Sukwha
- 1 Lanus, Erin
- 1 Li, Bing
- 1 Li, Lingjun
- 1 Lifschitz, Vladimir
- 1 Liu, Huan
- 1 Meng, Yunsong
- 1 Modi, Ajay
- 1 Montgomery, Douglas C
- 1 Mukherjee, Tamalika
- 1 Nagaraja, Vinjith
- 1 Natarajan, Janakarajan
- 1 Nunes, Eric
- 1 Paglierani, Justin
- 1 Panwar, Anupam
- 1 Peisert, Sean
- 1 Pinto, Gerard Lawrence
- 1 Pisharody, Sandeep
- 1 Prabhu Verleker, Ashwin Narayan
- 1 Rajivan, Prashanth
- 1 Reisslein, Martin
- 1 Romo, James Tyler
- 1 Rubio-Medrano, Carlos Ernesto
- 1 Sanchez, Michael
- 1 Santanam, Raghu T
- 1 Scaglione, Anna
- 1 Seo, Jeongjin
- 1 Shoshitaishvili, Yan
- 1 Srivastava, Abhijeet
- 1 Stall Rechia, Felipe
- 1 Sun, Jingchao
- 1 Syrotiuk, Violet
- 1 Taguinod, Marthony
- 1 Tiwari, Naveen
- 1 Todd, Margaret Nicole
- 1 Tsai, Wei-Tek
- 1 Tu, Huahong
- 1 Vincent, Brian W
- 1 Walker, Erin
- 1 Whitaker, Jeremy Andrew
- 63 English
- 63 Public
- 57 Computer science
- 14 Security
- 6 Cloud Computing
- 6 Computer Science
- 6 Computer engineering
- 5 Privacy
- 4 Machine Learning
- more
- 3 Electrical engineering
- 3 Information technology
- 2 Android
- 2 Artificial Intelligence
- 2 Attack
- 2 Attribute
- 2 Information Assurance
- 2 Network Security
- 2 Ontology
- 2 OpenFlow
- 2 Policy Management
- 2 SDN
- 2 Software Defined Networking
- 2 digital forensics
- 2 forensic framework
- 2 probabilistic human behaviors
- 2 probabilistic reasoning
- 1 Access Control
- 1 Access control
- 1 Access control model
- 1 Access control policy
- 1 Acquisition
- 1 Adaptation
- 1 Adaptive Compression
- 1 Advanced Persistent Threats
- 1 Agent Based Model
- 1 Analysis
- 1 Android forensics
- 1 Anomaly Detection
- 1 Anonymity
- 1 Answer Set Programming
- 1 Artificial intelligence
- 1 Attack Graph
- 1 Attacks
- 1 Attribute Based Access Control
- 1 Attribute Based Encryption
- 1 Automated Source Code Randomization
- 1 Black-Box
- 1 CNN
- 1 Chrome OS
- 1 Cloud Security
- 1 Cognitive Bias
- 1 Cognitive Radios Networks
- 1 Cognitive models
- 1 Cognitive psychology
- 1 Collaborations
- 1 Common Information Model
- 1 Computer Science and Engineering
- 1 Computer and Network Security
- 1 Confidence Score
- 1 Confidentiality
- 1 Conflicts
- 1 Continuous Monitoring
- 1 Critical cloud infrastructures
- 1 Cross Site Scripting
- 1 Cyber Attacks
- 1 Cyber Forensics
- 1 Cyber Security
- 1 Cyber security
- 1 Cybersecurity
- 1 Data Analysis
- 1 Data Mining
- 1 Data Protection
- 1 Decentralized
- 1 Defeasible logic programming
- 1 Defense
- 1 Derivation
- 1 Digital forensics
- 1 Distributed Environments
- 1 Dynamic Configurations
- 1 E-Mail Header Injection
- 1 E-Mail Injection
- 1 EHR
- 1 Edge Network Computing
- 1 Email
- 1 Engineering
- 1 Evidence Representation
- 1 Fallback Authentication
- 1 Federation
- 1 Flexible Viewpoint
- 1 Forensics
- 1 Framework for Integration
- 1 Gossiping
- 1 Graph
- 1 Graph Propagation
- 1 Group Communication
- 1 HIPAA
- 1 Hardware-assisted security
- 1 Header Injection
- 1 Healthcare
- 1 Hierarchical Edge Bundle
- 1 Honeynet
- 1 Identity
- Dwarf Galaxies as Laboratories of Protogalaxy Physics: Canonical Star Formation Laws at Low Metallicity
- Evolutionary Genetics of CORL Proteins
- Social Skills and Executive Functioning in Children with PCDH-19
- Deep Domain Fusion for Adaptive Image Classification
- Software Defined Pulse-Doppler Radar for Over-The-Air Applications: The Joint Radar-Communications Experiment
This dissertation studies three classes of combinatorial arrays with practical applications in testing, measurement, and security. Covering arrays are widely studied in software and hardware testing to indicate the presence of faulty interactions. Locating arrays extend covering arrays to achieve identification of the interactions causing a fault by requiring additional conditions on how interactions are covered in rows. This dissertation introduces a new class, the anonymizing arrays, to guarantee a degree of anonymity by bounding the probability a particular row is identified by the interaction presented. Similarities among these arrays lead to common algorithmic techniques for their construction which this …
- Contributors
- Lanus, Erin, Colbourn, Charles J, Ahn, Gail-Joon, et al.
- Created Date
- 2019
An examination of 12 darkweb sites involved in selling hacking services - often referred to as ”Hacking-as-a-Service” (HaaS) sites is performed. Data is gathered and analyzed for 7 months via weekly site crawling and parsing. In this empirical study, after examining over 200 forum threads, common categories of services available on HaaS sites are identified as well as their associated topics of conversation. Some of the most common hacking service categories in the HaaS market include Social Media, Database, and Phone hacking. These types of services are the most commonly advertised; found on over 50\% of all HaaS sites, while …
- Contributors
- Vincent, Brian W, Shakarian, Paulo, Candan, Selcuk, et al.
- Created Date
- 2018
Cyber-systems and networks are the target of different types of cyber-threats and attacks, which are becoming more common, sophisticated, and damaging. Those attacks can vary in the way they are performed. However, there are similar strategies and tactics often used because they are time-proven to be effective. The motivations behind cyber-attacks play an important role in designating how attackers plan and proceed to achieve their goals. Generally, there are three categories of motivation are: political, economical, and socio-cultural motivations. These indicate that to defend against possible attacks in an enterprise environment, it is necessary to consider what makes such an …
- Contributors
- Alshamrani, Adel, Huang, Dijiang, Doupe, Adam, et al.
- Created Date
- 2018
Compartmentalizing access to content, be it websites accessed in a browser or documents and applications accessed outside the browser, is an established method for protecting information integrity [12, 19, 21, 60]. Compartmentalization solutions change the user experience, introduce performance overhead and provide varying degrees of security. Striking a balance between usability and security is not an easy task. If the usability aspects are neglected or sacrificed in favor of more security, the resulting solution would have a hard time being adopted by end-users. The usability is affected by factors including (1) the generality of the solution in supporting various applications, …
- Contributors
- Zohrevandi, Mohsen, Bazzi, Rida A, Ahn, Gail-Joon, et al.
- Created Date
- 2018
Network Management is a critical process for an enterprise to configure and monitor the network devices using cost effective methods. It is imperative for it to be robust and free from adversarial or accidental security flaws. With the advent of cloud computing and increasing demands for centralized network control, conventional management protocols like Simple Network Management Protocol (SNMP) appear inadequate and newer techniques like Network Management Datastore Architecture (NMDA) design and Network Configuration (NETCONF) have been invented. However, unlike SNMP which underwent improvements concentrating on security, the new data management and storage techniques have not been scrutinized for the inherent …
- Contributors
- Dixit, Vaibhav Hemant, Ahn, Gail-Joon, Doupé, Adam, et al.
- Created Date
- 2018
Reasoning about the activities of cyber threat actors is critical to defend against cyber attacks. However, this task is difficult for a variety of reasons. In simple terms, it is difficult to determine who the attacker is, what the desired goals are of the attacker, and how they will carry out their attacks. These three questions essentially entail understanding the attacker’s use of deception, the capabilities available, and the intent of launching the attack. These three issues are highly inter-related. If an adversary can hide their intent, they can better deceive a defender. If an adversary’s capabilities are not well …
- Contributors
- Nunes, Eric, Shakarian, Paulo, Ahn, Gail-Joon, et al.
- Created Date
- 2018
Web applications continue to remain as the most popular method of interaction for businesses over the Internet. With it's simplicity of use and management, they often function as the "front door" for many companies. As such, they are a critical component of the security ecosystem as vulnerabilities present in these systems could potentially allow malicious users access to sensitive business and personal data. The inherent nature of web applications enables anyone to access them anytime and anywhere, this includes any malicious actors looking to exploit vulnerabilities present in the web application. In addition, the static configurations of these web applications …
- Contributors
- Taguinod, Marthony, Ahn, Gail-Joon, Doupé, Adam, et al.
- Created Date
- 2018
Hardware-Assisted Security (HAS) is an emerging technology that addresses the shortcomings of software-based virtualized environment. There are two major weaknesses of software-based virtualization that HAS attempts to address - performance overhead and security issues. Performance overhead caused by software-based virtualization is due to the use of additional software layer (i.e., hypervisor). Since the performance is highly related to efficiency of processing data and providing services, reducing performance overhead is one of the major concerns in data centers and enterprise networks. Software-based virtualization also imposes additional security issues in the virtualized environments. To resolve those issues, HAS is developed to offload …
- Contributors
- Kyung, Sukwha, Ahn, Gail-Joon, Doupé, Adam, et al.
- Created Date
- 2017
The Web is one of the most exciting and dynamic areas of development in today’s technology. However, with such activity, innovation, and ubiquity have come a set of new challenges for digital forensic examiners, making their jobs even more difficult. For examiners to become as effective with evidence from the Web as they currently are with more traditional evidence, they need (1) methods that guide them to know how to approach this new type of evidence and (2) tools that accommodate web environments’ unique characteristics. In this dissertation, I present my research to alleviate the difficulties forensic examiners currently face …
- Contributors
- Mabey, Michael Kent, Ahn, Gail-Joon, Doupé, Adam, et al.
- Created Date
- 2017
The telephone network is used by almost every person in the modern world. With the rise of Internet access to the PSTN, the telephone network today is rife with telephone spam and scams. Spam calls are significant annoyances for telephone users, unlike email spam, spam calls demand immediate attention. They are not only significant annoyances but also result in significant financial losses in the economy. According to complaint data from the FTC, complaints on illegal calls have made record numbers in recent years. Americans lose billions to fraud due to malicious telephone communication, despite various efforts to subdue telephone spam, …
- Contributors
- Tu, Huahong, Doupé, Adam, Ahn, Gail-Joon, et al.
- Created Date
- 2017