Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Southern Methodist University

Journal

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 252

Full-Text Articles in Entire DC Network

Personalization: University Fundraising, Jasmine O'Neal, Akib Hossain, Yogesh Bhalerao May 2024

Personalization: University Fundraising, Jasmine O'Neal, Akib Hossain, Yogesh Bhalerao

SMU Data Science Review

University fundraising campaigns, which are typically a multi-year endeavor, help institutions build a strong financial foundation to enable a unique student experience. At the heart of effective fundraising is having strong relationships and partnerships with certain audiences that provide the best donation opportunities. Generally, alumni networks and the local community makeup these audiences as strong fundraising bases. Therefore, universities have a significant responsibility in developing these relationships to gain deeper insights into their constituents' needs and interests. This enables them to tailor effective engagement strategies, thereby increasing the likelihood of meeting donation expectations. This research explores how machine learning techniques …


National Security Law, Geoffrey M. Goodale, Jonathan Meyer, Mario Mancuso, Lucille Hague, Matthew O'Hare, Faith Dibble, Bonnie H. Weinstein, Sergio L. Suarez, Christopher A. Vallandingham, Guy C. Quinlin Mar 2024

National Security Law, Geoffrey M. Goodale, Jonathan Meyer, Mario Mancuso, Lucille Hague, Matthew O'Hare, Faith Dibble, Bonnie H. Weinstein, Sergio L. Suarez, Christopher A. Vallandingham, Guy C. Quinlin

The Year in Review

No abstract provided.


International Procurement, Eric P. Roberson Mar 2024

International Procurement, Eric P. Roberson

The Year in Review

No abstract provided.


International Trade, Shelby M. Anderson, Theodore P. Brackemyre, Tessa V. Capeloto, Cynthia C. Galvez, Valerie Hughes, Gregory C. Maddaleni, Elizabeth S. Lee, Lydia C. Pardini, John Allen Riggins, Claire M. Webster Mar 2024

International Trade, Shelby M. Anderson, Theodore P. Brackemyre, Tessa V. Capeloto, Cynthia C. Galvez, Valerie Hughes, Gregory C. Maddaleni, Elizabeth S. Lee, Lydia C. Pardini, John Allen Riggins, Claire M. Webster

The Year in Review

No abstract provided.


Redefining “No Evidence Of A Breach” In Election Security, Yunsieg P. Kim Oct 2023

Redefining “No Evidence Of A Breach” In Election Security, Yunsieg P. Kim

SMU Law Review Forum

For legal purposes, we rightly understand the lack of evidence to mean a lack of existence. For example, many candidates in the 2022 elections baselessly claimed that the 2020 presidential election was stolen. But, absent evidence of systemic fraud, the law correctly determines that President Biden was duly elected. If the law entertained any outlandish assertion regardless of evidentiary support, accusers could peddle whatever claims they please, forcing the accused to disprove them. Similar to the legal understanding of “no evidence,” many appear to believe that no evidence of a security breach in our voting equipment indicates no breach. For …


Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater Aug 2023

Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater

SMU Data Science Review

Static and dynamic analyses are the two primary approaches to analyzing malicious applications. The primary distinction between the two is that the application is analyzed without execution in static analysis, whereas the dynamic approach executes the malware and records the behavior exhibited during execution. Although each approach has advantages and disadvantages, dynamic analysis has been more widely accepted and utilized by the research community whereas static analysis has not seen the same attention. This study aims to apply advancements in static analysis techniques to demonstrate the identification of fine-grained functionality, and show, through clustering, how malicious applications may be grouped …


Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn Mar 2023

Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn

SMU Data Science Review

Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …


Cryptocurrency’S Clash With Bankruptcy: Insolvent Crypto Exchange Companies Create Difficulties For Courts & Customers, Mary Taylor Stanberry Jan 2023

Cryptocurrency’S Clash With Bankruptcy: Insolvent Crypto Exchange Companies Create Difficulties For Courts & Customers, Mary Taylor Stanberry

SMU Science and Technology Law Review

This comment explores the novelty of cryptocurrency, its legal ambiguity in the realms of securities, property, and tax law, and the difficulties arising from insolvent crypto-exchange company’s estates within the context of the United States Bankruptcy Code. For the purposes of this comment, individuals who invested in crypto-exchange platforms will be referred to as “customers” rather than “investors” to avoid potential confusion in the context of 11 U.S.C. § 507 of the Bankruptcy Code. Customers who invested with insolvent crypto-exchange companies are concerned about being last in line for repayment of their investments based on traditional bankruptcy creditor priority. These …


Employee Monitoring: As Technology Advances Yet The Electronic Communications Privacy Act Stays In The Past, Isabela Possino Jan 2023

Employee Monitoring: As Technology Advances Yet The Electronic Communications Privacy Act Stays In The Past, Isabela Possino

SMU Science and Technology Law Review

Since the Electronic Communications Privacy Act of 1986 was enacted, the United States has endured an evolution of technology. While progressive at its inception, the ECPA has since been met with a tumultuous response from scholars, courts, and others trying to understand its purpose and application regarding privacy rights and the monitoring of communications. Specifically, since the COVID-19 pandemic, the ECPA has remained at the forefront of debate with respect to employee monitoring and surveillance practices. This article provides an overview of the ECPA and explains why today’s technological advancements have surpassed the protections afforded by the Act, leaving employees …


Preventing Intimate Image Abuse Via Privacy-Preserving Credentials, Janet Zhang, Steven M. Bellovin Jan 2023

Preventing Intimate Image Abuse Via Privacy-Preserving Credentials, Janet Zhang, Steven M. Bellovin

SMU Science and Technology Law Review

The problem of non-consensual pornography (“NCP”), sometimes known as intimate image abuse or revenge porn, is well known. Despite its distribution being illegal in most states, it remains a serious problem, if only because it is often difficult to prove who uploaded the pictures. Furthermore, the Federal statute commonly known as Section 230 generally protects Internet sites, such as PornHub, from liability for content created by their users; only the users are liable, not the sites.

One obvious countermeasure would be to require Internet sites to strongly authenticate their users, but this is not an easy problem to solve. Furthermore, …


Commentary For The Journal Of Air Law And Commerce On The Article By Andrew Lee Entitled The Future Of The Law On The Moon, Stephan Hobe Jan 2023

Commentary For The Journal Of Air Law And Commerce On The Article By Andrew Lee Entitled The Future Of The Law On The Moon, Stephan Hobe

Journal of Air Law and Commerce

No abstract provided.


Commentary: Lunar Court Operational And Constitutional Considerations, Megan Sieffert Jan 2023

Commentary: Lunar Court Operational And Constitutional Considerations, Megan Sieffert

Journal of Air Law and Commerce

No abstract provided.


Phishing Detection Using Natural Language Processing And Machine Learning, Apurv Mittal, Dr Daniel Engels, Harsha Kommanapalli, Ravi Sivaraman, Taifur Chowdhury Sep 2022

Phishing Detection Using Natural Language Processing And Machine Learning, Apurv Mittal, Dr Daniel Engels, Harsha Kommanapalli, Ravi Sivaraman, Taifur Chowdhury

SMU Data Science Review

Phishing emails are a primary mode of entry for attackers into an organization. A successful phishing attempt leads to unauthorized access to sensitive information and systems. However, automatically identifying phishing emails is often difficult since many phishing emails have composite features such as body text and metadata that are nearly indistinguishable from valid emails. This paper presents a novel machine learning-based framework, the DARTH framework, that characterizes and combines multiple models, with one model for each composite feature, that enables the accurate identification of phishing emails. The framework analyses each composite feature independently utilizing a multi-faceted approach using Natural Language …


Middle East, Rebecca Lee Katz, Adam Al-Sarraf, Mustafa Ali, Hannah Jung, Farrah Qazi, Myriam Khedair, Seyed Mohsen Rowhani, Benjamin Leventhal, Omar Nimri, Ibrahim Sattout, Dania Dib, Fouad Debs, Howard Stovall, Farooq Bsharat, Salah Shawa Aug 2022

Middle East, Rebecca Lee Katz, Adam Al-Sarraf, Mustafa Ali, Hannah Jung, Farrah Qazi, Myriam Khedair, Seyed Mohsen Rowhani, Benjamin Leventhal, Omar Nimri, Ibrahim Sattout, Dania Dib, Fouad Debs, Howard Stovall, Farooq Bsharat, Salah Shawa

The Year in Review

No abstract provided.


Central/East Asia & China, Athena Jiangxiao Hou, Michael Dewey, Qing Lyu, Steven Shengxing Yu, Jingbing Li, Yanling Zheng, Ray Cheng Xu, Ying (Jenny) Lu, Asen Velinov Aug 2022

Central/East Asia & China, Athena Jiangxiao Hou, Michael Dewey, Qing Lyu, Steven Shengxing Yu, Jingbing Li, Yanling Zheng, Ray Cheng Xu, Ying (Jenny) Lu, Asen Velinov

The Year in Review

No abstract provided.


National Security Law, Geoffrey M. Goodale, Lucille Hague, Matthew O'Hare, Jonathan M. Meyer, Mario Mancuso, Guy C. Quinlan, Sergio L. Suarez, Loren Voss Aug 2022

National Security Law, Geoffrey M. Goodale, Lucille Hague, Matthew O'Hare, Jonathan M. Meyer, Mario Mancuso, Guy C. Quinlan, Sergio L. Suarez, Loren Voss

The Year in Review

No abstract provided.


Women's Interest Network, Dana Katz, Hannah Alderks, Marie Elena Angulo, Melodie Arian, Michela Cocchi, Lauren Gabuzzi, Angela M. Gallerizzo, Kristina Holm, Julianne Jaquith, Dawn Yamane Hewett, Hannah Jung, Myriam Khedair, Christine Korper, Molly O'Casey, Susan Polizzotto, Karen Sherman, Sandhya Taneja, Leanne R. E. Torres Aug 2022

Women's Interest Network, Dana Katz, Hannah Alderks, Marie Elena Angulo, Melodie Arian, Michela Cocchi, Lauren Gabuzzi, Angela M. Gallerizzo, Kristina Holm, Julianne Jaquith, Dawn Yamane Hewett, Hannah Jung, Myriam Khedair, Christine Korper, Molly O'Casey, Susan Polizzotto, Karen Sherman, Sandhya Taneja, Leanne R. E. Torres

The Year in Review

No abstract provided.


Aerospace And Defense Industries, Johny Chaklader, Michael Bealy, Neal Petro, Danish Hamid Aug 2022

Aerospace And Defense Industries, Johny Chaklader, Michael Bealy, Neal Petro, Danish Hamid

The Year in Review

No abstract provided.


International Trade, Jonathan Babcock, Chloe Baldwin, Theodore P. Brackemyre, Sylvia Y. Chen, Laura .. El-Sabaawi, Cynthia C. Galvez, Geoffrey Goodale, Derick G. Holt, Elizabeth S. Lee, Usha Neelakantan, Molly O'Casey, Brittney Powell, Zachary Simmons Aug 2022

International Trade, Jonathan Babcock, Chloe Baldwin, Theodore P. Brackemyre, Sylvia Y. Chen, Laura .. El-Sabaawi, Cynthia C. Galvez, Geoffrey Goodale, Derick G. Holt, Elizabeth S. Lee, Usha Neelakantan, Molly O'Casey, Brittney Powell, Zachary Simmons

The Year in Review

No abstract provided.


Export Controls And Economic Sanctions, Beau Barnes, John Boscariol, Randy Cook, Abigail Cotterill, Gwendolyn Jaramillo, Barbara Linney, Sarah Oliai, Timothy O'Toole, Christopher Stagg, Lawrence Ward Aug 2022

Export Controls And Economic Sanctions, Beau Barnes, John Boscariol, Randy Cook, Abigail Cotterill, Gwendolyn Jaramillo, Barbara Linney, Sarah Oliai, Timothy O'Toole, Christopher Stagg, Lawrence Ward

The Year in Review

No abstract provided.


Web Page Multiclass Classification, Brian Gaither, Antonio Debouse, Catherine Huang Jun 2022

Web Page Multiclass Classification, Brian Gaither, Antonio Debouse, Catherine Huang

SMU Data Science Review

As the internet age evolves, the volume of content hosted on the Web is rapidly expanding. With this ever-expanding content, the capability to accurately categorize web pages is a current challenge to serve many use cases. This paper proposes a variation in the approach to text preprocessing pipeline whereby noun phrase extraction is performed first followed by lemmatization, contraction expansion, removing special characters, removing extra white space, lower casing, and removal of stop words. The first step of noun phrase extraction is aimed at reducing the set of terms to those that best describe what the web pages are about …


Mexico, John F. Walsh, Rommy Flores, Sonia Fleury, Carlos A. Bello, Noé Pascacio, Arciria Ireri Oreta Amador, Susan Burns, Diego Alejandro López Martinez, Eduardo Sánchez Madrigal, Yurixhi Gallardo Martinez May 2022

Mexico, John F. Walsh, Rommy Flores, Sonia Fleury, Carlos A. Bello, Noé Pascacio, Arciria Ireri Oreta Amador, Susan Burns, Diego Alejandro López Martinez, Eduardo Sánchez Madrigal, Yurixhi Gallardo Martinez

The Year in Review

No abstract provided.


European Law, James Henry Bergeron, Matthew Soper, John Richards, Adam Obadia, Molly O'Casey, Aaron S Schildhaus, Demetrios Eleftherlou, Bradley Varley, Valeria Camboni Miller, Angélique Devaux, Richard Silberstein May 2022

European Law, James Henry Bergeron, Matthew Soper, John Richards, Adam Obadia, Molly O'Casey, Aaron S Schildhaus, Demetrios Eleftherlou, Bradley Varley, Valeria Camboni Miller, Angélique Devaux, Richard Silberstein

The Year in Review

No abstract provided.


United Nations And International Organizations, Renee Dopplick, Richard L. Field, Joseph Bongiorno, Pooja Mehta, Roncevert D. Almond, Melodic Arian, Dana R. Bucy Miller, Charlotte Rickets May 2022

United Nations And International Organizations, Renee Dopplick, Richard L. Field, Joseph Bongiorno, Pooja Mehta, Roncevert D. Almond, Melodic Arian, Dana R. Bucy Miller, Charlotte Rickets

The Year in Review

No abstract provided.


National Security Law, Beau D. Barnes, Geoffrey M. Goodale, Todd E. Mcdowell, Jonathan M. Meyer, John Mohyi, Joseph D. Prestia, Guy C. Quinlan, Christopher Stagg, Christopher Vallandingham May 2022

National Security Law, Beau D. Barnes, Geoffrey M. Goodale, Todd E. Mcdowell, Jonathan M. Meyer, John Mohyi, Joseph D. Prestia, Guy C. Quinlan, Christopher Stagg, Christopher Vallandingham

The Year in Review

No abstract provided.


International Anti-Money Laundering, Harry Dixon, Nicole S. Healy, Karen Van Essen, Alexander S. Birkhold, Francesca Lulgjuraj, Paige Mason, Jung Pak, Christina Robertson May 2022

International Anti-Money Laundering, Harry Dixon, Nicole S. Healy, Karen Van Essen, Alexander S. Birkhold, Francesca Lulgjuraj, Paige Mason, Jung Pak, Christina Robertson

The Year in Review

No abstract provided.


Women's Interest Network, Renee Dopplick, Delissa A. Ridgway, Linda Strite Murnane, Patricia Lopez Aufranc, Olufunmi Oluyede, Lisette Lavergne May 2022

Women's Interest Network, Renee Dopplick, Delissa A. Ridgway, Linda Strite Murnane, Patricia Lopez Aufranc, Olufunmi Oluyede, Lisette Lavergne

The Year in Review

No abstract provided.


International Transportation Law, Andrew M. Danas, Feifan Drouyor, Jason W. Drouyor, Jane Hong, Jessica B. Horwitz May 2022

International Transportation Law, Andrew M. Danas, Feifan Drouyor, Jason W. Drouyor, Jane Hong, Jessica B. Horwitz

The Year in Review

No abstract provided.


International Financial Products And Services, Alan Rabkin, Catalin-Sergiu Dinu, Mohamed Hashish, Sabin Volciuc-Ionescu, Walter Stuber May 2022

International Financial Products And Services, Alan Rabkin, Catalin-Sergiu Dinu, Mohamed Hashish, Sabin Volciuc-Ionescu, Walter Stuber

The Year in Review

No abstract provided.


Export Controls And Economic Sanctions, John Boscariol, J. Patrick Briscoe, Abigail Cotterill, Harry Dixon, Geoffrey Goodale, Sarah Oliai, Timothy O'Toole, Christopher Stagg, Lawrence Ward May 2022

Export Controls And Economic Sanctions, John Boscariol, J. Patrick Briscoe, Abigail Cotterill, Harry Dixon, Geoffrey Goodale, Sarah Oliai, Timothy O'Toole, Christopher Stagg, Lawrence Ward

The Year in Review

No abstract provided.