Now showing items 1-4 of 4

  • Genetic Algorithm Stream Cipher Key Generation Using NIST Functions 

    Leggett, Hunter W (East Carolina University, 2022-12-05)
    Stream ciphers are beneficial because of their efficiency, speed, and low resource utilization. However, stream ciphers are vulnerable to many attacks if they do not use strong keys for encryption and decryption. Thus, one ...
  • MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN 

    Fu, Tian (East Carolina University, 2012)
    Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks ...
  • SURVEY OF SOCIAL ENGINEERS AND THE VALIDITY OF DEFENSIVE TECHNIQUES 

    Austin, Adrian D (East Carolina University, 2022-05-12)
    In the context of information technology, social engineering is a nexus of computers and humans. Defenders need to know how hackers and other deviant actors attempt to interact with users. Social engineers are sometimes ...
  • Threat Modelling and Analysis of Web Application Attacks 

    Awojana, Tolulope Bukola (East Carolina University, 2018-12-12)
    There has been a rapid growth in the use of the Internet over the years with billions of businesses using it as a means of communication. The World Wide Web has served as the major tool for disseminating information which ...