Search
Now showing items 1-4 of 4
Evaluation of Diagonal Confidence-Weighted Learning on the KDD Cup 1999 Dataset for Network Intrusion Detection Systems
(2011-02-03)
In this study, I evaluate the performance of diagonal Confidence-Weighted (CW) online linear classification on the KDD Cup 1999 dataset for network intrusion detection systems (NIDS). This is a compatible relationship due ...
Design and Implementation of Views: Isolated Perspectives of a File System for Regulatory Compliance
(2009-08-24)
We present Views, a file system architecture designed to meet the role-based access control (RBAC) requirement of federal regulations, such as those in HIPAA. Views allows for discrete IO entities, such as users, groups or ...
Pseudorandom Number Generators on Atmel AVR AT90USB1287 Microcontrollers
(2010-01-27)
The purpose of this report is to provide exhaustive details of my Computer Security Architecture project this spring 2008 semester. Ultimately, the goal has been to prepare a document that an
undergraduate student can ...
Design and Implementation of Views: Isolated Perspectives of a File System
(2010-04-20)
We present Views, a file system architecture that provides isolation between system components for the purposes of access control, regulatory compliance, and sandboxing. Views allows for discrete I/O entities, such as ...