Browsing Dissertations and Theses by Author "Chou, Te-Shun, 1964-"
-
Genetic Algorithm Stream Cipher Key Generation Using NIST Functions
Leggett, Hunter W (East Carolina University, 2022-12-05)Stream ciphers are beneficial because of their efficiency, speed, and low resource utilization. However, stream ciphers are vulnerable to many attacks if they do not use strong keys for encryption and decryption. Thus, one ... -
MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN
Fu, Tian (East Carolina University, 2012)Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks ... -
SURVEY OF SOCIAL ENGINEERS AND THE VALIDITY OF DEFENSIVE TECHNIQUES
Austin, Adrian D (East Carolina University, 2022-05-12)In the context of information technology, social engineering is a nexus of computers and humans. Defenders need to know how hackers and other deviant actors attempt to interact with users. Social engineers are sometimes ... -
Threat Modelling and Analysis of Web Application Attacks
Awojana, Tolulope Bukola (East Carolina University, 2018-12-12)There has been a rapid growth in the use of the Internet over the years with billions of businesses using it as a means of communication. The World Wide Web has served as the major tool for disseminating information which ...