Search Constraints

Search Results

  • N870zq83v?file=thumbnail
    Project
    Appana, Pranavi
    An intruder attacks a computer network and breaks into it by exploiting a combination of system vulnerabilities. An attack graph models security vulnerabilities of a network and a sequence of all possible exploits that an intruder can use to get incre . . .
  • N583xv02m?file=thumbnail
    Project
    Aldausari, Nuha
    Design by contract (DBC) is an effective methodology that dynamically checks whether a program meets its specifications which are also called design contracts. The contracts for object-oriented programs are defined in terms of preconditions and postco . . .
  • Qf85nb29f?file=thumbnail
    Project
    Wahane, Arundhati V
    There are various approaches for Extensible access control markup language (XACML) security policies implementation. This project demonstrated a solution to use graph database to implement XACML Role-based access control in Neo4j. The project consists . . .
  • Pr76f341v?file=thumbnail
    Project
    Dong, Yulong
    Nowadays, online social networking is becoming one of the options for botnet command and control (C&C) communication, and QR codes have been widely used in the area of software automation. In this paper, we exploit QR codes, Twitter, Tor network, . . .
  • 5m60qr90c?file=thumbnail
    Project
    Patel, Nevil Dilipkumar
    PC2v10 is a web-based contest management framework which supports the ability to create and configure contests, control who can participate in defined contests, start/stop contests, and a variety of similar operations. [10] PC2v10 consists of various . . .
  • Work
    Project
    Dalavi, Reena Prakash
    Emotions play an important role in shaping how we think and how we behave in many situations. Our action depends upon the surrounding emotions and paying attention to the surrounding emotions helps us take a decision. When we interact with other peopl . . .
  • Work
    Project
    Kuan, Nientzu
    Analyzing the U.S. stock market is a big data challenge due to its high volume of data and large price volatility. This project demonstrated how deep learning, specifically the Long Short Term Memory (LSTM) recurrent neural network, could make use of . . .
  • Work
    Project
    Bhokare, Mitali
    Virtualization means to create a virtual or software-based representation of something rather than having a physical one. Beyond expanding the computing potential, virtualization can be used as a technique to increase security. This project has implem . . .
  • Work
    Project
    Khiria, Ritika
    In this project, the Personal Dietitian android application will use food ontology APIs, which is a part of knowledge representation and semantic web technology to produce diet plans for the users. Additionally, the app will provide an activity tracke . . .
  • Work
    Project
    Patil, Toshit
    Graphical Processing Units (GPUs) used in embedded systems such as cars, robotics, mobile devices are usually required to run multiple tasks at the same time. But traditionally GPUs are designed to run only one task at a time. Prior studies have intro . . .