Browsing by Author "Chou, Te-Shun, 1964-"
-
Genetic Algorithm Stream Cipher Key Generation Using NIST Functions
Leggett, Hunter W (East Carolina University, 2022-12-05)Stream ciphers are beneficial because of their efficiency, speed, and low resource utilization. However, stream ciphers are vulnerable to many attacks if they do not use strong keys for encryption and decryption. Thus, one ... -
The Impact of Hands-On Simulation Laboratories on Teaching of Wireless Communications
Chou, Te-Shun, 1964-; Vanderbye, Aaron (2017-01-01) -
MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN
Fu, Tian (East Carolina University, 2012)Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks ... -
Scripting an Automated Score and Message Board; Cyber Security Competitive Labs as a Service (CLaaS),
Hempenius, Nicholas; Chou, Te-Shun, 1964- (2019-04-01)There is a growing skills gap in the cybersecurity industry, to compound the skills gap, there is also a growing manpower gap. Every year the need for skilled cybersecurity professionals grows and every year the skills ... -
SURVEY OF SOCIAL ENGINEERS AND THE VALIDITY OF DEFENSIVE TECHNIQUES
Austin, Adrian D (East Carolina University, 2022-05-12)In the context of information technology, social engineering is a nexus of computers and humans. Defenders need to know how hackers and other deviant actors attempt to interact with users. Social engineers are sometimes ... -
Threat Modelling and Analysis of Web Application Attacks
Awojana, Tolulope Bukola (East Carolina University, 2018-12-12)There has been a rapid growth in the use of the Internet over the years with billions of businesses using it as a means of communication. The World Wide Web has served as the major tool for disseminating information which ...