ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at firstname.lastname@example.org.
- 3 English
- 3 Public
- Computer science
- 1 Answer Set Programming
- 1 Artificial Intelligence
- 1 Chrome OS
- 1 Common Information Model
- 1 Computer engineering
- 1 Continuous Monitoring
- 1 Framework for Integration
- 1 Information technology
- 1 Knowledge Representation and Reasoning
- 1 Logic Programming
- 1 Ontology
- 1 Open Vulnerability Assessment Language
- 1 Security Assessment
- 1 Stable Model
- 1 Window Management Instrumentation
- 1 digital forensics
- 1 forensic framework
- 1 forensic tools
- 1 web environments
- 1 web thin client
The Web is one of the most exciting and dynamic areas of development in today’s technology. However, with such activity, innovation, and ubiquity have come a set of new challenges for digital forensic examiners, making their jobs even more difficult. For examiners to become as effective with evidence from the Web as they currently are with more traditional evidence, they need (1) methods that guide them to know how to approach this new type of evidence and (2) tools that accommodate web environments’ unique characteristics. In this dissertation, I present my research to alleviate the difficulties forensic examiners currently face …
- Mabey, Michael Kent, Ahn, Gail-Joon, Doupé, Adam, et al.
- Created Date
With the growth of IT products and sophisticated software in various operating systems, I observe that security risks in systems are skyrocketing constantly. Consequently, Security Assessment is now considered as one of primary security mechanisms to measure assurance of systems since systems that are not compliant with security requirements may lead adversaries to access critical information by circumventing security practices. In order to ensure security, considerable efforts have been spent to develop security regulations by facilitating security best-practices. Applying shared security standards to the system is critical to understand vulnerabilities and prevent well-known threats from exploiting vulnerabilities. However, many end …
- Seo, Jeongjin, Ahn, Gail-Joon, Yau, Stephen S, et al.
- Created Date
Answer Set Programming (ASP) is one of the most prominent and successful knowledge representation paradigms. The success of ASP is due to its expressive non-monotonic modeling language and its efficient computational methods originating from building propositional satisfiability solvers. The wide adoption of ASP has motivated several extensions to its modeling language in order to enhance expressivity, such as incorporating aggregates and interfaces with ontologies. Also, in order to overcome the grounding bottleneck of computation in ASP, there are increasing interests in integrating ASP with other computing paradigms, such as Constraint Programming (CP) and Satisfiability Modulo Theories (SMT). Due to the …
- Meng, Yunsong, Lee, Joohyung, Ahn, Gail-Joon, et al.
- Created Date