- AUETD Home
- Browsing by Author
Browsing by Author "Tauritz, Daniel"
Now showing items 1-6 of 6
- Sort by:
- title
- issue date
- submit date
- Order:
- ascending
- descending
- Results:
- 5
- 10
- 20
- 40
- 60
- 80
- 100
Android Malware Detection Using Data Mining Techniques on Process Control Block Information
Alawneh, Heba (2020-07-24)
Because smartphones are increasingly becoming the mobile computing device of choice, we are experiencing an increase in the number and sophistication of mobile-computing-based malware attacks. A lot of these attacks target ...
The Automated Design of Network Graph Algorithms with Applications in Cybersecurity
Pope, Aaron (2020-01-06) ETD File Embargoed
Graph representations and graph algorithms are commonplace in a wide variety of research domains, including computer and network security. Many problems can be expressed in terms of graphs in order to leverage the strengths ...
Development and applications of machine learning frameworks for dynamic emulation of aerospace multiphysics problems and characterization of microstructure
Perera, Roberto (2024-04-23)
Future challenges in aerospace problems, spanning space exploration and military aircraft, demand advancements in several areas, including in-space 3D printing, high-performance missile technology, and rapid structural ...
Employing Supportive Coevolution for the Automated Design and Configuration of Evolutionary Algorithm Operators and Parameters
Kamrath, Nathaniel (2021-11-17)
Evolutionary Algorithms (EAs) can be highly complex structures requiring many operators and parameters to function. Since EA performance can be highly dependent on these parameters and operators, creating automatic methods ...
A Research Framework for Asynchronous Adversarial Multi-Player Games with Human Player GUI and AI Gym
Roberts, Cody (2023-07-27)
The primary contribution of this thesis is to describe the design and development of a research framework to support complex, real-time asynchronous multi-agent simulations with both homogeneous as well as heterogeneous ...
A Vulnerability Assessment Testing Methodology for V2X-Enabled Environments
Cuneo, Jason (2022-12-05)
V2X systems and networks are unlike existing wireless technologies since more data, bandwidth, and speed is required when communicating over a highly dynamic and ever-changing vehicular network. Protocols supporting V2X ...