Institution
University of North Carolina at Charlotte
Education•Charlotte, North Carolina, United States•
About: University of North Carolina at Charlotte is a education organization based out in Charlotte, North Carolina, United States. It is known for research contribution in the topics: Population & Poison control. The organization has 8772 authors who have published 22239 publications receiving 562529 citations. The organization is also known as: UNC Charlotte & UNCC.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this article, a new cost model is developed to evaluate the Levelized Cost of Energy (LCOE) from a wind power source under a power purchase agreement (PPA) contract.
131 citations
••
TL;DR: Findings suggest that the revised Posttraumatic Growth Inventory for Children (PTGI-C-R) may assist efforts to understand children's responses posttrauma.
Abstract: Posttraumatic growth (PTG; positive change resulting from the struggle with trauma) was examined among children impacted by Hurricane Katrina. The revised Posttraumatic Growth Inventory for Children (PTGI-C-R) assessed PTG at two time points, 12 (T1) and 22 months (T2) posthurricane. The PTGI-C-R demonstrated good reliability. Analyses focused on trauma-related variables in predicting PTG. Child-reported subjective responses to the hurricane and posttraumatic stress symptoms (PTSS) correlated with PTG at T1; however, in the regression, only PTSS significantly explained variance in PTG. At follow-up, T1 PTG was the only significant predictor of PTG. Findings suggest that the PTGI-C-R may assist efforts to understand children's responses posttrauma.
131 citations
••
TL;DR: This article found that having a highly successful football team has a positive impact on both the overall graduation rate and the alumni giving rate at major universities, while having a successful basketball team has no significant effect on either of these key measures of academic success.
131 citations
••
TL;DR: In this paper, the authors explore the spatial, temporal and gender differences in transportation modal choice among student commuters with an objective of uncovering incentives to increase the use of non-motorized or public transportation to the campus.
131 citations
••
03 Sep 2012TL;DR: The analysis, implementation and evaluation show that RHM can effectively defend against stealthy scanning, many types of worm propagation and attacks that require reconnaissance for successful launching, and the performance bounds for moving target defense in a practical network setup are shown.
Abstract: Exploiting static configuration of networks and hosts has always been a great advantage for design and launching of decisive attacks. Network reconnaissance of IP addresses and ports is prerequisite to many host and network attacks. At the same time, knowing IP addresses is required for service reachability in IP networks, which makes complete concealment of IP address for servers infeasible. In addition, changing IP addresses too frequently may cause serious ramifications including service interruptions, routing inflation, delays and security violations. In this paper, we present a novel approach that turns end-hosts into untraceable moving targets by transparently mutating their IP addresses in an intelligent and unpredictable fashion and without sacrificing network integrity, manageability or performance. The presented technique is called Random Host Mutation (RHM). In RHM, moving target hosts are assigned virtual IP addresses that change randomly and synchronously in a distributed fashion over time. In order to prevent disruption of active connections, the IP address mutation is managed by network appliances and totally transparent to end-host. RHM employs multi-level optimized mutation techniques that maximize uncertainty in adversary scanning by effectively using the whole available address range, while at the same time minimizing the size of routing tables, and reconfiguration updates. RHM can be transparently deployed on existing networks on end-hosts or network elements. Our analysis, implementation and evaluation show that RHM can effectively defend against stealthy scanning, many types of worm propagation and attacks that require reconnaissance for successful launching. We also show the performance bounds for moving target defense in a practical network setup.
130 citations
Authors
Showing all 8936 results
Name | H-index | Papers | Citations |
---|---|---|---|
Chao Zhang | 127 | 3119 | 84711 |
E. Magnus Ohman | 124 | 622 | 68976 |
Staffan Kjelleberg | 114 | 425 | 44414 |
Kenneth L. Davis | 113 | 622 | 61120 |
David Wilson | 102 | 757 | 49388 |
Michael Bauer | 100 | 1052 | 56841 |
David A. B. Miller | 96 | 702 | 38717 |
Ashutosh Chilkoti | 95 | 414 | 32241 |
Chi-Wang Shu | 93 | 529 | 56205 |
Gang Li | 93 | 486 | 68181 |
Tiefu Zhao | 90 | 593 | 36856 |
Juan Carlos García-Pagán | 90 | 348 | 25573 |
Denise C. Park | 88 | 267 | 33158 |
Santosh Kumar | 80 | 1196 | 29391 |
Chen Chen | 76 | 853 | 24974 |