Audrey GendreauDeloitte & Touche Llp
Audrey Gendreau
Ph.D., CISSP, GCFE GCFA
About
8
Publications
7,310
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
164
Citations
Introduction
Additional affiliations
August 2015 - present
Eckerd College Department of Computer Science
Position
- Visiting Assistant Professor of Computer Science
May 2015 - present
Nova Southeastern University’s College of Engineering and Computing
Position
- Professor (Associate)
August 2003 - August 2005
Computer Science - Pasco-Hernando Community College
Position
- Professor (Associate)
Publications
Publications (8)
Abstract—The Internet of Things (IoT) is one of the largest technological evolutions of computing; by 2022 it is estimated that a trillion IP addresses (objects) will be connected to the Internet. The obscurity and low accessibility of many of these devices in this vast heterogeneous network will make it difficult to holistically monitor informatio...
The Internet of Things (IoT) is a heterogeneous network of objects that communicate with each other and their owners over the Internet. In the future, the utilization of distributed technologies in combination with their object applications will result in an unprecedented level of knowledge and awareness, creating new business opportunities and exp...
Abstract—In the future, things in the Internet of Things should be able to provide solutions for any task that we ask them to perform. Imagine that we would have hundreds of billions of devices connected to the Internet, each of these devices possibly has hundreds of gigabytes of storage and memory, a magnitude of giga instructions per second, and...
Abstract— Analysis of the security situation of networks is an important area in the information security research field. Furthermore, situation awareness is critical to the Internet of Things (IoT) given the limited lifetime, and autonomous nature of wireless sensor networks (WSN).
In this work, a measurement for situation awareness for the IoT i...
Abstract—This paper examines the vulnerabilities to the security of physical computing interactive systems, which are designed to sense and respond to a physical phenomenon. Specifically, it discusses vulnerabilities of physical computing from the unique perspective of the Do-It-Yourself (DIY) community. Vulnerabilities associated with the Arduino,...
It is about the challenge of work-life balance that ultimately, and unexpectedly, led to complete a PhD.
Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research,...