Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Law (88)
- International Law (36)
- Science and Technology Law (20)
- Air and Space Law (19)
- Internet Law (16)
-
- Computer Law (13)
- Intellectual Property Law (13)
- Physical Sciences and Mathematics (11)
- Engineering (8)
- Data Science (7)
- Computer Sciences (6)
- Information Security (6)
- Business (5)
- Computer Engineering (5)
- Privacy Law (5)
- National Security Law (4)
- Risk Analysis (4)
- Comparative and Foreign Law (3)
- International Trade Law (3)
- Applied Statistics (2)
- Artificial Intelligence and Robotics (2)
- Commercial Law (2)
- Digital Communications and Networking (2)
- First Amendment (2)
- Medicine and Health Sciences (2)
- OS and Networks (2)
- Other Computer Engineering (2)
- Other Computer Sciences (2)
- Secured Transactions (2)
- Statistics and Probability (2)
- Keyword
-
- Deep Learning (3)
- Blockchain (2)
- Cyber security (2)
- Cybersecurity (2)
- Emotion (2)
-
- LSTM (2)
- ML (2)
- NLP (2)
- Neural Networks (2)
- Social media (2)
- ASL (1)
- AWS (1)
- Algorithm (1)
- Anomaly detection (1)
- Approximate inference (1)
- Autoencoder (1)
- BLSTM (1)
- Bayes (1)
- Bayesian (1)
- Bayesian Algorithms (1)
- Bayesian Neural Networks (1)
- Blacklist (1)
- CAPA (1)
- CNN (1)
- Chronicled (1)
- Clustering (1)
- Cryptographic hash (1)
- Cryptography (1)
- Cyber (1)
- Cyber Security (1)
- Publication Year
Articles 1 - 30 of 252
Full-Text Articles in Entire DC Network
Personalization: University Fundraising, Jasmine O'Neal, Akib Hossain, Yogesh Bhalerao
Personalization: University Fundraising, Jasmine O'Neal, Akib Hossain, Yogesh Bhalerao
SMU Data Science Review
University fundraising campaigns, which are typically a multi-year endeavor, help institutions build a strong financial foundation to enable a unique student experience. At the heart of effective fundraising is having strong relationships and partnerships with certain audiences that provide the best donation opportunities. Generally, alumni networks and the local community makeup these audiences as strong fundraising bases. Therefore, universities have a significant responsibility in developing these relationships to gain deeper insights into their constituents' needs and interests. This enables them to tailor effective engagement strategies, thereby increasing the likelihood of meeting donation expectations. This research explores how machine learning techniques …
National Security Law, Geoffrey M. Goodale, Jonathan Meyer, Mario Mancuso, Lucille Hague, Matthew O'Hare, Faith Dibble, Bonnie H. Weinstein, Sergio L. Suarez, Christopher A. Vallandingham, Guy C. Quinlin
National Security Law, Geoffrey M. Goodale, Jonathan Meyer, Mario Mancuso, Lucille Hague, Matthew O'Hare, Faith Dibble, Bonnie H. Weinstein, Sergio L. Suarez, Christopher A. Vallandingham, Guy C. Quinlin
The Year in Review
No abstract provided.
International Procurement, Eric P. Roberson
International Trade, Shelby M. Anderson, Theodore P. Brackemyre, Tessa V. Capeloto, Cynthia C. Galvez, Valerie Hughes, Gregory C. Maddaleni, Elizabeth S. Lee, Lydia C. Pardini, John Allen Riggins, Claire M. Webster
International Trade, Shelby M. Anderson, Theodore P. Brackemyre, Tessa V. Capeloto, Cynthia C. Galvez, Valerie Hughes, Gregory C. Maddaleni, Elizabeth S. Lee, Lydia C. Pardini, John Allen Riggins, Claire M. Webster
The Year in Review
No abstract provided.
Redefining “No Evidence Of A Breach” In Election Security, Yunsieg P. Kim
Redefining “No Evidence Of A Breach” In Election Security, Yunsieg P. Kim
SMU Law Review Forum
For legal purposes, we rightly understand the lack of evidence to mean a lack of existence. For example, many candidates in the 2022 elections baselessly claimed that the 2020 presidential election was stolen. But, absent evidence of systemic fraud, the law correctly determines that President Biden was duly elected. If the law entertained any outlandish assertion regardless of evidentiary support, accusers could peddle whatever claims they please, forcing the accused to disprove them. Similar to the legal understanding of “no evidence,” many appear to believe that no evidence of a security breach in our voting equipment indicates no breach. For …
Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater
Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater
SMU Data Science Review
Static and dynamic analyses are the two primary approaches to analyzing malicious applications. The primary distinction between the two is that the application is analyzed without execution in static analysis, whereas the dynamic approach executes the malware and records the behavior exhibited during execution. Although each approach has advantages and disadvantages, dynamic analysis has been more widely accepted and utilized by the research community whereas static analysis has not seen the same attention. This study aims to apply advancements in static analysis techniques to demonstrate the identification of fine-grained functionality, and show, through clustering, how malicious applications may be grouped …
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
SMU Data Science Review
Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …
Cryptocurrency’S Clash With Bankruptcy: Insolvent Crypto Exchange Companies Create Difficulties For Courts & Customers, Mary Taylor Stanberry
Cryptocurrency’S Clash With Bankruptcy: Insolvent Crypto Exchange Companies Create Difficulties For Courts & Customers, Mary Taylor Stanberry
SMU Science and Technology Law Review
This comment explores the novelty of cryptocurrency, its legal ambiguity in the realms of securities, property, and tax law, and the difficulties arising from insolvent crypto-exchange company’s estates within the context of the United States Bankruptcy Code. For the purposes of this comment, individuals who invested in crypto-exchange platforms will be referred to as “customers” rather than “investors” to avoid potential confusion in the context of 11 U.S.C. § 507 of the Bankruptcy Code. Customers who invested with insolvent crypto-exchange companies are concerned about being last in line for repayment of their investments based on traditional bankruptcy creditor priority. These …
Employee Monitoring: As Technology Advances Yet The Electronic Communications Privacy Act Stays In The Past, Isabela Possino
Employee Monitoring: As Technology Advances Yet The Electronic Communications Privacy Act Stays In The Past, Isabela Possino
SMU Science and Technology Law Review
Since the Electronic Communications Privacy Act of 1986 was enacted, the United States has endured an evolution of technology. While progressive at its inception, the ECPA has since been met with a tumultuous response from scholars, courts, and others trying to understand its purpose and application regarding privacy rights and the monitoring of communications. Specifically, since the COVID-19 pandemic, the ECPA has remained at the forefront of debate with respect to employee monitoring and surveillance practices. This article provides an overview of the ECPA and explains why today’s technological advancements have surpassed the protections afforded by the Act, leaving employees …
Preventing Intimate Image Abuse Via Privacy-Preserving Credentials, Janet Zhang, Steven M. Bellovin
Preventing Intimate Image Abuse Via Privacy-Preserving Credentials, Janet Zhang, Steven M. Bellovin
SMU Science and Technology Law Review
The problem of non-consensual pornography (“NCP”), sometimes known as intimate image abuse or revenge porn, is well known. Despite its distribution being illegal in most states, it remains a serious problem, if only because it is often difficult to prove who uploaded the pictures. Furthermore, the Federal statute commonly known as Section 230 generally protects Internet sites, such as PornHub, from liability for content created by their users; only the users are liable, not the sites.
One obvious countermeasure would be to require Internet sites to strongly authenticate their users, but this is not an easy problem to solve. Furthermore, …
Commentary For The Journal Of Air Law And Commerce On The Article By Andrew Lee Entitled The Future Of The Law On The Moon, Stephan Hobe
Commentary For The Journal Of Air Law And Commerce On The Article By Andrew Lee Entitled The Future Of The Law On The Moon, Stephan Hobe
Journal of Air Law and Commerce
No abstract provided.
Commentary: Lunar Court Operational And Constitutional Considerations, Megan Sieffert
Commentary: Lunar Court Operational And Constitutional Considerations, Megan Sieffert
Journal of Air Law and Commerce
No abstract provided.
Phishing Detection Using Natural Language Processing And Machine Learning, Apurv Mittal, Dr Daniel Engels, Harsha Kommanapalli, Ravi Sivaraman, Taifur Chowdhury
Phishing Detection Using Natural Language Processing And Machine Learning, Apurv Mittal, Dr Daniel Engels, Harsha Kommanapalli, Ravi Sivaraman, Taifur Chowdhury
SMU Data Science Review
Phishing emails are a primary mode of entry for attackers into an organization. A successful phishing attempt leads to unauthorized access to sensitive information and systems. However, automatically identifying phishing emails is often difficult since many phishing emails have composite features such as body text and metadata that are nearly indistinguishable from valid emails. This paper presents a novel machine learning-based framework, the DARTH framework, that characterizes and combines multiple models, with one model for each composite feature, that enables the accurate identification of phishing emails. The framework analyses each composite feature independently utilizing a multi-faceted approach using Natural Language …
Middle East, Rebecca Lee Katz, Adam Al-Sarraf, Mustafa Ali, Hannah Jung, Farrah Qazi, Myriam Khedair, Seyed Mohsen Rowhani, Benjamin Leventhal, Omar Nimri, Ibrahim Sattout, Dania Dib, Fouad Debs, Howard Stovall, Farooq Bsharat, Salah Shawa
Middle East, Rebecca Lee Katz, Adam Al-Sarraf, Mustafa Ali, Hannah Jung, Farrah Qazi, Myriam Khedair, Seyed Mohsen Rowhani, Benjamin Leventhal, Omar Nimri, Ibrahim Sattout, Dania Dib, Fouad Debs, Howard Stovall, Farooq Bsharat, Salah Shawa
The Year in Review
No abstract provided.
Central/East Asia & China, Athena Jiangxiao Hou, Michael Dewey, Qing Lyu, Steven Shengxing Yu, Jingbing Li, Yanling Zheng, Ray Cheng Xu, Ying (Jenny) Lu, Asen Velinov
Central/East Asia & China, Athena Jiangxiao Hou, Michael Dewey, Qing Lyu, Steven Shengxing Yu, Jingbing Li, Yanling Zheng, Ray Cheng Xu, Ying (Jenny) Lu, Asen Velinov
The Year in Review
No abstract provided.
National Security Law, Geoffrey M. Goodale, Lucille Hague, Matthew O'Hare, Jonathan M. Meyer, Mario Mancuso, Guy C. Quinlan, Sergio L. Suarez, Loren Voss
National Security Law, Geoffrey M. Goodale, Lucille Hague, Matthew O'Hare, Jonathan M. Meyer, Mario Mancuso, Guy C. Quinlan, Sergio L. Suarez, Loren Voss
The Year in Review
No abstract provided.
Women's Interest Network, Dana Katz, Hannah Alderks, Marie Elena Angulo, Melodie Arian, Michela Cocchi, Lauren Gabuzzi, Angela M. Gallerizzo, Kristina Holm, Julianne Jaquith, Dawn Yamane Hewett, Hannah Jung, Myriam Khedair, Christine Korper, Molly O'Casey, Susan Polizzotto, Karen Sherman, Sandhya Taneja, Leanne R. E. Torres
Women's Interest Network, Dana Katz, Hannah Alderks, Marie Elena Angulo, Melodie Arian, Michela Cocchi, Lauren Gabuzzi, Angela M. Gallerizzo, Kristina Holm, Julianne Jaquith, Dawn Yamane Hewett, Hannah Jung, Myriam Khedair, Christine Korper, Molly O'Casey, Susan Polizzotto, Karen Sherman, Sandhya Taneja, Leanne R. E. Torres
The Year in Review
No abstract provided.
Aerospace And Defense Industries, Johny Chaklader, Michael Bealy, Neal Petro, Danish Hamid
Aerospace And Defense Industries, Johny Chaklader, Michael Bealy, Neal Petro, Danish Hamid
The Year in Review
No abstract provided.
International Trade, Jonathan Babcock, Chloe Baldwin, Theodore P. Brackemyre, Sylvia Y. Chen, Laura .. El-Sabaawi, Cynthia C. Galvez, Geoffrey Goodale, Derick G. Holt, Elizabeth S. Lee, Usha Neelakantan, Molly O'Casey, Brittney Powell, Zachary Simmons
International Trade, Jonathan Babcock, Chloe Baldwin, Theodore P. Brackemyre, Sylvia Y. Chen, Laura .. El-Sabaawi, Cynthia C. Galvez, Geoffrey Goodale, Derick G. Holt, Elizabeth S. Lee, Usha Neelakantan, Molly O'Casey, Brittney Powell, Zachary Simmons
The Year in Review
No abstract provided.
Export Controls And Economic Sanctions, Beau Barnes, John Boscariol, Randy Cook, Abigail Cotterill, Gwendolyn Jaramillo, Barbara Linney, Sarah Oliai, Timothy O'Toole, Christopher Stagg, Lawrence Ward
Export Controls And Economic Sanctions, Beau Barnes, John Boscariol, Randy Cook, Abigail Cotterill, Gwendolyn Jaramillo, Barbara Linney, Sarah Oliai, Timothy O'Toole, Christopher Stagg, Lawrence Ward
The Year in Review
No abstract provided.
Web Page Multiclass Classification, Brian Gaither, Antonio Debouse, Catherine Huang
Web Page Multiclass Classification, Brian Gaither, Antonio Debouse, Catherine Huang
SMU Data Science Review
As the internet age evolves, the volume of content hosted on the Web is rapidly expanding. With this ever-expanding content, the capability to accurately categorize web pages is a current challenge to serve many use cases. This paper proposes a variation in the approach to text preprocessing pipeline whereby noun phrase extraction is performed first followed by lemmatization, contraction expansion, removing special characters, removing extra white space, lower casing, and removal of stop words. The first step of noun phrase extraction is aimed at reducing the set of terms to those that best describe what the web pages are about …
Mexico, John F. Walsh, Rommy Flores, Sonia Fleury, Carlos A. Bello, Noé Pascacio, Arciria Ireri Oreta Amador, Susan Burns, Diego Alejandro López Martinez, Eduardo Sánchez Madrigal, Yurixhi Gallardo Martinez
Mexico, John F. Walsh, Rommy Flores, Sonia Fleury, Carlos A. Bello, Noé Pascacio, Arciria Ireri Oreta Amador, Susan Burns, Diego Alejandro López Martinez, Eduardo Sánchez Madrigal, Yurixhi Gallardo Martinez
The Year in Review
No abstract provided.
European Law, James Henry Bergeron, Matthew Soper, John Richards, Adam Obadia, Molly O'Casey, Aaron S Schildhaus, Demetrios Eleftherlou, Bradley Varley, Valeria Camboni Miller, Angélique Devaux, Richard Silberstein
European Law, James Henry Bergeron, Matthew Soper, John Richards, Adam Obadia, Molly O'Casey, Aaron S Schildhaus, Demetrios Eleftherlou, Bradley Varley, Valeria Camboni Miller, Angélique Devaux, Richard Silberstein
The Year in Review
No abstract provided.
United Nations And International Organizations, Renee Dopplick, Richard L. Field, Joseph Bongiorno, Pooja Mehta, Roncevert D. Almond, Melodic Arian, Dana R. Bucy Miller, Charlotte Rickets
United Nations And International Organizations, Renee Dopplick, Richard L. Field, Joseph Bongiorno, Pooja Mehta, Roncevert D. Almond, Melodic Arian, Dana R. Bucy Miller, Charlotte Rickets
The Year in Review
No abstract provided.
National Security Law, Beau D. Barnes, Geoffrey M. Goodale, Todd E. Mcdowell, Jonathan M. Meyer, John Mohyi, Joseph D. Prestia, Guy C. Quinlan, Christopher Stagg, Christopher Vallandingham
National Security Law, Beau D. Barnes, Geoffrey M. Goodale, Todd E. Mcdowell, Jonathan M. Meyer, John Mohyi, Joseph D. Prestia, Guy C. Quinlan, Christopher Stagg, Christopher Vallandingham
The Year in Review
No abstract provided.
International Anti-Money Laundering, Harry Dixon, Nicole S. Healy, Karen Van Essen, Alexander S. Birkhold, Francesca Lulgjuraj, Paige Mason, Jung Pak, Christina Robertson
International Anti-Money Laundering, Harry Dixon, Nicole S. Healy, Karen Van Essen, Alexander S. Birkhold, Francesca Lulgjuraj, Paige Mason, Jung Pak, Christina Robertson
The Year in Review
No abstract provided.
Women's Interest Network, Renee Dopplick, Delissa A. Ridgway, Linda Strite Murnane, Patricia Lopez Aufranc, Olufunmi Oluyede, Lisette Lavergne
Women's Interest Network, Renee Dopplick, Delissa A. Ridgway, Linda Strite Murnane, Patricia Lopez Aufranc, Olufunmi Oluyede, Lisette Lavergne
The Year in Review
No abstract provided.
International Transportation Law, Andrew M. Danas, Feifan Drouyor, Jason W. Drouyor, Jane Hong, Jessica B. Horwitz
International Transportation Law, Andrew M. Danas, Feifan Drouyor, Jason W. Drouyor, Jane Hong, Jessica B. Horwitz
The Year in Review
No abstract provided.
International Financial Products And Services, Alan Rabkin, Catalin-Sergiu Dinu, Mohamed Hashish, Sabin Volciuc-Ionescu, Walter Stuber
International Financial Products And Services, Alan Rabkin, Catalin-Sergiu Dinu, Mohamed Hashish, Sabin Volciuc-Ionescu, Walter Stuber
The Year in Review
No abstract provided.
Export Controls And Economic Sanctions, John Boscariol, J. Patrick Briscoe, Abigail Cotterill, Harry Dixon, Geoffrey Goodale, Sarah Oliai, Timothy O'Toole, Christopher Stagg, Lawrence Ward
Export Controls And Economic Sanctions, John Boscariol, J. Patrick Briscoe, Abigail Cotterill, Harry Dixon, Geoffrey Goodale, Sarah Oliai, Timothy O'Toole, Christopher Stagg, Lawrence Ward
The Year in Review
No abstract provided.