Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Association of Arab Universities (15)
- University of South Florida (13)
- University of Central Florida (12)
- Southern Methodist University (9)
- Embry-Riddle Aeronautical University (8)
-
- Rochester Institute of Technology (6)
- Karbala International Journal of Modern Science (4)
- Kennesaw State University (4)
- Tashkent State Technical University (4)
- California State University, San Bernardino (2)
- Faculty of Engineering, Mansoura University (2)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (2)
- Old Dominion University (2)
- Penn State Dickinson Law (2)
- Purdue University (2)
- Universitas Indonesia (2)
- Universitas Negeri Yogyakarta (2)
- University of Arkansas, Fayetteville (2)
- Western Michigan University (2)
- Al-Azhar University (1)
- Bridgewater State University (1)
- Central Mining Institute (1)
- Claremont Colleges (1)
- Duquesne University (1)
- Illinois Wesleyan University (1)
- Journal of Police and Legal Sciences (1)
- Macalester College (1)
- Marshall University (1)
- Maurer School of Law: Indiana University (1)
- Olivet Nazarene University (1)
- Keyword
-
- Cybersecurity (10)
- Human-machine communication (5)
- Machine learning (5)
- Virtual reality (5)
- Classification (4)
-
- Deep Learning (4)
- China (3)
- Cyber (3)
- Deep learning (3)
- Information security (3)
- Information technology (3)
- Privacy (3)
- Virtual Reality (3)
- Algorithm (2)
- Artificial intelligence (2)
- Battleverse (2)
- CNN (2)
- Clustering (2)
- Computer and Control Systems Engineering (2)
- Cyber operations (2)
- Cyber war (2)
- Deepfake (2)
- Defense (2)
- Diffusion of innovations (2)
- GPS (2)
- Intellectual property (2)
- Internet (2)
- LSTM (2)
- Logistic Regression (2)
- Metaverse (2)
- Publication Year
- Publication
-
- Future Computing and Informatics Journal (13)
- Military Cyber Affairs (13)
- Human-Machine Communication (12)
- SMU Data Science Review (9)
- Frameless (5)
-
- Chemical Technology, Control and Management (4)
- Karbala International Journal of Modern Science (4)
- International Bulletin of Political Psychology (3)
- Journal of Cybersecurity Education, Research and Practice (3)
- Journal of Digital Forensics, Security and Law (3)
- Dickinson Law Review (2017-Present) (2)
- Elinvo (Electronics, Informatics, and Vocational Education) (2)
- Journal of Communication Pedagogy (2)
- Makara Journal of Technology (2)
- Mansoura Engineering Journal (2)
- ASEAN Journal on Science and Technology for Development (1)
- Al-Azhar Bulletin of Science (1)
- Al-Bahir Journal for Engineering and Pure Sciences (1)
- Arkansas Law Review (1)
- Bulletin of TUIT: Management and Communication Technologies (1)
- Communications of the IIMA (1)
- D.U.Quark (1)
- ELAIA (1)
- Future Engineering Journal (1)
- IP Theory (1)
- International Journal of Aviation, Aeronautics, and Aerospace (1)
- Journal of Applied Digital Evidence (1)
- Journal of Aviation Technology and Engineering (1)
- Journal of Aviation/Aerospace Education & Research (1)
- Journal of Engineering Research (1)
Articles 1 - 30 of 112
Full-Text Articles in Entire DC Network
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Military Cyber Affairs
Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Secured Blockchain And Fractional Discrete Cosine Transform-Based Framework For Medical Images, Abhay Kumar Yadav, Virendra P. Vishwakarma
Secured Blockchain And Fractional Discrete Cosine Transform-Based Framework For Medical Images, Abhay Kumar Yadav, Virendra P. Vishwakarma
Makara Journal of Technology
Images can store large amounts of data and are useful for transmitting large amounts of information across different geographical locations using different cloud services. This data sharing increases the chances of cyber-attacks on digital images. Blockchain has properties that enable it to work as a solution to this problem, providing enhanced security and unchangeable storage. However, image size poses a challenge in image storage, as it increases the related storage cost. Compressing images using fractional discrete cosine transform (fctDCT) reduces the amount of data required to express an image securely. This paper presents a novel framework for securely storing and …
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization
Human-Machine Communication
This is the complete volume of HMC Volume 7. Special Issue on Mediatization
Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony
Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony
Journal of Engineering Research
Aging significantly affects human health and the overall economy, yet understanding of the underlying molecular mechanisms remains limited. Among all human genes, almost three hundred and five have been linked to human aging. While certain subsets of these genes or specific aging-related genes have been extensively studied. There has been a lack of comprehensive examination encompassing the entire set of aging-related genes. Here, the main objective is to overcome understanding based on an innovative approach that combines the capabilities of deep learning. Particularly using One-Dimensional Deep AutoEncoder (1D-DAE). Followed by the K-means clustering technique as a means of unsupervised learning. …
Deepfake It Til You Make It: How To Make A Short Film, Adam G. Lee
Deepfake It Til You Make It: How To Make A Short Film, Adam G. Lee
ELAIA
A recent development in the realm of computer technology is the deepfake. Deepfakes, which train a computer model to digitally superimpose one person’s face onto another body in a separate video, has its uses for good and for ill, with the unfortunate tendency to the latter. The vast majority of deepfakes are used for pornography, most commonly depicting female celebrities as the subjects. At the less notable level, it is also often used for revenge pornography. These aspects of deepfake technology are rarely discussed in mainstream media, which tends to focus on the less harmful uses, such as those for …
Ai For Dummies, Jacob Mazurkiewicz
The Role Of Artificial Intelligence In Determining The Criminal Fingerprint, Saeed Al Matrooshi
The Role Of Artificial Intelligence In Determining The Criminal Fingerprint, Saeed Al Matrooshi
Journal of Police and Legal Sciences
The research aimed to identify the motives and justifications for the use of artificial intelligence in predicting crimes, to explain the challenges of artificial intelligence algorithms, the risks of bias and their ethical rules, and to highlight the role of artificial intelligence in identifying the criminal fingerprint during the detection of crimes. The research relied on the analytical approach, for the purpose of identifying the motives and justifications for the use of intelligence. Artificial intelligence in crime detection, explaining the challenges of artificial intelligence algorithms, their risks of bias, and ethical rules, and exploring how artificial intelligence technology can hopefully …
The Aim To Decentralize Economic Systems With Blockchains And Crypto, Mary Lacity
The Aim To Decentralize Economic Systems With Blockchains And Crypto, Mary Lacity
Arkansas Law Review
As an information systems (“IS”) professor, I wrote this Article for legal professionals new to blockchains and crypto. This target audience likely is most interested in crypto for its legal implications—depending on whether it functions as currencies, securities, commodities, or properties; however, legal professionals also need to understand crypto’s origin, how transactions work, and how they are governed.
Factors Affecting The Adoption Of Information Technology In Medium And Small Enterprises: A Case Study In Mekong Delta, Vietnam, Thy-Lieu Nguyen-Thi, Duy-Dong Le, Kieu-Chinh Nguyen-Ly, Trung-Tien Nguyen, Mohamed Saleem Haja Nazmudeen
Factors Affecting The Adoption Of Information Technology In Medium And Small Enterprises: A Case Study In Mekong Delta, Vietnam, Thy-Lieu Nguyen-Thi, Duy-Dong Le, Kieu-Chinh Nguyen-Ly, Trung-Tien Nguyen, Mohamed Saleem Haja Nazmudeen
ASEAN Journal on Science and Technology for Development
This research endeavors to discern the determinants influencing the adoption of information technology in the management practices of small and medium-sized enterprises (SMEs) situ-ated within the Mekong Delta region of Vietnam. Leveraging the Unified Theory of Ac-ceptance and Use of Technology (UTAUT), PLS-SEM, and ANN models, this study ranks the pivotal factors that impact the decision to integrate information technology into SME management. The identified factors, in order of significance, encompass (1) Support from State Agencies, (2) Managerial Qualifications, (3) Competitive Landscape, (4) Enterprise Scale, and (5) Employee Qualifications. The investigation encompasses 496 SMEs across the Mekong Delta and evaluates …
Dp-Smote: Integrating Differential Privacy And Oversampling Technique To Preserve Privacy In Smart Homes, Amr Tarek Elsayed, Almohammady Sobhi Alsharkawy, Mohamed Sayed Farag, Shaban Ebrahim Abu Yusuf
Dp-Smote: Integrating Differential Privacy And Oversampling Technique To Preserve Privacy In Smart Homes, Amr Tarek Elsayed, Almohammady Sobhi Alsharkawy, Mohamed Sayed Farag, Shaban Ebrahim Abu Yusuf
Al-Azhar Bulletin of Science
Smart homes represent intelligent environments where interconnected devices gather information, enhancing users’ living experiences by ensuring comfort, safety, and efficient energy management. To enhance the quality of life, companies in the smart device industry collect user data, including activities, preferences, and power consumption. However, sharing such data necessitates privacy-preserving practices. This paper introduces a robust method for secure sharing of data to service providers, grounded in differential privacy (DP). This empowers smart home residents to contribute usage statistics while safeguarding their privacy. The approach incorporates the Synthetic Minority Oversampling technique (SMOTe) and seamlessly integrates Gaussian noise to generate synthetic data, …
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Journal of Cybersecurity Education, Research and Practice
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Journal of Cybersecurity Education, Research and Practice
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif
An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif
Future Computing and Informatics Journal
This study aims to enhance Adaptive Learning Systems (ALS) in Petroleum Sector in Egypt by using the Microservice Architecture and measure the impact of enhancing ALS by participating ALS users through a statistical study and questionnaire directed to them if they accept to apply the Cloud Computing Service “Microservices” to enhance the ALS performance, quality and cost value or not. The study also aims to confirm that there is a statistically significant relationship between ALS and Cloud Computing Service “Microservices” and prove the impact of enhancing the ALS by using Microservices in the cloud in Adaptive Learning in the Egyptian …
Visual Question Answering: A Survey, Gehad Assem El-Naggar
Visual Question Answering: A Survey, Gehad Assem El-Naggar
Future Computing and Informatics Journal
Visual Question Answering (VQA) has been an emerging field in computer vision and natural language processing that aims to enable machines to understand the content of images and answer natural language questions about them. Recently, there has been increasing interest in integrating Semantic Web technologies into VQA systems to enhance their performance and scalability. In this context, knowledge graphs, which represent structured knowledge in the form of entities and their relationships, have shown great potential in providing rich semantic information for VQA. This paper provides an abstract overview of the state-of-the-art research on VQA using Semantic Web technologies, including knowledge …
Human-Machine Communication: Complete Volume. Volume 6
Human-Machine Communication: Complete Volume. Volume 6
Human-Machine Communication
This is the complete volume of HMC Volume 6.
Chatgpt, Lamda, And The Hype Around Communicative Ai: The Automation Of Communication As A Field Of Research In Media And Communication Studies, Andreas Hepp, Wiebke Loosen, Stephan Dreyer, Juliane Jarke, Sigrid Kannengießer, Christian Katzenbach, Rainer Malaka, Michaela Pfadenhauer, Cornelius Puschmann, Wolfgang Schulz
Chatgpt, Lamda, And The Hype Around Communicative Ai: The Automation Of Communication As A Field Of Research In Media And Communication Studies, Andreas Hepp, Wiebke Loosen, Stephan Dreyer, Juliane Jarke, Sigrid Kannengießer, Christian Katzenbach, Rainer Malaka, Michaela Pfadenhauer, Cornelius Puschmann, Wolfgang Schulz
Human-Machine Communication
The aim of this article is to more precisely define the field of research on the automation of communication, which is still only vaguely discernible. The central thesis argues that to be able to fully grasp the transformation of the media environment associated with the automation of communication, our view must be broadened from a preoccupation with direct interactions between humans and machines to societal communication. This more widely targeted question asks how the dynamics of societal communication change when communicative artificial intelligence—in short: communicative AI—is integrated into aspects of societal communication. To this end, we recommend an approach that …
Disentangling Two Fundamental Paradigms In Human-Machine Communication Research: Media Equation And Media Evocation, Margot J. Van Der Goot, Katrin Etzrodt
Disentangling Two Fundamental Paradigms In Human-Machine Communication Research: Media Equation And Media Evocation, Margot J. Van Der Goot, Katrin Etzrodt
Human-Machine Communication
In this theoretical paper, we delineate two fundamental paradigms in how scholars conceptualize the nature of machines in human-machine communication (HMC). In addition to the well-known Media Equation paradigm, we distinguish the Media Evocation paradigm. The Media Equation paradigm entails that people respond to machines as if they are humans, whereas the Media Evocation paradigm conceptualizes machines as objects that can evoke reflections about ontological categories. For each paradigm, we present the main propositions, research methodologies, and current challenges. We conclude with theoretical implications on how to integrate the two paradigms, and with a call for mixed-method research that includes …
Synthesis Of Control Systems With Multilayer Neural Networks Based On Velocity Gradient Methods, Oxunjon Boborayimov, Okyay Kaynak
Synthesis Of Control Systems With Multilayer Neural Networks Based On Velocity Gradient Methods, Oxunjon Boborayimov, Okyay Kaynak
Chemical Technology, Control and Management
In this manuscripts, the synthesis of control systems with multilayer neural networks based on the speed gradient methods is given. For adjusting the weight coefficients of the base processor element, the gradient method of minimizing the learning criterion is used. A procedure for the synthesis of neural network control systems based on the velocity gradient methods has been developed. This guarantees the stabilization of the system under external limited disturbances that are inaccessible to direct measurement. Taking into account the state vector of the control object in the network learning function ensures the consistency of the processes of setting the …
Investigation Of Information Security Incidents In The Enterprise, Fayzullajon Botirov
Investigation Of Information Security Incidents In The Enterprise, Fayzullajon Botirov
Chemical Technology, Control and Management
This article analyzes the concept of investigating information security incidents and the processes of responsibility for their commission, checking the place where the incident occurred, collecting and storing their data, as well as organizing the investigation of information security incidents at the enterprise.
A High-Speed Portable Ground Heat Exchanger Model For Use In Various Energy Simulation Software, Ryan Davies, Matt Mitchell, Edwin Lee
A High-Speed Portable Ground Heat Exchanger Model For Use In Various Energy Simulation Software, Ryan Davies, Matt Mitchell, Edwin Lee
Macalester Journal of Physics and Astronomy
A portable component model (PCM) of a ground source heat pump system was developed and used as a test case in the creating of a PCM development framework. By developing this framework, new building energy simulation models will be able to be easily integrated into existing simulation software such as EnergyPlus and the Modelica Buildings Library. Our model uses a time responsive g-function and numerical methods to simulate ground source heat pumps for single time steps as well as long time scales. We validated our model against GHESim and GLHEPro and found that our model agrees with these two standards …
Sentiment Analysis Of Text And Emoji Data For Twitter Network, Paramita Dey, Soumya Dey
Sentiment Analysis Of Text And Emoji Data For Twitter Network, Paramita Dey, Soumya Dey
Al-Bahir Journal for Engineering and Pure Sciences
Twitter is a social media platform where users can post, read, and interact with 'tweets'. Third party like corporate organization can take advantage of this huge information by collecting data about their customers' opinions. The use of emoticons on social media and the emotions expressed through them are the subjects of this research paper. The purpose of this paper is to present a model for analyzing emotional responses to real-life Twitter data. The proposed model is based on supervised machine learning algorithms and data on has been collected through crawler “TWEEPY” for empirical analysis. Collected data is pre-processed, pruned and …
A Study On Image Processing Techniques And Deep Learning Techniques For Insect Identification, Vinita Abhishek Gupta, M.V. Padmavati, Ravi R. Saxena, Pawan Kumar Patnaik, Raunak Kumar Tamrakar
A Study On Image Processing Techniques And Deep Learning Techniques For Insect Identification, Vinita Abhishek Gupta, M.V. Padmavati, Ravi R. Saxena, Pawan Kumar Patnaik, Raunak Kumar Tamrakar
Karbala International Journal of Modern Science
Automatic identification of insects and diseases has attracted researchers for the last few years. Researchers have suggested several algorithms to get around the problems of manually identifying insects and pests. Image processing techniques and deep convolution neural networks can overcome the challenges of manual insect identification and classification. This work focused on optimizing and assessing deep convolutional neural networks for insect identification. AlexNet, MobileNetv2, ResNet-50, ResNet-101, GoogleNet, InceptionV3, SqueezeNet, ShuffleNet, DenseNet201, VGG-16 and VGG-19 are the architectures evaluated on three different datasets. In our experiments, DenseNet 201 performed well with the highest test accuracy. Regarding training time, AlexNet performed well, …
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Military Cyber Affairs
Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …
Is Realt Reality? Investigating The Use Of Blockchain Technology And Tokenization In Real Estate Transactions, Caroline Moriarty
Is Realt Reality? Investigating The Use Of Blockchain Technology And Tokenization In Real Estate Transactions, Caroline Moriarty
Minnesota Journal of Law, Science & Technology
No abstract provided.