Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 325

Full-Text Articles in Entire DC Network

Publication And Evaluation Challenges In Games & Interactive Media, Elizabeth L. Lawley Aug 2019

Publication And Evaluation Challenges In Games & Interactive Media, Elizabeth L. Lawley

Presentations and other scholarship

Faculty in the fields of games and interactive media face significant challenges in publishing and documenting their scholarly work for evaluation in the tenure and promotion process. These challenges include selecting appropriate publication venues and assigning authorship for works spanning multiple disciplines; archiving and accurately citing collaborative digital projects; and redefining “peer review,” impact, and dissemination in the context of creative digital works. In this paper I describe many of these challenges, and suggest several potential solutions.


Up To Code: Systematically Evaluating And Standardizing Legacy Repository Content, Frances Chang Andreu Jun 2018

Up To Code: Systematically Evaluating And Standardizing Legacy Repository Content, Frances Chang Andreu

Presentations and other scholarship

Rochester Institute of Technology implemented its first Open Access repository in 2002. An early effort to quickly populate and legitimize the repository, coupled with staff turnover, led to a collection of materials that was inconsistent, accompanied by insufficient metadata, and of dubious copyright status. While the system itself was re-evaluated and migrated to a new platform in 2012, much of the original content was batch imported without further inspection. In 2017, we underwent a systematic audit of all 2,500+ faculty works (student theses and dissertations were excluded from this project) to check for copyright compliance, as well as adherence to …


Control Limits Versus Acceptance Limits - Which Limits Are Appropriate For Your Task?, Donald Holmes, A. Erhan Mergen Mar 2012

Control Limits Versus Acceptance Limits - Which Limits Are Appropriate For Your Task?, Donald Holmes, A. Erhan Mergen

Presentations and other scholarship

The objective of this paper is to discuss and clarify the meaning and use the different statistical limits used in managing processes so the mistakes that are commonly seen in industrial practice can be avoided. The difference between "control" and "acceptance" will also be discuss. The idea of this paper was triggered by a recent paper written by Henderson [5] in Quality Progress journal.


Nat Denial Of Service: An Analysis Of Translation Table Behavior On Multiple Platforms, Nathan Winemiller, Bruce Hartpence, Daryl Johnson, Sumita Mishra Jan 2012

Nat Denial Of Service: An Analysis Of Translation Table Behavior On Multiple Platforms, Nathan Winemiller, Bruce Hartpence, Daryl Johnson, Sumita Mishra

Presentations and other scholarship

Network Address Translation or NAT, is a technology that is used to translate internal addresses to globally routable addresses on the internet. NAT continues to be used extensively in almost every network due to the current lack of IPv4 addresses. Despite being exceptionally commonplace, this networking technique is not without its weaknesses, and can be disabled with a fairly straightforward attack. By overpopulating the translation table, the primary mechanism used to translate the internal to external addresses, an attacker can effectively deny all internal users access to the external network. This paper takes an in-depth look at how five different …


A Behavior Based Covert Channel Within Anti-Virus Updates, D. Anthony, D. Johnson, P. Lutz, B. Yuan Jan 2012

A Behavior Based Covert Channel Within Anti-Virus Updates, D. Anthony, D. Johnson, P. Lutz, B. Yuan

Presentations and other scholarship

This paper presents a new behavior based covert channel utilizing the database update mechanism of anti-virus software. It is highly covert due to unattended, frequent, automatic signature database update operations performed by the software. The design of the covert channel is described; its properties are discussed and demonstrated by a reference implementation. This paper uses these points to strengthen the inclusion of behavior-based covert channels within standard covert channel taxonomy.


Webpage Source Based Covert Channel, Tarun Madiraju, Daryl Johnson, Bo Yuan, Peter Lutz Jan 2012

Webpage Source Based Covert Channel, Tarun Madiraju, Daryl Johnson, Bo Yuan, Peter Lutz

Presentations and other scholarship

Covert Channels can be used for enabling hidden communication mechanisms that can facilitate secret message transfer. This paper presents a new covert channel based on the HTML source of a webpage. The new covert channel while featuring high bandwidth also demonstrates high imperceptibility as it doesn’t involve any modifications to the source or the visibility of the webpage and is independent of timing of page requests. The availability of page source for a webpage on the Internet makes this covert channel easy to implement and effective.


Upnp Port Manipulation As A Covert Channel, Steven Monette, Daryl Johnson, Peter Lutz, Bo Yuan Jan 2012

Upnp Port Manipulation As A Covert Channel, Steven Monette, Daryl Johnson, Peter Lutz, Bo Yuan

Presentations and other scholarship

Port knocking traditionally has been a technique used from external connections to convey information to or request services from an internal private network [1]. UPnP as a standard allows for devices and services to open ports on network devices in order to enable functionality [2]. By combining these two techniques it is possible to port knock internally, opening ports for an intended viewer on an external network device. This paper proposes a covert channel using this technique to exfiltrate data or broadcast messages from a system behind a UPnP device to any Internet connected system.


A Physical Channel In A Digital World, Michael Deffenbaugh, Daryl Johnson, Bo Yuan, Peter Lutz Jan 2012

A Physical Channel In A Digital World, Michael Deffenbaugh, Daryl Johnson, Bo Yuan, Peter Lutz

Presentations and other scholarship

No abstract provided.


An Analysis Of Ethical Attitudes Of Family Business Owners In A Transitional Economy: The Case Of Kosovo, Robert Barbato, Robert Lussier, Matthew Sonfield Sep 2011

An Analysis Of Ethical Attitudes Of Family Business Owners In A Transitional Economy: The Case Of Kosovo, Robert Barbato, Robert Lussier, Matthew Sonfield

Presentations and other scholarship

A transitional economy provides an opportunity to examine the ethical attitudes of small businesses and family owned businesses. In this paper a survey of family businesses in Kosovo finds that family businesses do have different ethical attitudes than non-family businesses, although the differences are slight. Conflict among family members is associated with slightly improved ethical attitudes.


The Assembly And Provisioning Of A Red Team, Daryl Johnson Jan 2011

The Assembly And Provisioning Of A Red Team, Daryl Johnson

Presentations and other scholarship

As the value and merit of red team exercises in both academic and corporate settings continues to grow, the need to share experiences with staffing, organizing and supporting the red team becomes increasingly important. This paper documents the Northeast Collegiate Cyber Defense Competition’s (NECCDC) Red Team captain’s experiences and lessons learned over the past four years. The paper will begin by identifying the skills and attributes needed for a Red Team and a process for selecting and recruiting members. The methods employed to form a cohesive working group from the members in the time available prior to the event will …


Browser Web Storage Vulnerability Investigation: Html5 Localstorage Object, Daryl Johnson Jan 2011

Browser Web Storage Vulnerability Investigation: Html5 Localstorage Object, Daryl Johnson

Presentations and other scholarship

With the introduction of HTML5, the latest browser language, a new data storage technique, called localStorage, has been added to allow websites to store larger amounts of data for a long period of time on the user’s local system. This new technology does not (as of this writing) have a fully implemented independent interface to support end user control. Unlike cookies, there is not yet an interface for the user to block, alter or delete localStorage in web browsers. Nefarious users have files of data they utilize in their illegal activities that they need to preserve (stolen user information, credit …


Proceedings Of The 2011 Powertrain Systems And Design Student Conference, Andrew Baglio, Caroline Bills, Jefferey Bird, Charles O'Neill, Matthew Borton Jan 2011

Proceedings Of The 2011 Powertrain Systems And Design Student Conference, Andrew Baglio, Caroline Bills, Jefferey Bird, Charles O'Neill, Matthew Borton

Presentations and other scholarship

No abstract provided.


A Covert Channel In Rtp Protocol, Chrisopher Forbes, Bo Yuan, Daryl Johnson, Peter Lutz Aug 2010

A Covert Channel In Rtp Protocol, Chrisopher Forbes, Bo Yuan, Daryl Johnson, Peter Lutz

Presentations and other scholarship

A new covert channel over the RTP protocol is designed and implemented by modifying the timestamp value in the RTP header. Due to the high frequency of RTP packets, the covert channel has a high bit-rate, theoretically up to 350 bps. The broad use of RTP for multimedia applications such as VoIP, provides abundant opportunities to such a covert channel to exist. By using the RTP header, many of the challenges present for covert channels using the RTP payload are avoided. A reference implementation of this covert channel is presented. Bit-rates of up to 325 bps were observed. The channel …


Building An Acceptance Chart Around The Process Mean, Donals Holmes, A. Erhan Mergen Mar 2010

Building An Acceptance Chart Around The Process Mean, Donals Holmes, A. Erhan Mergen

Presentations and other scholarship

In this paper we will propose a new way of building an acceptance chart which could be utilized in Six Sigma environment. The proposed method is to build the acceptance chart around the desired value for the process mean rather than around the specification limits. An example is included to illustrate the proposed method.


A Re-Examination Of Network Address Translation Security, Daryl Johnson, Bruce Hartpence Jan 2010

A Re-Examination Of Network Address Translation Security, Daryl Johnson, Bruce Hartpence

Presentations and other scholarship

The use of Network Address Translation (NAT) has greatly expanded in recent years. While originally an address management technique it has often been used for security. However, there are many implementations of NAT that are inherently insecure. Recently investigation into some of these has shown increased potential for security holes in NAT deployments. An understanding of the risks associated with NAT and the basic networking topics supporting a research in this area are critical to an information assurance student. This paper describes the basic operation of NAT, outlines one such security problem and its’ mitigation, develops a testing methodology for …


Icmp Covert Channel Resiliency, Kristian Stokes, Bo Yuan, Daryl Johnson, Peter Lutz Jan 2010

Icmp Covert Channel Resiliency, Kristian Stokes, Bo Yuan, Daryl Johnson, Peter Lutz

Presentations and other scholarship

The ICMP protocol has been widely used and accepted as a covert channel. While the ICMP protocol is very simple to use, modern security approaches such as firewalls, deep-packet inspection and intrusion detection systems threaten the use of ICMP for a reliable means for a covert channel. This study explores the modern usefulness of ICMP with typical security measures in place. Existing ICMP covert channel solutions are examined for compliance with standard RFCs and resiliency with modern security approaches.


Small Business Institute National Proceedings, Robert Lussier, Matthew Sonfield, Robert Barbato Jan 2010

Small Business Institute National Proceedings, Robert Lussier, Matthew Sonfield, Robert Barbato

Presentations and other scholarship

No abstract provided.


Collaborative Innovation Program: A Creative Conspiracy For Cross-College Collaboration At The Rochester Institute Of Technology, Xanthe Matychak, Jonathan Schull Jan 2010

Collaborative Innovation Program: A Creative Conspiracy For Cross-College Collaboration At The Rochester Institute Of Technology, Xanthe Matychak, Jonathan Schull

Presentations and other scholarship

The 2007 inaugural address of RIT’s ninth president, William Destler, highlighted the breadth and diversity of curricular offerings at RIT from business, engineering, and computing to design, fine art, and craft. In his address, Dr. Destler included this challenge: “What if RIT students [in addition to their discipline-specific courses] had the experience of working on complex societal problems with students from different majors on teams in...a cross-disciplinary effort to find real solutions?” The authors of this paper took that challenge to heart. In the 2008- 2009 academic year, we wrote and taught a collaboration curriculum that was hosted by the …


Covert Channels In The Http Network Protocol: Channel Characterization And Detecting Man-In-The-Middle Attacks, Daryl Johnson, Bo Yuan, Peter Lutz, Erik Brown Jan 2010

Covert Channels In The Http Network Protocol: Channel Characterization And Detecting Man-In-The-Middle Attacks, Daryl Johnson, Bo Yuan, Peter Lutz, Erik Brown

Presentations and other scholarship

Network covert channels provide two entities the ability to communicate stealthily. Hypertext Transfer Protocol (HTTP), which accounts for approximately half of all traffic on the Internet (Burke, 2007), has become the fertile ground for various network covert channels. Proliferation of network covert channels throughout the World Wide Web and other areas of cyberspace has raised new security concerns and brought both challenges and enhancements to the area of Information Warfare. Covert channels impact our ability to observe and orient in this domain and need to be better understood. They are however, extremely difficult to study as a whole. Network covert …


Business Ethics: How To Develop Ethical Awareness And Introspection In Our Students, Kathleen Szczepanek Nov 2009

Business Ethics: How To Develop Ethical Awareness And Introspection In Our Students, Kathleen Szczepanek

Presentations and other scholarship

I developed a business ethics course addressing the need to provide a foundation in business ethics for Business Studies students at the National Technical Institute for the Deaf (NTID). The purpose of the course was to ensure that our students develop an awareness for appropriate practices and behaviors as they enter a place of work. The design of the course was based on current literature connected to the best business practices that are based on ethical values and behaviors.


Behavior-Based Covert Channel In Cyberspace, Daryl Johnson, Bo Yuan, Peter Lutz Nov 2009

Behavior-Based Covert Channel In Cyberspace, Daryl Johnson, Bo Yuan, Peter Lutz

Presentations and other scholarship

Many covert channels take advantages of weaknesses, flaws, or unused data fields in network protocols. In this paper, a behavior-based covert channel, that takes advantages of behavior of an application, is presented along with a formal definition in the framework of finite state machines. The behavior-based covert channel is application specific and lies at the application layer of the network OSI model, which makes the detection of this type of covert channel much more difficult. A detailed sample implementation demonstrates an example of this type of covert channel in the form of a simple online two-person game. The potential of …


Efficient Derivation Of Sparse Representations In Radial Basis Function Regression, Ernest Fokoué Aug 2009

Efficient Derivation Of Sparse Representations In Radial Basis Function Regression, Ernest Fokoué

Presentations and other scholarship

No abstract provided.


Electronics In Our Daily Life Today And Packaging Trends Influencing The Future, S. Manian Ramkumar Apr 2009

Electronics In Our Daily Life Today And Packaging Trends Influencing The Future, S. Manian Ramkumar

Presentations and other scholarship

No abstract provided.


The Road We’Ve Traveled: 12 Years Of Undergraduate Software Engineering At The Rochester Institute Of Technology, J. Fernando Naveda, Thomas Reichlmayr, Michael Lutz, James Vallino, Stephanie Ludi Apr 2009

The Road We’Ve Traveled: 12 Years Of Undergraduate Software Engineering At The Rochester Institute Of Technology, J. Fernando Naveda, Thomas Reichlmayr, Michael Lutz, James Vallino, Stephanie Ludi

Presentations and other scholarship

In 1996, the Rochester Institute of Technology launched the first undergraduate software engineering program in North America. This paper briefly reviews the development of the program, and describes the program’s evolution up to the present. We illuminate both the constant aspects of the program – what we believe we got right – as well as the changes made in light of pedagogical, technological and disciplinary advances. We conclude by considering the current and future challenges for undergraduate software engineering education both at RIT and elsewhere.


Creating The Future Of Publishing At Rit: Products (And Lessons) From A Cross-Disciplinary Undergraduate Research Center, Matt Bernius, Rachael Gootnick, Abdul Matsah, Michael Riordan Feb 2009

Creating The Future Of Publishing At Rit: Products (And Lessons) From A Cross-Disciplinary Undergraduate Research Center, Matt Bernius, Rachael Gootnick, Abdul Matsah, Michael Riordan

Presentations and other scholarship

No abstract provided.


Merger Of Massive Black Holes Using N-Body Simulations With Post-Newtonian Corrections, Miguel Preto, Ingo Berentzen, Peter Berczik, David Merritt, Rainer Spurzem Jan 2009

Merger Of Massive Black Holes Using N-Body Simulations With Post-Newtonian Corrections, Miguel Preto, Ingo Berentzen, Peter Berczik, David Merritt, Rainer Spurzem

Presentations and other scholarship

We present preliminary results from self-consistent, high resolution direct N-body simulations of massive black hole binaries in mergers of galactic nuclei. The dynamics of the black hole binary includes the full Post-Newtonian corrections (up to 2.5PN) to its equations of motion. We show that massive black holes starting at separations of 100 pc can evolve down to gravitational-wave-induced coalescence in less than a Hubble time. The binaries, in our models, often form with very high eccentricity and, as a result, reach separations of 50 Schwarzschild radius with eccentricities which are clearly distinct from zero — even though gravitational wave emission …


Section 404 Audit Costs For Small Companies: The Benefit Of Waiting, Mithu Dey, Mary Sullivan Jan 2009

Section 404 Audit Costs For Small Companies: The Benefit Of Waiting, Mithu Dey, Mary Sullivan

Presentations and other scholarship

Starting in December 2009, small companies classified as non-accelerated filers must obtain an internal control audit to comply with Section 404 of the Sarbanes-Oxley Act. This study estimates the cost of the internal control audit for new accelerated filers in 2006 and 2007 and assesses whether the new internal control auditing standard, Auditing Standard No. 5, has reduced Section 404-related audit costs. The study finds that the median cost of the internal control audit as a percentage of total audit fees is 42% for new accelerated filers in 2006 and 37% in 2007. This suggests that Section 404-related audit costs …


Teaching And Learning Innovation And Invention, Jonathan Schull, Xanthe Matychak, Jacob Noel-Storr Jan 2009

Teaching And Learning Innovation And Invention, Jonathan Schull, Xanthe Matychak, Jacob Noel-Storr

Presentations and other scholarship

Each quarter at Rochester Institute of Technology (RIT), our course on innovation and invention gathers undergraduate and graduate students from as many disciplines as possible and attempts to do something none of us (including the instructors) knows how to do. Our methodology, modeled after business startups more than traditional academic courses, produces interesting inventions and remarkable learning experiences. We will report on the first four offerings of this course at RIT, and speculate on why it works as well as it does. Class begins by presenting students with a stimulating but vague challenge that can engage all the participants (e.g., …


Comparison Of Post-Newtonian And Numerical Evolutions Of Black-Hole Binaries, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, Yosef Zlochower Nov 2008

Comparison Of Post-Newtonian And Numerical Evolutions Of Black-Hole Binaries, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, Yosef Zlochower

Presentations and other scholarship

In this paper, we compare the waveforms from the post-Newtonian (PN) approach with the numerical simulations of generic black-hole binaries which have mass ratio q 0.8, arbitrarily oriented spins with magnitudes S1/m2 1 0.6 and S2/m2 2 0.4, and orbit 9 times from an initial orbital separation of r 11M prior to merger. We observe a reasonably good agreement between the PN and numerical waveforms, with an overlap of over 98% for the first six cycles of the (ℓ = 2,m = ±2) mode and over 90% for the (ℓ = 2,m = 1) and (ℓ = 3,m = 3) …


Testing Gravitational-Wave Searches With Numerical Relativity Waveforms: Results From The First Numerical Injection Analysis (Ninja) Project, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, Yosef Zlochower Nov 2008

Testing Gravitational-Wave Searches With Numerical Relativity Waveforms: Results From The First Numerical Injection Analysis (Ninja) Project, Hiroyuki Nakano, Manuela Campanelli, Carlos Lousto, Yosef Zlochower

Presentations and other scholarship

The Numerical INJection Analysis (NINJA) project is a collaborative effort between members of the numerical relativity and gravitational-wave data analysis communities. The purpose of NINJA is to study the sensitivity of existing gravitational-wave search algorithms using numerically generated waveforms and to foster closer collaboration between the numerical relativity and data analysis communities. We describe the results of the first NINJA analysis which focused on gravitational waveforms from binary black hole coalescence. Ten numerical relativity groups contributed numerical data which were used to generate a set of gravitational-wave signals. These signals were injected into a simulated data set, designed to mimic …