Feature Selection From Traffic Analysis For Computer Network Backdoor Detection

Attacks on computer networks happen every day, but many go undetected. Not all attacks succeed, but the ones that do often leave so called “back doors” behind that allow the attackers to easily gain access back into the computer network without having to attack it further. This project focuses on the use of mathematics and statistics to determine what features of network traffic (the data flowing on the wire between a computer network and the rest of the internet) can be used to determine if an unauthorized back door is present in a computer network.

Calibration, Characterization and Optimization of Microwave Imaging System for Grain Monitoring

Microwave Imaging (MWI) is an emerging modality where the goal is to estimate the electrical properties of an object-of-interest. This is done by transmitting a microwave signal into the OI and collecting measurements outside the OI. The measurements are inputs to an optimization algorithm that solves for the unknown electrical properties. It has been proven using computational techniques that the proposed modality can be successfully adapted for monitoring moisture content inside grain bins.

Efficient Signal Processing and Radio Resource Management (RRM)for Coordinated Multiple-Antenna Multi-Node Downlink Transmission in Heterogeneous Cellular Networks

Reliable high-speed wireless data transmission is the primary goal of future cellular systems. A key impediment to achieving this goal is interference on receivers from transmitters in adjacent cells. This problem becomes even more challenging when the types of transmitters and cell sizes vary within a heterogeneous network (HetNet). The performance of users near a cell edge suffers the most. There are several ways to mitigate interference and improve performance.

Advanced Network Intrusion Detection Using Automated Algorithms and Threat Models

Computer attacks such as viruses, Trojans, etc. are a continuous problem for governments, companies, and individuals. The most common methods of detecting these computer problems like anti-virus systems rely on an attack being known and described before it can be detected. This opens a hole in computer security systems for new attacks that have not yet been detected. This project focuses on the use of mathematics and advanced anomaly detection algorithms to determine 'normal' and 'abnormal' behavior on computer networks, and attempts to detect attacks by detecting 'abnormal' behavior.

Aperture antennas as mobile satellite terminals

Antennas are essential part of communication links. This project is investigating antennas for communication between a mobile terminal on earth to a satellite. The mobile terminal could be a flying craft or a vehicle in motion. These antennas should be able to transmit and receive data simultaneously in different channels. Besides, they should be capable of scanning the space to find the target satellite. Single channel antennas or antennas with mechanical tracking have been tested for this purpose and are available in market.