ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.
First, I argue that naive movement strategies for MTD systems, designed based on intuition, are detrimental to both security and performance. To answer the question of how to move, I (1) model MTD as a leader-follower game and formally characterize the notion of optimal movement strategies, (2) leverage expert-curated public data and formal representation methods used in cyber-security to obtain parameters of the game, and (3) propose optimization methods to infer strategies at Strong Stackelberg Equilibrium, addressing issues pertaining to scalability and switching costs. Second, when one cannot readily obtain the parameters of the game-theoretic model but can interact with a system, I propose a novel multi-agent reinforcement learning approach that finds the optimal movement strategy. Third, I investigate the novel use of MTD in three domains-- cyber-deception, machine learning, and critical infrastructure networks. I show that the question of what to move poses non-trivial challenges in these domains. To address them, I propose methods for patch-set selection in the deployment of honey-patches, characterize the notion of differential immunity in deep neural networks, and develop optimization problems that guarantee differential immunity for dynamic sensor placement in power-networks.
Pacific Suite is engaging to mature pianists and accessible to students. The score of Pacific Suite is a blank canvas in some ways; almost all dynamics, tempi, pedaling, and fingerings are to be determined by the performer. The first movement, Great Barrier Reef, presents different musical vignettes. The second movement, Mariana Trench, requires the performer to improvise extensively while following provided instructions. The third movement, Sunlit Zone, asks the performer to improvise on a theme of Debussy. The final movement, Bikini Atoll, illustrates events of nuclear testing at Bikini Atoll in the 1940s.
In this research document, I discuss the transcriptions one by one. First, I introduce the background of the pieces, the composers, and the transcribers. Then, through comparison of the original pieces with the transcribed ones, I discuss the approaches of transcription and highlight the special features of each work. Finally, I recommend the concert occasions appropriate for the transcriptions based on their characteristics. I offer many musical examples from the works discussed. These excerpts should help the pianist to understand the style and technical difficulty, as well as to decide if the work meets their programming needs.
In this dissertation, these challenges are addressed by presenting three artificial intelligence (AI) approaches to support prioritizing defense measures. The first two approaches leverage ML on cyberthreat intelligence data to predict if exploits are going to be used in the wild. The first work focuses on what data feeds are generated after vulnerability disclosures. The developed ML models outperform the current industry-standard method with F1 score more than doubled. Then, an approach to derive features about who generated the said data feeds is developed. The addition of these features increase recall by over 19% while maintaining precision. Finally, frequent itemset mining is combined with a variant of a probabilistic temporal logic framework to predict when attacks are likely to occur. In this approach, rules correlating malicious activity in the hacking community platforms with real-world cyberattacks are mined. They are then used in a deductive reasoning approach to generate predictions. The developed approach predicted unseen real-world attacks with an average increase in the value of F1 score by over 45%, compared to a baseline approach.
In this dissertation, I propose a novel framework for performing semantic autograding, which analyzes student programs at a semantic level to help students learn with additional and systematic help. A general autograder is not practical for general programming languages, due to the flexibility of semantics. A practical autograder is possible in VIPLE, because of its simplified syntax and restricted options of semantics. The design of this autograder is based on the concept of theorem provers. To achieve this goal, I employ a modified version of Pi-Calculus to represent VIPLE programs and Hoare Logic to formalize program requirements. By building on the inference rules of Pi-Calculus and Hoare Logic, I am able to construct a theorem prover that can perform automated semantic analysis. Furthermore, building on this theorem prover enables me to develop a self-learning algorithm that can learn the conditions for a program’s correctness according to a given solution program.
As a composer, Chou Wen-Chung (1923-2019) was a learner and inheritor of Chinese traditional music culture and was committed to carrying it forward. As a native of China who had his primary musical training in the West, Chou Wen-Chung was one of the first Chinese composers to make his mark on Western music. He successfully combined Western elements and Chinese tradition in his music. Chou Wen-Chung was one of the few prominent East Asian composers known in the Western musical world, and his music therefore has had a strong influence on other Chinese composers.
In order to understand more clearly his music, I analyzed his chamber work: Yü Ko. This piece was composed in 1965 for 9 instruments: Violin, Alto Flute, English Horn, Bass Clarinet, 2 Trombones, 2 Percussion and Piano. Inspired by the ancient Chinese musical instrument the Qin (also called guqin, or “ancient qin”), which is a plucked seven-string instrument, Chou Wen-Chung composed Yü Ko. Literally meaning “fisherman’s song,” this work was composed originally for the Qin, based on a melody composed by Mao Min-Zhong who was a very noted scholar and Qin player of the late Southern Song dynasty (C.E.1127-1276).
This paper provides Chou Wen-Chung’s biography, compositional styles and developments. It lists and explains the most common Chinese traditional cultural elements which he used in his compositions. In particular, it introduces the Qin in detail from the external structure, performance techniques, sound characteristics, the tablature notation, and compositional methods.
This document also includes a detailed analysis of Yü Ko in terms of the orchestration, pitch, tonal material, structure and tempo, dynamic and musical materials, and explains Chou Wen-Chung’s imitation of the Qin as well as the influence of Western music shown in this piece.
Debussy, who participated in the political project of seeking out tradition as the protector of French culture, also presents his understanding of what French tradition is in this sonata. An analytical description of the structure, thematic materials, harmonies and intervallic relationships of the Sonata reveals Debussy’s approach of combining the elements that he observed from his French predecessors, as well as his own innovations in the work as he negotiated musical world that was controlled by political dogma