scispace - formally typeset
Search or ask a question
Institution

University of North Carolina at Charlotte

EducationCharlotte, North Carolina, United States
About: University of North Carolina at Charlotte is a education organization based out in Charlotte, North Carolina, United States. It is known for research contribution in the topics: Population & Poison control. The organization has 8772 authors who have published 22239 publications receiving 562529 citations. The organization is also known as: UNC Charlotte & UNCC.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, a new cost model is developed to evaluate the Levelized Cost of Energy (LCOE) from a wind power source under a power purchase agreement (PPA) contract.

131 citations

Journal ArticleDOI
TL;DR: Findings suggest that the revised Posttraumatic Growth Inventory for Children (PTGI-C-R) may assist efforts to understand children's responses posttrauma.
Abstract: Posttraumatic growth (PTG; positive change resulting from the struggle with trauma) was examined among children impacted by Hurricane Katrina. The revised Posttraumatic Growth Inventory for Children (PTGI-C-R) assessed PTG at two time points, 12 (T1) and 22 months (T2) posthurricane. The PTGI-C-R demonstrated good reliability. Analyses focused on trauma-related variables in predicting PTG. Child-reported subjective responses to the hurricane and posttraumatic stress symptoms (PTSS) correlated with PTG at T1; however, in the regression, only PTSS significantly explained variance in PTG. At follow-up, T1 PTG was the only significant predictor of PTG. Findings suggest that the PTGI-C-R may assist efforts to understand children's responses posttrauma.

131 citations

Journal ArticleDOI
TL;DR: This article found that having a highly successful football team has a positive impact on both the overall graduation rate and the alumni giving rate at major universities, while having a successful basketball team has no significant effect on either of these key measures of academic success.

131 citations

Journal ArticleDOI
TL;DR: In this paper, the authors explore the spatial, temporal and gender differences in transportation modal choice among student commuters with an objective of uncovering incentives to increase the use of non-motorized or public transportation to the campus.

131 citations

Book ChapterDOI
03 Sep 2012
TL;DR: The analysis, implementation and evaluation show that RHM can effectively defend against stealthy scanning, many types of worm propagation and attacks that require reconnaissance for successful launching, and the performance bounds for moving target defense in a practical network setup are shown.
Abstract: Exploiting static configuration of networks and hosts has always been a great advantage for design and launching of decisive attacks. Network reconnaissance of IP addresses and ports is prerequisite to many host and network attacks. At the same time, knowing IP addresses is required for service reachability in IP networks, which makes complete concealment of IP address for servers infeasible. In addition, changing IP addresses too frequently may cause serious ramifications including service interruptions, routing inflation, delays and security violations. In this paper, we present a novel approach that turns end-hosts into untraceable moving targets by transparently mutating their IP addresses in an intelligent and unpredictable fashion and without sacrificing network integrity, manageability or performance. The presented technique is called Random Host Mutation (RHM). In RHM, moving target hosts are assigned virtual IP addresses that change randomly and synchronously in a distributed fashion over time. In order to prevent disruption of active connections, the IP address mutation is managed by network appliances and totally transparent to end-host. RHM employs multi-level optimized mutation techniques that maximize uncertainty in adversary scanning by effectively using the whole available address range, while at the same time minimizing the size of routing tables, and reconfiguration updates. RHM can be transparently deployed on existing networks on end-hosts or network elements. Our analysis, implementation and evaluation show that RHM can effectively defend against stealthy scanning, many types of worm propagation and attacks that require reconnaissance for successful launching. We also show the performance bounds for moving target defense in a practical network setup.

130 citations


Authors

Showing all 8936 results

NameH-indexPapersCitations
Chao Zhang127311984711
E. Magnus Ohman12462268976
Staffan Kjelleberg11442544414
Kenneth L. Davis11362261120
David Wilson10275749388
Michael Bauer100105256841
David A. B. Miller9670238717
Ashutosh Chilkoti9541432241
Chi-Wang Shu9352956205
Gang Li9348668181
Tiefu Zhao9059336856
Juan Carlos García-Pagán9034825573
Denise C. Park8826733158
Santosh Kumar80119629391
Chen Chen7685324974
Network Information
Related Institutions (5)
Arizona State University
109.6K papers, 4.4M citations

93% related

Virginia Tech
95.2K papers, 2.9M citations

92% related

University of Tennessee
87K papers, 2.8M citations

91% related

Pennsylvania State University
196.8K papers, 8.3M citations

91% related

University of Maryland, College Park
155.9K papers, 7.2M citations

91% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202361
2022231
20211,471
20201,561
20191,489
20181,318