Trevor J. Bihl

Learn More
The proliferation of low-cost IEEE 802.15.4 ZigBee wireless devices in critical infrastructure applications presents security challenges. Network security commonly relies on bit-level credentials that are easily replicated and exploited by hackers. Unauthorized access can be mitigated by physical layer (PHY) security measures that exploit device-dependent(More)
INTRODUCTION Humans are naturally suited for recognizing and interpreting patterns; however, large and complex datasets, as in Big Data, preclude efficient human analysis. Computational pattern recognition encompasses means of describing, classifying, grouping, categorization, and/or clustering data (Jain, Duin, & Mao, 2000). Expanding on the concept of(More)
Qualia-based Exploitation of Sensing Technology (QuEST) is a dual process framework that leverages what is known about human neurophysiological and neuropsychological processes to create an artificial cognitive exoskeleton functioning similarly to the human mind. In this paper, we present a quick QuEST overview and a visionary approach using QuEST methods(More)
INTRODUCTION Decision support systems (DSSs) are a subset of information systems that support human decision-making through computerized systems that provide contextual information. DSSs allow decision-makers to improve their strategic planning and management control; from a business standpoint these systems have a wide-range of application (Yong & Taib,(More)
Improved network security is addressed using device dependent physical-layer (PHY) based fingerprints from Ethernet cards to augment traditional MAC-based ID verification. The investigation uses unintentional Ethernet cable emissions and device fingerprints comprised of Constellation-Based, Distinct Native Attribute (CB-DNA) features. Near-field collection(More)