Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Android malware (2)
- Code obfuscation (2)
- Code transformation (2)
- Cybersecurity (2)
- Dynamic code loading (2)
-
- Evasion techniques (2)
- Mobile security (2)
- Reflection (2)
- AI (1)
- Access control (1)
- Area control error (1)
- Automatic grading (1)
- Autonomous landing. Aerial vehicles (1)
- Computing education (1)
- Concept map (1)
- Control theory (1)
- Cybersecurity education (1)
- Disabilities (1)
- Downstream uses (1)
- Drone technology (1)
- Dynamic environments (1)
- Education (1)
- Ethics (1)
- Intelligent RBAC (1)
- Java (1)
- LSTM (1)
- Learning Methods (1)
- Load frequency control (1)
- Machine learning (1)
- Multi-agent system (1)
Articles 1 - 10 of 10
Full-Text Articles in Engineering
When Ai Moves Downstream, Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf
When Ai Moves Downstream, Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf
School of Computer Science & Engineering Faculty Publications
After computing professionals design, develop, and deploy software, what is their responsibility for subsequent uses of that software “downstream” by others? Furthermore, does it matter ethically if the software in question is considered to be artificial intelligent (AI)? The authors have previously developed a model to explore downstream accountability, called the Software Responsibility Attribution System (SRAS). In this paper, we explore three recent publications relevant to downstream accountability, and focus particularly on examples of AI software. Based on our understanding of the three papers, we suggest refinements of SRAS.
A Survey And Evaluation Of Android-Based Malware Evasion Techniques And Detection Frameworks, Parvez Faruki, Rhati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun, Rajendra Pamula
A Survey And Evaluation Of Android-Based Malware Evasion Techniques And Detection Frameworks, Parvez Faruki, Rhati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun, Rajendra Pamula
School of Computer Science & Engineering Faculty Publications
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing innovative techniques to avoid or prolong malware detection effectively. Past studies have shown that malware detection systems are susceptible to evasion attacks where adversaries can successfully bypass the existing security defenses and deliver the malware to the target system without being detected. The evolution of escape-resistant systems is an open research problem. This paper presents a detailed taxonomy and evaluation of Android-based malware evasion …
A Survey And Evaluation Of Android-Based Malware Evasion Techniques And Detection Frameworks, Parvez Faruki, Rhati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun, Rajendra Pamula
A Survey And Evaluation Of Android-Based Malware Evasion Techniques And Detection Frameworks, Parvez Faruki, Rhati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun, Rajendra Pamula
School of Computer Science & Engineering Faculty Publications
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing innovative techniques to avoid or prolong malware detection effectively. Past studies have shown that malware detection systems are susceptible to evasion attacks where adversaries can successfully bypass the existing security defenses and deliver the malware to the target system without being detected. The evolution of escape-resistant systems is an open research problem. This paper presents a detailed taxonomy and evaluation of Android-based malware evasion …
Discovering Ways To Increase Inclusivity For Dyslexic Students In Computing Education, Felicia Hellems, Sajal Bhatia
Discovering Ways To Increase Inclusivity For Dyslexic Students In Computing Education, Felicia Hellems, Sajal Bhatia
School of Computer Science & Engineering Faculty Publications
The years accompanying entrance into the university system are often characterized by a period of great transformation. These years can also be wrought with difficulties for many students, difficulties which are often compounded in students with disabilities (SWD). Reports from the U.S. Department of Education show that as recently as 2015--16, 19% of undergraduate students experienced some form of disability1. Additionally, statistics show that SWD tend to have lower post secondary completion rates than their counterparts [3]. A review of pertinent literature has shown that there still exist gaps within the field of computing education (CE) for teaching cybersecurity concepts …
Removing The Veil: Shining Light On The Lack Of Inclusivity In Cybersecurity Education For Students With Disabilities, Felicia Hellems, Sajal Bhatia
Removing The Veil: Shining Light On The Lack Of Inclusivity In Cybersecurity Education For Students With Disabilities, Felicia Hellems, Sajal Bhatia
School of Computer Science & Engineering Faculty Publications
There are currently over one billion people living with some form of disability worldwide. The continuous increase in new technologies in today's society comes with an increased risk in security. A fundamental knowledge of cybersecurity should be a basic right available to all users of technology. A review of literature in the fields of cybersecurity, STEM, and computer science (CS) has revealed existent gaps regarding educational methods for teaching cybersecurity to students with disabilities (SWD's). To date, SWD's are largely left without equitable access to cybersecurity education. Our goal is to identify current educational methods being used to teach SWD's …
Agent-Based Semantic Role Mining For Intelligent Access Control In Multi-Domain Collaborative Applications Of Smart Cities, Rubina Ghazal, Ahmad Kamran Malik, Basit Raza, Nauman Qadeer, Nafees Qamar, Sajal Bhatia
Agent-Based Semantic Role Mining For Intelligent Access Control In Multi-Domain Collaborative Applications Of Smart Cities, Rubina Ghazal, Ahmad Kamran Malik, Basit Raza, Nauman Qadeer, Nafees Qamar, Sajal Bhatia
School of Computer Science & Engineering Faculty Publications
Significance and popularity of Role-Based Access Control (RBAC) is inevitable; however, its application is highly challenging in multi-domain collaborative smart city environments. The reason is its limitations in adapting the dynamically changing information of users, tasks, access policies and resources in such applications. It also does not incorporate semantically meaningful business roles, which could have a diverse impact upon access decisions in such multi-domain collaborative business environments. We propose an Intelligent Role-based Access Control (I-RBAC) model that uses intelligent software agents for achieving intelligent access control in such highly dynamic multi-domain environments. The novelty of this model lies in using …
Autonomous Aerial Vehicle Vision And Sensor Guided Landing, Gabriel Bitencourt, Elijah J. Brown, Cedric Bleimling, Gilbert Lai, Arman Molki, Tolga Kaya
Autonomous Aerial Vehicle Vision And Sensor Guided Landing, Gabriel Bitencourt, Elijah J. Brown, Cedric Bleimling, Gilbert Lai, Arman Molki, Tolga Kaya
School of Computer Science & Engineering Faculty Publications
The use of autonomous landing of aerial vehicles is increasing in demand. Applications of this ability can range from simple drone delivery to unmanned military missions. To be able to land at a spot identified by local information, such as a visual marker, creates an efficient and versatile solution. This allows for a more user/consumer friendly device overall. To achieve this goal the use of computer vision and an array of ranging sensors will be explored. In our approach we utilized an April Tag as our location identifier and point of reference. MATLAB/Simulink interface was used to develop the platform …
Cybersecurity Analysis Of Load Frequency Control In Power Systems: A Survey, Sahaj Saxena, Sajal Bhatia, Rahul Gupta
Cybersecurity Analysis Of Load Frequency Control In Power Systems: A Survey, Sahaj Saxena, Sajal Bhatia, Rahul Gupta
School of Computer Science & Engineering Faculty Publications
Today, power systems have transformed considerably and taken a new shape of geographically distributed systems from the locally centralized systems thereby leading to a new infrastructure in the framework of networked control cyber-physical system (CPS). Among the different important operations to be performed for smooth generation, transmission, and distribution of power, maintaining the scheduled frequency, against any perturbations, is an important one. The load frequency control (LFC) operation actually governs this frequency regulation activity after the primary control. Due to CPS nature, the LFC operation is vulnerable to attacks, both from physical and cyber standpoints. The cyber-attack strategies ranges from …
Automated Waterloo Rubric For Concept Map Grading, Shresht Bhatia, Sajal Bhatia, Irfan Ahmed
Automated Waterloo Rubric For Concept Map Grading, Shresht Bhatia, Sajal Bhatia, Irfan Ahmed
School of Computer Science & Engineering Faculty Publications
Concept mapping is a well-known pedagogical tool to help students organize, represent, and develop an understanding of a topic. The grading of concept maps is typically manual, time-consuming, and tedious, especially for a large class. Existing research mostly focuses on topological scoring based-on structural features of concept maps. However, the scoring does not achieve comparable accuracy to well-defined rubrics for manual analysis on the quality of content in a concept map. This paper presents Kastor, a new method to automate the Waterloo Rubric of scoring concept maps by quantifying the rubric’s quality assessment parameters. The evaluation is performed on a …
B. A Java Dialectic, Douglas Lyon, Frances Grodzinsky
B. A Java Dialectic, Douglas Lyon, Frances Grodzinsky
School of Computer Science & Engineering Faculty Publications
Many books often gush over Java. People want to know, before they learn a language, what the drawbacks are for a language. They want to know what the strenghs are. After all, a computer language is just a tool. We shape our tools, and there after, our tools shape us! This chapter contains a dialog between three Java instructors. The participants are, Professors Good, Bad and Ugly. Professor Good is a strong proponent of Java. Professor Bad is a strong opponent of Java. Professor Ugly has been leaning toward the asthetic analysis of the language, particularly with an eye toward …