Trevor J. Bihl

Learn More
The proliferation of low-cost IEEE 802.15.4 ZigBee wireless devices in critical infrastructure applications presents security challenges. Network security commonly relies on bit-level credentials that are easily replicated and exploited by hackers. Unauthorized access can be mitigated by physical layer (PHY) security measures that exploit device-dependent(More)
The RX anomaly detector is well known for its unsupervised ability to detect anomalies in hyperspectral images (HSI). However, the RX method assumes the data is uncorrelated and homogeneous, both of which are not inherent in HSI data. To defeat the correlation and homogeneity, a new method dubbed Iterative Linear RX is proposed. Rather than the test pixel(More)
Qualia-based Exploitation of Sensing Technology (QuEST) is a dual process framework that leverages what is known about human neurophysiological and neuropsychological processes to create an artificial cognitive exoskeleton functioning similarly to the human mind. In this paper, we present a quick QuEST overview and a visionary approach using QuEST methods(More)
Improved network security is addressed using device dependent physical-layer (PHY) based fingerprints from Ethernet cards to augment traditional MAC-based ID verification. The investigation uses unintentional Ethernet cable emissions and device fingerprints comprised of Constellation-Based, Distinct Native Attribute (CB-DNA) features. Near-field collection(More)
The objective of this case study was to describe the neuropsychological rehabilitation of a 16-year-old patient who presented a Cerebellar Cognitive Affective Syndrome (CCAS) following a bilateral cerebellar hemorrhage. The patient presented severe and diffuse cognitive deficits, massive behavioral disorders, and emotion regulation difficulties. The(More)
INTRODUCTION Decision support systems (DSSs) are a subset of information systems that support human decision-making through computerized systems that provide contextual information. DSSs allow decision-makers to improve their strategic planning and management control; from a business standpoint these systems have a wide-range of application (Yong & Taib,(More)