ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.
- Lee, Joohyung
- 2 Arizona State University
- 1 Ahn, Gail-Joon
- 1 Fainekos, Georgios
- 1 Lee, Yann-Hang
- 1 Nair, Shankar
- 1 Seo, Jeongjin
- more
- 1 Yau, Stephen S
- 2 English
- 2 Public
- Computer engineering
- Ontology
- 2 Computer science
- 1 Common Information Model
- 1 Continuous Monitoring
- 1 Event
- 1 Gateway
- more
- 1 Open Vulnerability Assessment Language
- 1 Rules
- 1 Security Assessment
- 1 Sensor
- 1 Smarthome
- 1 Window Management Instrumentation
- Dwarf Galaxies as Laboratories of Protogalaxy Physics: Canonical Star Formation Laws at Low Metallicity
- Evolutionary Genetics of CORL Proteins
- Social Skills and Executive Functioning in Children with PCDH-19
- Deep Domain Fusion for Adaptive Image Classification
- Software Defined Pulse-Doppler Radar for Over-The-Air Applications: The Joint Radar-Communications Experiment
With the growth of IT products and sophisticated software in various operating systems, I observe that security risks in systems are skyrocketing constantly. Consequently, Security Assessment is now considered as one of primary security mechanisms to measure assurance of systems since systems that are not compliant with security requirements may lead adversaries to access critical information by circumventing security practices. In order to ensure security, considerable efforts have been spent to develop security regulations by facilitating security best-practices. Applying shared security standards to the system is critical to understand vulnerabilities and prevent well-known threats from exploiting vulnerabilities. However, many end …
- Contributors
- Seo, Jeongjin, Ahn, Gail-Joon, Yau, Stephen S, et al.
- Created Date
- 2014
Cisco estimates that by 2020, 50 billion devices will be connected to the Internet. But 99% of the things today remain isolated and unconnected. Different connectivity protocols, proprietary access, varied device characteristics, security concerns are the main reasons for that isolated state. This project aims at designing and building a prototype gateway that exposes a simple and intuitive HTTP Restful interface to access and manipulate devices and the data that they produce while addressing most of the issues listed above. Along with manipulating devices, the framework exposes sensor data in such a way that it can be used to create …
- Contributors
- Nair, Shankar, Lee, Yann-Hang, Lee, Joohyung, et al.
- Created Date
- 2015