Matching Items (453)
Filtering by

Clear all filters

153487-Thumbnail Image.png
Description
Internet browsers are today capable of warning internet users of a potential phishing attack. Browsers identify these websites by referring to blacklists of reported phishing websites maintained by trusted organizations like Google, Phishtank etc. On identifying a Unified Resource Locator (URL) requested by a user as a reported phishing URL,

Internet browsers are today capable of warning internet users of a potential phishing attack. Browsers identify these websites by referring to blacklists of reported phishing websites maintained by trusted organizations like Google, Phishtank etc. On identifying a Unified Resource Locator (URL) requested by a user as a reported phishing URL, browsers like Mozilla Firefox and Google Chrome display an 'active' warning message in an attempt to stop the user from making a potentially dangerous decision of visiting the website and sharing confidential information like username-password, credit card information, social security number etc.

However, these warnings are not always successful at safeguarding the user from a phishing attack. On several occasions, users ignore these warnings and 'click through' them, eventually landing at the potentially dangerous website and giving away confidential information. Failure to understand the warning, failure to differentiate different types of browser warnings, diminishing trust on browser warnings due to repeated encounter are some of the reasons that make users ignore these warnings. It is important to address these factors in order to eventually improve a user’s reaction to these warnings.

In this thesis, I propose a novel design to improve the effectiveness and reliability of phishing warning messages. This design utilizes the name of the target website that a fake website is mimicking, to display a simple, easy to understand and interactive warning message with the primary objective of keeping the user away from a potentially spoof website.
ContributorsSharma, Satyabrata (Author) / Bazzi, Rida (Thesis advisor) / Walker, Erin (Committee member) / Gaffar, Ashraf (Committee member) / Arizona State University (Publisher)
Created2015
150212-Thumbnail Image.png
Description
This thesis addresses the problem of online schema updates where the goal is to be able to update relational database schemas without reducing the database system's availability. Unlike some other work in this area, this thesis presents an approach which is completely client-driven and does not require specialized database management

This thesis addresses the problem of online schema updates where the goal is to be able to update relational database schemas without reducing the database system's availability. Unlike some other work in this area, this thesis presents an approach which is completely client-driven and does not require specialized database management systems (DBMS). Also, unlike other client-driven work, this approach provides support for a richer set of schema updates including vertical split (normalization), horizontal split, vertical and horizontal merge (union), difference and intersection. The update process automatically generates a runtime update client from a mapping between the old the new schemas. The solution has been validated by testing it on a relatively small database of around 300,000 records per table and less than 1 Gb, but with limited memory buffer size of 24 Mb. This thesis presents the study of the overhead of the update process as a function of the transaction rates and the batch size used to copy data from the old to the new schema. It shows that the overhead introduced is minimal for medium size applications and that the update can be achieved with no more than one minute of downtime.
ContributorsTyagi, Preetika (Author) / Bazzi, Rida (Thesis advisor) / Candan, Kasim S (Committee member) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2011
150895-Thumbnail Image.png
Description
Broadcast Encryption is the task of cryptographically securing communication in a broadcast environment so that only a dynamically specified subset of subscribers, called the privileged subset, may decrypt the communication. In practical applications, it is desirable for a Broadcast Encryption Scheme (BES) to demonstrate resilience against attacks by colluding, unprivileged

Broadcast Encryption is the task of cryptographically securing communication in a broadcast environment so that only a dynamically specified subset of subscribers, called the privileged subset, may decrypt the communication. In practical applications, it is desirable for a Broadcast Encryption Scheme (BES) to demonstrate resilience against attacks by colluding, unprivileged subscribers. Minimal Perfect Hash Families (PHFs) have been shown to provide a basis for the construction of memory-efficient t-resilient Key Pre-distribution Schemes (KPSs) from multiple instances of 1-resilient KPSs. Using this technique, the task of constructing a large t-resilient BES is reduced to finding a near-minimal PHF of appropriate parameters. While combinatorial and probabilistic constructions exist for minimal PHFs with certain parameters, the complexity of constructing them in general is currently unknown. This thesis introduces a new type of hash family, called a Scattering Hash Family (ScHF), which is designed to allow for the scalable and ingredient-independent design of memory-efficient BESs for large parameters, specifically resilience and total number of subscribers. A general BES construction using ScHFs is shown, which constructs t-resilient KPSs from other KPSs of any resilience ≤w≤t. In addition to demonstrating how ScHFs can be used to produce BESs , this thesis explores several ScHF construction techniques. The initial technique demonstrates a probabilistic, non-constructive proof of existence for ScHFs . This construction is then derandomized into a direct, polynomial time construction of near-minimal ScHFs using the method of conditional expectations. As an alternative approach to direct construction, representing ScHFs as a k-restriction problem allows for the indirect construction of ScHFs via randomized post-optimization. Using the methods defined, ScHFs are constructed and the parameters' effects on solution size are analyzed. For large strengths, constructive techniques lose significant performance, and as such, asymptotic analysis is performed using the non-constructive existential results. This work concludes with an analysis of the benefits and disadvantages of BESs based on the constructed ScHFs. Due to the novel nature of ScHFs, the results of this analysis are used as the foundation for an empirical comparison between ScHF-based and PHF-based BESs . The primary bases of comparison are construction efficiency, key material requirements, and message transmission overhead.
ContributorsO'Brien, Devon James (Author) / Colbourn, Charles J (Thesis advisor) / Bazzi, Rida (Committee member) / Richa, Andrea (Committee member) / Arizona State University (Publisher)
Created2012
154142-Thumbnail Image.png
Description
A load balancer is an essential part of many network systems. A load balancer is capable of dividing and redistributing incoming network traffic to different back end servers, thus improving reliability and performance. Existing load balancing solutions can be classified into two categories: hardware-based or software-based. Hardware-based load balancing systems

A load balancer is an essential part of many network systems. A load balancer is capable of dividing and redistributing incoming network traffic to different back end servers, thus improving reliability and performance. Existing load balancing solutions can be classified into two categories: hardware-based or software-based. Hardware-based load balancing systems are hard to manage and force network administrators to scale up (replacing with more powerful but expensive hardware) when their system can not handle the growing traffic. Software-based solutions have a limitation when dealing with a single large TCP flow. In recent years, with the fast developments of virtualization technology, a new trend of network function virtualization (NFV) is being adopted. Instead of using proprietary hardware, an NFV network infrastructure uses virtual machines running to implement network functions such as load balancers, firewalls, etc. In this thesis, a new load balancing system is designed and evaluated. This system is high performance and flexible. It can fully utilize the bandwidth between a load balancer and back end servers compared to traditional load balancers such as HAProxy. The experimental results show that using this NFV load balancer could have $n$ ($n$ is the number of back end servers) times better performance than HAProxy. Also, an extract, transform and load (ETL) application was implemented to demonstrate that this load balancer can shorten data load time. The experiment shows that when loading a large data set (18.3GB), our load balancer needs only 28\% less time than traditional load balancer.
ContributorsWu, Jinxuan (Author) / Syrotiuk, Violet R. (Thesis advisor) / Bazzi, Rida (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2015
157028-Thumbnail Image.png
Description
Due to large data resources generated by online educational applications, Educational Data Mining (EDM) has improved learning effects in different ways: Students Visualization, Recommendations for students, Students Modeling, Grouping Students, etc. A lot of programming assignments have the features like automating submissions, examining the test cases to verify the correctness,

Due to large data resources generated by online educational applications, Educational Data Mining (EDM) has improved learning effects in different ways: Students Visualization, Recommendations for students, Students Modeling, Grouping Students, etc. A lot of programming assignments have the features like automating submissions, examining the test cases to verify the correctness, but limited studies compared different statistical techniques with latest frameworks, and interpreted models in a unified approach.

In this thesis, several data mining algorithms have been applied to analyze students’ code assignment submission data from a real classroom study. The goal of this work is to explore

and predict students’ performances. Multiple machine learning models and the model accuracy were evaluated based on the Shapley Additive Explanation.

The Cross-Validation shows the Gradient Boosting Decision Tree has the best precision 85.93% with average 82.90%. Features like Component grade, Due Date, Submission Times have higher impact than others. Baseline model received lower precision due to lack of non-linear fitting.
ContributorsTian, Wenbo (Author) / Hsiao, Ihan (Thesis advisor) / Bazzi, Rida (Committee member) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2019
133362-Thumbnail Image.png
Description
Aside from uplifting and tearing down the mood of a young LGBTQ+ kid, journalistic media has the potential to alter the way audiences understand and react to individuals of the LGBTQ+ community. Looking at the rhetorical approaches, frameworks, and expanded narratives of news sources, this project engages with the concepts

Aside from uplifting and tearing down the mood of a young LGBTQ+ kid, journalistic media has the potential to alter the way audiences understand and react to individuals of the LGBTQ+ community. Looking at the rhetorical approaches, frameworks, and expanded narratives of news sources, this project engages with the concepts of same-sex marriage, lifestyles, bans, and children in education in order to attain an understanding of what media messages are being shared, how they are being communicated, and what the implications of such rhetoric are. Summary of the findings:
• Same-sex marriage as the win that cannot be repeated.
Infamously known as the central legal battle for the LGBTQ+ community, same-sex marriage finds itself in many political speeches, campaigns, and social commentaries. Interestingly, after being legalized through a Supreme Court decision in the United States, Same-Sex Marriage finds itself framed as the social inevitability that should not be repeated in politics or any legal shift. In other words, “the gays have won this battle, but not the war.”
• There are risks around the “LGBTQ+ lifestyle” and its careful catering to an elite minority and the mediation through bans.
The risks of the LGBTQ+ “lifestyle” date back far, with many connotations being attached to being LGBTQ+ (AIDS epidemics, etc.). In modern journalism, many media outlets portray LGBTQ+ individuals to be a tiny minority (.001% according to some) that demands the whole society to adhere to their requests. This framework portrays the LGBTQ+ community as oppressors and obsessed advocates that can never “seem to get enough” (ex: more than just marriage). The bans are framed as the neutralizing factor to the catering.
• LGBTQ+ children and topics in academic and social spaces are the extreme degree.
When it comes to LGBTQ+ issues and conversations as they revolve around children, media outlets have some of the most passionate opinions about them. Often portrayed as “the line that shouldn’t be crossed,” LGBTQ+ issues, as they find themselves in schools and other spaces, are thus portrayed as bearable to a certain degree, never completely. Claims of indoctrination are also presented prominently even when institutional efforts are to protect LGBTQ+ kids.
ContributorsNieto Calderon, Ramon Antonio (Author) / Himberg, Julia (Thesis director) / Sturges, Robert (Committee member) / Department of English (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133374-Thumbnail Image.png
Description
Waltz, is a collection of poems written to play along the boundaries between sound, language, and meaning. As a vehicle for exploration, the poems in Waltz, commandeer themes of nostalgia, love, loss, and abstraction, all of which build up and break each other down to create something of a nonlinear

Waltz, is a collection of poems written to play along the boundaries between sound, language, and meaning. As a vehicle for exploration, the poems in Waltz, commandeer themes of nostalgia, love, loss, and abstraction, all of which build up and break each other down to create something of a nonlinear narrative, and concomitant sketch of the poet.
ContributorsAieta, Joseph (Author) / Ball, Sally (Thesis director) / Liston, Chelsea (Committee member) / Department of English (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133380-Thumbnail Image.png
Description
The primary purpose of this thesis is two-fold: (1) to understand the resources presently available for Native American college student leaders at Predominantly White institutions (PWIs), and; (2) to consider ways to develop their leadership abilities and knowledge of how experience with college leadership contributes to becoming successful leaders with/in

The primary purpose of this thesis is two-fold: (1) to understand the resources presently available for Native American college student leaders at Predominantly White institutions (PWIs), and; (2) to consider ways to develop their leadership abilities and knowledge of how experience with college leadership contributes to becoming successful leaders with/in their Indigenous communities. The secondary purpose of this thesis is to propose additional resources for PWIs that can inform Native American leadership practices across academic disciplines and fields through the creation of the Indigenous & Innovative Leadership course syllabus and conference. This Honor's Thesis Project begins by exploring leadership development opportunities for Native American undergraduate students at Arizona State University, a predominantly White institution. Also explored are conceptions of Indigenous leadership as it applies to engagement in or with on-campus student organizations, tribal governments, and within surrounding Indigenous communities. This project has implications for thinking about American Indian student success beyond graduation and the role leadership and organization development has for the success of tribal communities.
ContributorsTom, Megan Joyce (Author) / Brayboy, Bryan (Thesis director) / Solyom, Jessica (Committee member) / Department of English (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
131496-Thumbnail Image.png
Description
Genocide studies have traditionally focused on the perpetrator’s intent to eradicate a particular identity-based group, using the Holocaust as their model and point of comparison. Although some aspects of the Holocaust were undoubtedly unique, recent scholars have sought to challenge the notion that it was a singular phenomenon. Instead, they

Genocide studies have traditionally focused on the perpetrator’s intent to eradicate a particular identity-based group, using the Holocaust as their model and point of comparison. Although some aspects of the Holocaust were undoubtedly unique, recent scholars have sought to challenge the notion that it was a singular phenomenon. Instead, they draw attention to a recurring pattern of genocidal events throughout history by shifting the focus from intent to structure. One particular branch of scholars seeks to connect the ideology and tactics of imperialism with certain genocidal events. These anti-imperialist genocide scholars concede that their model cannot account for all genocides, but still claim that it creates meaningful connections between genocides committed by Western colonialist powers and those that have occurred in a neoimperialist world order shaped according to Western interests. The latter includes genocides in postcolonial states, which these scholars believe were shaped by the scars of their colonial past, as well as genocides in which imperial hegemons assisted local perpetrators. Imperialist and former colonial powers have contributed meaningfully to all of these kinds of genocides, yet their contributions have largely been ignored due to their own influence on the creation of the current international order. Incorporating the anti-imperialist perspective into the core doctrine of genocide studies may lead to breakthroughs in areas of related policy and practice, such as prevention and accountability.
ContributorsParker, Ashleigh Mae (Author) / Thies, Cameron (Thesis director) / Sivak, Henry (Committee member) / School of Politics and Global Studies (Contributor) / School of Social Transformation (Contributor) / Department of English (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
133883-Thumbnail Image.png
Description
There has been a recent push for queer fiction, especially in the young adult genre, whose focus is gay and lesbian relationships. This growth is much needed in terms of visibility and the furthering of acceptance, but there are still subjects within the LGBTQ+ community that need to be addressed,

There has been a recent push for queer fiction, especially in the young adult genre, whose focus is gay and lesbian relationships. This growth is much needed in terms of visibility and the furthering of acceptance, but there are still subjects within the LGBTQ+ community that need to be addressed, including bisexual, asexual, and non-binary erasure. There are many people who claim that these identities do not exist, are labels used as a stepping stone on one's journey to discovering that they are homosexual, or are invented excuses for overtly promiscuous or prudish behavior. The existence of negative stereotypes, particularly those of non-binary individuals, is largely due to a lack of visibility and respectful representation within media and popular culture. However, there is still a dearth of non-binary content in popular literature outside of young adult fiction. Can You See Me? aims to fill the gap in bisexual, asexual, and non-binary representation in adult literature. Each of the four stories that make up this collection deals with an aspect of gender and/or sexuality that has been erased, ignored, or denied visibility in American popular culture. The first story, "We'll Grow Lemon Trees," examines bisexual erasure through the lens of sociolinguistics. A bisexual Romanian woman emigrates to Los Angeles in 1989 and must navigate a new culture, learn new languages, and try to move on from her past life under a dictatorship where speaking up could mean imprisonment or death. The second story "Up, Down, All Around," is about a young genderqueer child and their parents dealing with microaggressions, examining gender norms, and exploring personal identity through imaginary scenarios, each involving an encounter with an unknown entity and a colander. The third story, "Aces High," follows two asexual characters from the day they're born to when they are 28 years old, as they find themselves in pop culture. The two endure identity crises, gender discrimination, erasure, individual obsessions, and prejudice as they learn to accept themselves and embrace who they are. In the fourth and final story, "Mile Marker 72," a gay Mexican man must hide in plain sight as he deals with the death of his partner and coming out to his best friend, whose brother is his partner's murderer.
ContributorsOchser, Jordyn M. (Author) / Bell, Matt (Thesis director) / Free, Melissa (Committee member) / Department of English (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05