ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.
- Ahn, Gail-Joon
- Zhang, Yanchao
- 11 Arizona State University
- 6 Huang, Dijiang
- 4 Doupé, Adam
- 3 Xue, Guoliang
- 2 Ying, Lei
- more
- 2 Zhang, Junshan
- 2 Zhao, Ziming
- 1 Alshalan, Abdullah O.
- 1 Buduru, Arun Balaji
- 1 Chung, Chun-Jen
- 1 Davulcu, Hasan
- 1 Gentz, Reinhard Werner
- 1 Han, Wonkyu
- 1 Jing, Yiming
- 1 Li, Bing
- 1 Li, Lingjun
- 1 Peisert, Sean
- 1 Scaglione, Anna
- 1 Sun, Jingchao
- 1 Tu, Huahong
- 1 Yau, Sik-Sang
- 1 Ye, Jieping
- 1 Zhang, Jinxue
- 11 English
- 11 Public
- 10 Computer science
- 3 Electrical engineering
- 2 Privacy
- 2 Security
- 1 Access Control
- 1 Adaptive Compression
- 1 Android
- more
- 1 Anonymity
- 1 Attack
- 1 Attack Graph
- 1 Cloud Computing
- 1 Cloud Security
- 1 Computer engineering
- 1 Cybersecurity
- 1 Decentralized
- 1 Defense
- 1 Gossiping
- 1 Honeynet
- 1 Identity
- 1 Information technology
- 1 Injection Attack
- 1 Microblogging
- 1 Mobile Authentication
- 1 Mobile Network
- 1 Mobile VPN
- 1 Mobile computing
- 1 Mobility
- 1 Network Security
- 1 Network security
- 1 Persistent TCP
- 1 Policy Management
- 1 Proximity Authentication
- 1 Scheduling
- 1 Session Resumption
- 1 Smartphones
- 1 Software Defined Networking
- 1 Software-defined Networking
- 1 Synchonization
- 1 Twitter
- 1 VPN
- 1 Wireless Sensor Networks
- 1 access control
- 1 acoustic communications
- 1 continuous authentication
- 1 dynamic IoT environment assessment
- 1 intelligent IoT device adaptation
- 1 pro-active protection
- 1 probabilistic human behaviors
- 1 probabilistic reasoning
- 1 security
- 1 touch screen
- Dwarf Galaxies as Laboratories of Protogalaxy Physics: Canonical Star Formation Laws at Low Metallicity
- Evolutionary Genetics of CORL Proteins
- Social Skills and Executive Functioning in Children with PCDH-19
- Deep Domain Fusion for Adaptive Image Classification
- Software Defined Pulse-Doppler Radar for Over-The-Air Applications: The Joint Radar-Communications Experiment
The telephone network is used by almost every person in the modern world. With the rise of Internet access to the PSTN, the telephone network today is rife with telephone spam and scams. Spam calls are significant annoyances for telephone users, unlike email spam, spam calls demand immediate attention. They are not only significant annoyances but also result in significant financial losses in the economy. According to complaint data from the FTC, complaints on illegal calls have made record numbers in recent years. Americans lose billions to fraud due to malicious telephone communication, despite various efforts to subdue telephone spam, …
- Contributors
- Tu, Huahong, Doupé, Adam, Ahn, Gail-Joon, et al.
- Created Date
- 2017
A Virtual Private Network (VPN) is the traditional approach for an end-to-end secure connection between two endpoints. Most existing VPN solutions are intended for wired networks with reliable connections. In a mobile environment, network connections are less reliable and devices experience intermittent network disconnections due to either switching from one network to another or experiencing a gap in coverage during roaming. These disruptive events affects traditional VPN performance, resulting in possible termination of applications, data loss, and reduced productivity. Mobile VPNs bridge the gap between what users and applications expect from a wired network and the realities of mobile computing. …
- Contributors
- Alshalan, Abdullah O., Huang, Dijiang, Ahn, Gail-Joon, et al.
- Created Date
- 2017
Wireless sensor networks (WSN) and the communication and the security therein have been gaining further prominence in the tech-industry recently, with the emergence of the so called Internet of Things (IoT). The steps from acquiring data and making a reactive decision base on the acquired sensor measurements are complex and requires careful execution of several steps. In many of these steps there are still technological gaps to fill that are due to the fact that several primitives that are desirable in a sensor network environment are bolt on the networks as application layer functionalities, rather than built in them. For …
- Contributors
- Gentz, Reinhard Werner, Scaglione, Anna, Zhang, Yanchao, et al.
- Created Date
- 2017
Mobile devices are penetrating everyday life. According to a recent Cisco report [10], the number of mobile connected devices such as smartphones, tablets, laptops, eReaders, and Machine-to-Machine (M2M) modules will hit 11.6 billion by 2021, exceeding the world's projected population at that time (7.8 billion). The rapid development of mobile devices has brought a number of emerging security and privacy issues in mobile computing. This dissertation aims to address a number of challenging security and privacy issues in mobile computing. This dissertation makes fivefold contributions. The first and second parts study the security and privacy issues in Device-to-Device communications. Specifically, …
- Contributors
- Sun, Jingchao, Zhang, Yanchao, Zhang, Junshan, et al.
- Created Date
- 2017
Cyber systems, including IoT (Internet of Things), are increasingly being used ubiquitously to vastly improve the efficiency and reduce the cost of critical application areas, such as finance, transportation, defense, and healthcare. Over the past two decades, computing efficiency and hardware cost have dramatically been improved. These improvements have made cyber systems omnipotent, and control many aspects of human lives. Emerging trends in successful cyber system breaches have shown increasing sophistication in attacks and that attackers are no longer limited by resources, including human and computing power. Most existing cyber defense systems for IoT systems have two major issues: (1) …
- Contributors
- Buduru, Arun Balaji, Yau, Sik-Sang, Ahn, Gail-Joon, et al.
- Created Date
- 2016
Software-Defined Networking (SDN) is an emerging network paradigm that decouples the control plane from the data plane, which allows network administrators to consolidate common network services into a centralized module named SDN controller. Applications’ policies are transformed into standardized network rules in the data plane via SDN controller. Even though this centralization brings a great flexibility and programmability to the network, network rules generated by SDN applications cannot be trusted because there may exist malicious SDN applications, and insecure network flows can be made due to complex relations across network rules. In this dissertation, I investigate how to identify and …
- Contributors
- Han, Wonkyu, Ahn, Gail-Joon, Zhao, Ziming, et al.
- Created Date
- 2016
Wireless communication technologies have been playing an important role in modern society. Due to its inherent mobility property, wireless networks are more vulnerable to passive attacks than traditional wired networks. Anonymity, as an important issue in mobile network environment, serves as the first topic that leads to all the research work presented in this manuscript. Specifically, anonymity issue in Mobile Ad hoc Networks (MANETs) is discussed with details as the first section of research. To thoroughly study on this topic, the presented work approaches it from an attacker's perspective. Under a perfect scenario, all the traffic in a targeted MANET …
- Contributors
- Li, Bing, Huang, Dijiang, Xue, Guoliang, et al.
- Created Date
- 2016
Microblogging services such as Twitter, Sina Weibo, and Tumblr have been emerging and deeply embedded into people's daily lives. Used by hundreds of millions of users to connect the people worldwide and share and access information in real-time, the microblogging service has also became the target of malicious attackers due to its massive user engagement and structural openness. Although existed, little is still known in the community about new types of vulnerabilities in current microblogging services which could be leveraged by the intelligence-evolving attackers, and more importantly, the corresponding defenses that could prevent both the users and the microblogging service …
- Contributors
- Zhang, Jinxue, Zhang, Yanchao, Zhang, Junshan, et al.
- Created Date
- 2016
Smartphones are pervasive nowadays. They are supported by mobile platforms that allow users to download and run feature-rich mobile applications (apps). While mobile apps help users conveniently process personal data on mobile devices, they also pose security and privacy threats and put user's data at risk. Even though modern mobile platforms such as Android have integrated security mechanisms to protect users, most mechanisms do not easily adapt to user's security requirements and rapidly evolving threats. They either fail to provide sufficient intelligence for a user to make informed security decisions, or require great sophistication to configure the mechanisms for enforcing …
- Contributors
- Jing, Yiming, Ahn, Gail-Joon, Doupé, Adam, et al.
- Created Date
- 2015
Cloud computing is known as a new and powerful computing paradigm. This new generation of network computing model delivers both software and hardware as on-demand resources and various services over the Internet. However, the security concerns prevent users from adopting the cloud-based solutions to fulfill the IT requirement for many business critical computing. Due to the resource-sharing and multi-tenant nature of cloud-based solutions, cloud security is especially the most concern in the Infrastructure as a Service (IaaS). It has been attracting a lot of research and development effort in the past few years. Virtualization is the main technology of cloud …
- Contributors
- Chung, Chun-Jen, Huang, Dijiang, Ahn, Gail-Joon, et al.
- Created Date
- 2015