Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

An Injury Severity Prediction-Driven Accident Prevention System, Gulsum Alicioglu, Bo Sun, Shen-Shyang Ho May 2022

An Injury Severity Prediction-Driven Accident Prevention System, Gulsum Alicioglu, Bo Sun, Shen-Shyang Ho

Faculty Scholarship for the College of Science & Mathematics

Traffic accidents are inevitable events that occur unexpectedly and unintentionally. Therefore, analyzing traffic data is essential to prevent fatal accidents. Traffic data analysis provided insights into significant factors and driver behavioral patterns causing accidents. Combining these patterns and the prediction model into an accident prevention system can assist in reducing and preventing traffic accidents. This study applied various machine learning models, including neural network, ordinal regression, decision tree, support vector machines, and logistic regression to have a robust prediction model in injury severity. The trained model provides timely and accurate predictions on accident occurrence and injury severity using real-world traffic …


Malware Binary Image Classification Using Convolutional Neural Networks, John Kiger, Shen-Shyang Ho, Vahid Heydari Mar 2022

Malware Binary Image Classification Using Convolutional Neural Networks, John Kiger, Shen-Shyang Ho, Vahid Heydari

Faculty Scholarship for the College of Science & Mathematics

The persistent shortage of cybersecurity professionals combined with enterprise networks tasked with processing more data than ever before has led many cybersecurity experts to consider automating some of the most common and time-consuming security tasks using machine learning. One of these cybersecurity tasks where machine learning may prove advantageous is malware analysis and classification. To evade traditional detection techniques, malware developers are creating more complex malware. This is achieved through more advanced methods of code obfuscation and conducting more sophisticated attacks. This can make the manual process of analyzing malware an infinitely more complex task. Furthermore, the proliferation of malicious …


Technical Analysis Of Thanos Ransomware, Ikuromor Ogiriki, Christopher Beck, Vahid Heydari Mar 2022

Technical Analysis Of Thanos Ransomware, Ikuromor Ogiriki, Christopher Beck, Vahid Heydari

Faculty Scholarship for the College of Science & Mathematics

Ransomware is a developing menace that encrypts users’ files and holds the decryption key hostage until the victim pays a ransom. This particular class of malware has been in charge of extortion hundreds of millions of dollars every year. Adding to the problem, generating new variations is cheap. Therefore, new malware can detect antivirus and intrusion detection systems and evade them or manifest in ways to make themselves undetectable. We must first understand the characteristics and behavior of various varieties of ransomware to create and construct effective security mechanisms to combat them. This research presents a novel dynamic and behavioral …