Matching Items (457)
Filtering by

Clear all filters

153487-Thumbnail Image.png
Description
Internet browsers are today capable of warning internet users of a potential phishing attack. Browsers identify these websites by referring to blacklists of reported phishing websites maintained by trusted organizations like Google, Phishtank etc. On identifying a Unified Resource Locator (URL) requested by a user as a reported phishing URL,

Internet browsers are today capable of warning internet users of a potential phishing attack. Browsers identify these websites by referring to blacklists of reported phishing websites maintained by trusted organizations like Google, Phishtank etc. On identifying a Unified Resource Locator (URL) requested by a user as a reported phishing URL, browsers like Mozilla Firefox and Google Chrome display an 'active' warning message in an attempt to stop the user from making a potentially dangerous decision of visiting the website and sharing confidential information like username-password, credit card information, social security number etc.

However, these warnings are not always successful at safeguarding the user from a phishing attack. On several occasions, users ignore these warnings and 'click through' them, eventually landing at the potentially dangerous website and giving away confidential information. Failure to understand the warning, failure to differentiate different types of browser warnings, diminishing trust on browser warnings due to repeated encounter are some of the reasons that make users ignore these warnings. It is important to address these factors in order to eventually improve a user’s reaction to these warnings.

In this thesis, I propose a novel design to improve the effectiveness and reliability of phishing warning messages. This design utilizes the name of the target website that a fake website is mimicking, to display a simple, easy to understand and interactive warning message with the primary objective of keeping the user away from a potentially spoof website.
ContributorsSharma, Satyabrata (Author) / Bazzi, Rida (Thesis advisor) / Walker, Erin (Committee member) / Gaffar, Ashraf (Committee member) / Arizona State University (Publisher)
Created2015
150212-Thumbnail Image.png
Description
This thesis addresses the problem of online schema updates where the goal is to be able to update relational database schemas without reducing the database system's availability. Unlike some other work in this area, this thesis presents an approach which is completely client-driven and does not require specialized database management

This thesis addresses the problem of online schema updates where the goal is to be able to update relational database schemas without reducing the database system's availability. Unlike some other work in this area, this thesis presents an approach which is completely client-driven and does not require specialized database management systems (DBMS). Also, unlike other client-driven work, this approach provides support for a richer set of schema updates including vertical split (normalization), horizontal split, vertical and horizontal merge (union), difference and intersection. The update process automatically generates a runtime update client from a mapping between the old the new schemas. The solution has been validated by testing it on a relatively small database of around 300,000 records per table and less than 1 Gb, but with limited memory buffer size of 24 Mb. This thesis presents the study of the overhead of the update process as a function of the transaction rates and the batch size used to copy data from the old to the new schema. It shows that the overhead introduced is minimal for medium size applications and that the update can be achieved with no more than one minute of downtime.
ContributorsTyagi, Preetika (Author) / Bazzi, Rida (Thesis advisor) / Candan, Kasim S (Committee member) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2011
150895-Thumbnail Image.png
Description
Broadcast Encryption is the task of cryptographically securing communication in a broadcast environment so that only a dynamically specified subset of subscribers, called the privileged subset, may decrypt the communication. In practical applications, it is desirable for a Broadcast Encryption Scheme (BES) to demonstrate resilience against attacks by colluding, unprivileged

Broadcast Encryption is the task of cryptographically securing communication in a broadcast environment so that only a dynamically specified subset of subscribers, called the privileged subset, may decrypt the communication. In practical applications, it is desirable for a Broadcast Encryption Scheme (BES) to demonstrate resilience against attacks by colluding, unprivileged subscribers. Minimal Perfect Hash Families (PHFs) have been shown to provide a basis for the construction of memory-efficient t-resilient Key Pre-distribution Schemes (KPSs) from multiple instances of 1-resilient KPSs. Using this technique, the task of constructing a large t-resilient BES is reduced to finding a near-minimal PHF of appropriate parameters. While combinatorial and probabilistic constructions exist for minimal PHFs with certain parameters, the complexity of constructing them in general is currently unknown. This thesis introduces a new type of hash family, called a Scattering Hash Family (ScHF), which is designed to allow for the scalable and ingredient-independent design of memory-efficient BESs for large parameters, specifically resilience and total number of subscribers. A general BES construction using ScHFs is shown, which constructs t-resilient KPSs from other KPSs of any resilience ≤w≤t. In addition to demonstrating how ScHFs can be used to produce BESs , this thesis explores several ScHF construction techniques. The initial technique demonstrates a probabilistic, non-constructive proof of existence for ScHFs . This construction is then derandomized into a direct, polynomial time construction of near-minimal ScHFs using the method of conditional expectations. As an alternative approach to direct construction, representing ScHFs as a k-restriction problem allows for the indirect construction of ScHFs via randomized post-optimization. Using the methods defined, ScHFs are constructed and the parameters' effects on solution size are analyzed. For large strengths, constructive techniques lose significant performance, and as such, asymptotic analysis is performed using the non-constructive existential results. This work concludes with an analysis of the benefits and disadvantages of BESs based on the constructed ScHFs. Due to the novel nature of ScHFs, the results of this analysis are used as the foundation for an empirical comparison between ScHF-based and PHF-based BESs . The primary bases of comparison are construction efficiency, key material requirements, and message transmission overhead.
ContributorsO'Brien, Devon James (Author) / Colbourn, Charles J (Thesis advisor) / Bazzi, Rida (Committee member) / Richa, Andrea (Committee member) / Arizona State University (Publisher)
Created2012
149091-Thumbnail Image.png
Description

Geology and its tangential studies, collectively known and referred to in this thesis as geosciences, have been paramount to the transformation and advancement of society, fundamentally changing the way we view, interact and live with the surrounding natural and built environment. It is important to recognize the value and importance

Geology and its tangential studies, collectively known and referred to in this thesis as geosciences, have been paramount to the transformation and advancement of society, fundamentally changing the way we view, interact and live with the surrounding natural and built environment. It is important to recognize the value and importance of this interdisciplinary scientific field while reconciling its ties to imperial and colonizing extractive systems which have led to harmful and invasive endeavors. This intersection among geosciences, (environmental) justice studies, and decolonization is intended to promote inclusive pedagogical models through just and equitable methodologies and frameworks as to prevent further injustices and promote recognition and healing of old wounds. By utilizing decolonial frameworks and highlighting the voices of peoples from colonized and exploited landscapes, this annotated syllabus tackles the issues previously described while proposing solutions involving place-based education and the recentering of land within geoscience pedagogical models. (abstract)

ContributorsReed, Cameron E (Author) / Richter, Jennifer (Thesis director) / Semken, Steven (Committee member) / School of Earth and Space Exploration (Contributor, Contributor) / School of Sustainability (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
154142-Thumbnail Image.png
Description
A load balancer is an essential part of many network systems. A load balancer is capable of dividing and redistributing incoming network traffic to different back end servers, thus improving reliability and performance. Existing load balancing solutions can be classified into two categories: hardware-based or software-based. Hardware-based load balancing systems

A load balancer is an essential part of many network systems. A load balancer is capable of dividing and redistributing incoming network traffic to different back end servers, thus improving reliability and performance. Existing load balancing solutions can be classified into two categories: hardware-based or software-based. Hardware-based load balancing systems are hard to manage and force network administrators to scale up (replacing with more powerful but expensive hardware) when their system can not handle the growing traffic. Software-based solutions have a limitation when dealing with a single large TCP flow. In recent years, with the fast developments of virtualization technology, a new trend of network function virtualization (NFV) is being adopted. Instead of using proprietary hardware, an NFV network infrastructure uses virtual machines running to implement network functions such as load balancers, firewalls, etc. In this thesis, a new load balancing system is designed and evaluated. This system is high performance and flexible. It can fully utilize the bandwidth between a load balancer and back end servers compared to traditional load balancers such as HAProxy. The experimental results show that using this NFV load balancer could have $n$ ($n$ is the number of back end servers) times better performance than HAProxy. Also, an extract, transform and load (ETL) application was implemented to demonstrate that this load balancer can shorten data load time. The experiment shows that when loading a large data set (18.3GB), our load balancer needs only 28\% less time than traditional load balancer.
ContributorsWu, Jinxuan (Author) / Syrotiuk, Violet R. (Thesis advisor) / Bazzi, Rida (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2015
157028-Thumbnail Image.png
Description
Due to large data resources generated by online educational applications, Educational Data Mining (EDM) has improved learning effects in different ways: Students Visualization, Recommendations for students, Students Modeling, Grouping Students, etc. A lot of programming assignments have the features like automating submissions, examining the test cases to verify the correctness,

Due to large data resources generated by online educational applications, Educational Data Mining (EDM) has improved learning effects in different ways: Students Visualization, Recommendations for students, Students Modeling, Grouping Students, etc. A lot of programming assignments have the features like automating submissions, examining the test cases to verify the correctness, but limited studies compared different statistical techniques with latest frameworks, and interpreted models in a unified approach.

In this thesis, several data mining algorithms have been applied to analyze students’ code assignment submission data from a real classroom study. The goal of this work is to explore

and predict students’ performances. Multiple machine learning models and the model accuracy were evaluated based on the Shapley Additive Explanation.

The Cross-Validation shows the Gradient Boosting Decision Tree has the best precision 85.93% with average 82.90%. Features like Component grade, Due Date, Submission Times have higher impact than others. Baseline model received lower precision due to lack of non-linear fitting.
ContributorsTian, Wenbo (Author) / Hsiao, Ihan (Thesis advisor) / Bazzi, Rida (Committee member) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2019
133349-Thumbnail Image.png
Description
The purpose of this paper is to understand how companies are finding high potential employees and if they are leaving top talent behind in their approach. Eugene Burke stated in 2014 that 55% of employees that are labeled as a High Potential Employee will turn over and move companies. Burke

The purpose of this paper is to understand how companies are finding high potential employees and if they are leaving top talent behind in their approach. Eugene Burke stated in 2014 that 55% of employees that are labeled as a High Potential Employee will turn over and move companies. Burke (2014) also states that the average high potential employee tenure is five years. The Corporate Leadership Council says that on average, 27% of a company's development budget is spent on its high potential program (CEB 2017). For a midsize company, the high potential development budget is almost a million dollars for only a handful of employees, only to see half of the investment walking out the door to another company . Furthermore, the Corporate Leadership Council said that a study done in 2005 revealed that 50% of high potential employees had significant problems within their job (Kotlyar and Karkowsky 2014). Are time and resources are being given to the wrong employees and the right employees are being overlooked? This paper exams how companies traditionally select high potential employees and where companies are potentially omitting employees who would be better suited for the program. This paper proposes that how a company discovers their top talent will correlate to the number of turnovers or struggles that a high potential employee has on their job. Future research direction and practical considerations are also presented in this paper.
ContributorsHarrison, Carrie (Author) / Mizzi, Philip (Thesis director) / Ruediger, Stefan (Committee member) / Department of Management and Entrepreneurship (Contributor) / School of Sustainability (Contributor) / Department of Supply Chain Management (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133355-Thumbnail Image.png
Description
This study estimates the capitalization effect of golf courses in Maricopa County using the hedonic pricing method. It draws upon a dataset of 574,989 residential transactions from 2000 to 2006 to examine how the aesthetic, non-golf benefits of golf courses capitalize across a gradient of proximity measures. The measures for

This study estimates the capitalization effect of golf courses in Maricopa County using the hedonic pricing method. It draws upon a dataset of 574,989 residential transactions from 2000 to 2006 to examine how the aesthetic, non-golf benefits of golf courses capitalize across a gradient of proximity measures. The measures for amenity value extend beyond home adjacency and include considerations for homes within a range of discrete walkability buffers of golf courses. The models also distinguish between public and private golf courses as a proxy for the level of golf course access perceived by non-golfers. Unobserved spatial characteristics of the neighborhoods around golf courses are controlled for by increasing the extent of spatial fixed effects from city, to census tract, and finally to 2000 meter golf course ‘neighborhoods.’ The estimation results support two primary conclusions. First, golf course proximity is found to be highly valued for adjacent homes and homes up to 50 meters way from a course, still evident but minimal between 50 and 150 meters, and insignificant at all other distance ranges. Second, private golf courses do not command a higher proximity premia compared to public courses with the exception of homes within 25 to 50 meters of a course, indicating that the non-golf benefits of courses capitalize similarly, regardless of course type. The results of this study motivate further investigation into golf course features that signal access or add value to homes in the range of capitalization, particularly for near-adjacent homes between 50 and 150 meters thought previously not to capitalize.
ContributorsJoiner, Emily (Author) / Abbott, Joshua (Thesis director) / Smith, Kerry (Committee member) / Economics Program in CLAS (Contributor) / School of Sustainability (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133907-Thumbnail Image.png
Description
As climate change and air pollution continue to plague the world today, committed citizens are doing their part to minimize their environmental impact. However, financial limitations have hindered a majority of individuals from adopting clean, renewable energy such as rooftop photovoltaic solar systems. England Sustainability Consulting plans to reverse this

As climate change and air pollution continue to plague the world today, committed citizens are doing their part to minimize their environmental impact. However, financial limitations have hindered a majority of individuals from adopting clean, renewable energy such as rooftop photovoltaic solar systems. England Sustainability Consulting plans to reverse this limitation and increase affordability for residents across Northern California to install solar panel systems for their energy needs. The purpose of this proposal is to showcase a new approach to procuring solar panel system components while offering the same products needed by each customer. We will examine market data to further prove the feasibility of this business approach while remaining profitable and spread our company's vision across all of Northern California.
ContributorsEngland, Kaysey (Author) / Dooley, Kevin (Thesis director) / Keahey, Jennifer (Committee member) / Department of Supply Chain Management (Contributor) / School of Social and Behavioral Sciences (Contributor) / W.P. Carey School of Business (Contributor) / School of Sustainability (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
135548-Thumbnail Image.png
Description
This paper explores the contested relationships between nature, culture, and gender. In order to analyze these relationships, we look specifically at outdoor recreation. Furthermore, we employ poststructuralist feminist theory in order to produce three frameworks; the first of which is titled Mother Nature’s Promiscuous Past. Rooted in Old World and

This paper explores the contested relationships between nature, culture, and gender. In order to analyze these relationships, we look specifically at outdoor recreation. Furthermore, we employ poststructuralist feminist theory in order to produce three frameworks; the first of which is titled Mother Nature’s Promiscuous Past. Rooted in Old World and colonial values, this framework illustrates the flawed feminization of nature by masculinity, and its subsequent extortion of anything related to femininity — including women and nature itself. This belief barred women from nature, resulting in a lack of access for women to outdoor recreation.
Our second framework, titled The Pleasurable Potential of Outdoor Recreation, cites second-wave feminism as a catalyst for women’s participation in wilderness exploration and outdoor recreation. The work of radical feminists and the women’s liberation movement in 1960s and 1970s empowered women at home, in the workplace, and eventually, in the outdoors; women reclaimed their wilderness, yet they continued to employ Framework One’s feminization of nature. Ecofeminsim brought together nature and women, seeking to bring justice to two groups wronged by the same entity: masculinity. In this context, outdoor recreation is empowering for women.
Despite the potential of Framework Two to reinscribe and better the experiences of women in outdoor recreation, we argue that both Frameworks One and Two perpetuate the gender binary and the nature/culture binary, because they are based upon the notion that women are in fact fundamentally different and separate from men, the notion that nature is an entity separate from culture, or human society, as well as the notion that nature is in fact a feminine entity.
Our third framework, Deer Pay No Mind to Your Genitals, engages poststructuralism, asserting that outdoor recreation and activities that occur in nature can serve to destabilize and deconstruct notions of the gender binary. However, we argue that care must be exercised during this process as not to perpetuate the problematic nature/culture binary, a phenomenon that is unproductive in terms of both sustainability and gender liberation. Outdoor recreation has been used by many as a tool to deconstruct numerous societal constraints, including the gender binary; this, however, continues to attribute escapist and isolationist qualities toward nature, and therefore perpetuating the nature/culture divide. Ultimately, we argue outdoor recreation can and should be used as a tool deconstruct the gender binary, however needs to account for the fact that if nature is helping to construct elements of culture, then the two cannot be separate.
ContributorsPolick-Kirkpatrick, Kaelyn (Co-author) / Downing, Haley Marie (Co-author) / Dove-Viebahn, Aviva (Thesis director) / Schoon, Michael (Committee member) / School of Sustainability (Contributor) / School of Social Transformation (Contributor) / Economics Program in CLAS (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05