Search
Now showing items 1-9 of 9
Securing cloud-hosted applications using active defense with rule-based adaptations
(University of Missouri--Columbia, 2021)
Security cloud-based applications is a dynamic problem since modern attacks are always evolving in their sophistication and disruption impact. Active defense is a state-of-the-art paradigm where proactive or reactive ...
ClaimChain: secure Blockchain platform for handling insurance claims processing
(University of Missouri--Columbia, 2021)
Insurance claims processing involves multi-domain entities and multi-source data, along with a number of human-agent interactions. Consequently, this processing is traditionally manually-intensive and time-consuming. ...
"Bring-your-own" plug-in management for next-generation science gateway applications
(University of Missouri--Columbia, 2020)
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI-COLUMBIA AT REQUEST OF AUTHOR.] Science gateways are web-portals that hide background complexities of underlying resources and expose easy-to-use capabilities of scientific ...
Location prediction and trajectory optimization in multi-UAV application missions
(University of Missouri--Columbia, 2021)
Unmanned aerial vehicles (a.k.a. drones) have a wide range of applications in e.g., aerial surveillance, mapping, imaging, monitoring, maritime operations, parcel delivery, and disaster response management. Their operations ...
Enhancing network-edge connectivity and computation security in drone video analytics
(University of Missouri--Columbia, 2020)
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI--COLUMBIA AT REQUEST OF AUTHOR.] Unmanned Aerial Vehicle (UAV) systems with high-resolution video cameras are used for many operations such as aerial imaging, search and ...
Consortium blockchain management with a peer reputation system for critical information sharing
(University of Missouri--Columbia, 2020)
Blockchain technology based applications are emerging to establish distributed trust amongst organizations who want to share critical information for mutual benefit amongst their peers. There is a growing need for consortium ...
Automated defense against targeted attacks using suspiciousness tracking
(University of Missouri--Columbia, 2021)
Cloud ecosystems, technologies, and paradigms have transformed our world in recent years revolutionizing supply chains, healthcare, energy distribution, as well as our home functions. With everything in our lives so ...
Custom templates based heterogeneous resource allocation for data-intensive applications
(University of Missouri--Columbia, 2020)
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI-COLUMBIA AT REQUEST OF AUTHOR.] The increase of data-intensive applications in science and engineering fields (i.e., bioinformatics, cybermanufacturing) demand the use of ...
User experience and robustness in social virtual reality applications
(University of Missouri--Columbia, 2020)
Cloud-based applications that rely on emerging technologies such as social virtual reality are increasingly being deployed at high-scale in e.g., remote-learning, public safety, and healthcare. These applications increasingly ...