Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University for Business and Technology in Kosovo (38)
- Institute of Business Administration (24)
- Old Dominion University (17)
- Kennesaw State University (15)
- Kansas State University Libraries (12)
-
- University of Georgia School of Law (10)
- University of Nevada, Las Vegas (10)
- Embry-Riddle Aeronautical University (6)
- Murray State University (6)
- Purdue University (4)
- DePaul University (3)
- Western University (3)
- Clemson University (2)
- University of Nebraska at Omaha (2)
- Arcadia University (1)
- Cedarville University (1)
- James Madison University (1)
- Johnson County Community College (1)
- Minnesota State University, Mankato (1)
- Olivet Nazarene University (1)
- Southern Illinois University Carbondale (1)
- University of Nebraska at Kearney (1)
- Vocational Training Council (1)
- Wayne State University (1)
- Yale University (1)
- Keyword
-
- Bandwidth (3)
- Web portals (3)
- Wireless sensor networks (3)
- Algorithm (2)
- Authentication (2)
-
- Big Data (2)
- Collaboration (2)
- Computer architecture (2)
- Computer networks (2)
- Computer security (2)
- Cryptography (2)
- Database (2)
- Decoding (2)
- Delay (2)
- Digital preservation (2)
- Digitization (2)
- Environmental sciences – Computer network resources (2)
- GSM (2)
- Information Security (2)
- Information security (2)
- Information technology (2)
- Internet of Things (2)
- Java (2)
- Protocols (2)
- Routing protocols (2)
- Social networks (2)
- Wireless LAN (2)
- (q (1)
- 3D models (1)
- 3D printing (1)
- Publication Year
- Publication
-
- UBT International Conference (38)
- International Conference on Information and Communication Technologies (24)
- Cybersecurity Undergraduate Research Showcase (17)
- Central Plains Network for Digital Asset Management (12)
- Symposium of Student Scholars (11)
-
- Continuing Legal Education Presentations (10)
- 2010 Annual Nevada NSF EPSCoR Climate Change Conference (8)
- Posters-at-the-Capitol (6)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (4)
- 2017 Academic High Altitude Conference (3)
- African Conference on Information Systems and Technology (3)
- Annual ADFSL Conference on Digital Forensics, Security and Law (3)
- Undergraduate Student Research Internships Conference (3)
- College of Engineering: Graduate Celebration Programs (2)
- Workshop on Data for AI in Network Systems (2)
- ASA Multidisciplinary Research Symposium (1)
- Capstone Showcase (1)
- Computer Science Graduate Research Workshop (1)
- Human Factors and Applied Psychology Student Conference (1)
- KSU Proceedings on Cybersecurity Education, Research and Practice (1)
- Mountain Plains Business Conference (1)
- National Training Aircraft Symposium (NTAS) (1)
- Practical Social and Industrial Research Symposium (1)
- SIDLIT Conference (1)
- Scholar Week 2016 - present (1)
- Scholars Cooperative Brown Bag Series (1)
- Showcase of Graduate Student Scholarship and Creative Activities (1)
- The Research and Scholarship Symposium (2013-2019) (1)
- UNO Student Research and Creative Activity Fair (1)
- Undergraduate Research Symposium (1)
- File Type
Articles 1 - 30 of 163
Full-Text Articles in Engineering
Effects Of A Wi-Fi Link On The Performance Of A Path Following Autonomous Ground Vehicle, Anthony Iwejuo, Austin Cagle, Billy Kihei, Ph.D.
Effects Of A Wi-Fi Link On The Performance Of A Path Following Autonomous Ground Vehicle, Anthony Iwejuo, Austin Cagle, Billy Kihei, Ph.D.
Symposium of Student Scholars
As vehicles become more automated and connected, the future of safe and efficient travel will be dependent on efficient wireless networks. Artificial intelligence (AI) demands high power resources and computing resources that can be resource-intensive for mobile robotic systems. A new paradigm involving the remote computing of A.I. can enable robotics that are built lighter and more power efficient. In this study, we compare a locally run artificial intelligence algorithm for autonomous ground vehicle navigation against remote computation through various wireless links to highlight the need for low-latency access to remote computing resources over Wi-Fi network calls. Our findings show …
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Posters-at-the-Capitol
Title: Securing Edge Computing: A Hierarchical IoT Service Framework
Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.
Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University
Abstract:
Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.
Our secure by design approach prioritizes …
Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, My Doan, Anh Tran, Na Le
Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, My Doan, Anh Tran, Na Le
Posters-at-the-Capitol
Abstract
Purpose: The purpose of the study is to better understand the role and impact of video research podcasts in bridging the gap between academia and the general public, especially concerning the challenges of accessibility and comprehension of scholarly research.
Methods: A 10-question survey was administered to evaluate the effectiveness, utility, and acceptance of video recordings in research presentations. The survey also aimed to gather insights into the motivations, challenges, and benefits of using video podcasts for research dissemination. Results were then analyzed using the Unified Theory of Acceptance and Use of Technology (UTAUT) model.
Results: There were 102 respondents …
Data For Ai In Network Systems Workshop Report, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Data For Ai In Network Systems Workshop Report, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Workshop on Data for AI in Network Systems
No abstract provided.
Workshop On Data For Ai In Network Systems - Event Summary, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Workshop On Data For Ai In Network Systems - Event Summary, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Workshop on Data for AI in Network Systems
No abstract provided.
Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild
Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild
Symposium of Student Scholars
The research project aims to find ways to detect malicious packets inside encrypted network traffic. In addition to this goal maintaining user privacy is a priority. As encryption has become less expensive to implement more and more network traffic is encrypted. Currently, 90% of all network traffic is encrypted, and this trend is expected to increase. The creators of malware areemploying various methods to ensure delivery of their malware, including encryption. One proposed method to combat this suggests implementing machine learning with various algorithms to analyze packet attributes to determine if they contain malware, without actually knowing what's inside …
Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers
Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers
Cybersecurity Undergraduate Research Showcase
This research paper answers the question, “What is Ransomware, and How to prevent it?”. This paper will discuss what ransomware is, its history about ransomware, how ransomware attacks Windows systems, how to prevent ransomware, how to handle ransomware once it is already on the network, ideas for training professionals to avoid ransomware, and how anti-virus helps defend against ransomware. Many different articles, case studies, and professional blogs will be used to complete the research on this topic.
Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng
Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng
Cybersecurity Undergraduate Research Showcase
Cybersecurity is very crucial in the digital age in order to safeguard the availability, confidentiality, and integrity of data and systems. Mitigation techniques used in the industry include Multi-factor Authentication (MFA), Incident Response Planning (IRP), Security Information and Event Management (SIEM), and Signature-based and Heuristic Detection.
MFA is employed as an additional layer of protection in several sectors to help prevent unauthorized access to sensitive data. IRP is a plan in place to address cybersecurity problems efficiently and expeditiously. SIEM offers real-time analysis and alerts the system of threats and vulnerabilities. Heuristic-based detection relies on detecting anomalies when it comes …
The Rise And Risks Of Internet Of Things, Diamond E. Hicks
The Rise And Risks Of Internet Of Things, Diamond E. Hicks
Cybersecurity Undergraduate Research Showcase
Internet of Things (IoT) has become a necessary part of our everyday lives. IoT is the network in which many different devices communicate, connect, and share data. Though how IoT got to where it is today, the issues it faced, and how it affects our lives today is not common knowledge. Despite the fact that IoT has advanced our technology to what it is today, people do not completely understand what it does.
Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden
Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden
National Training Aircraft Symposium (NTAS)
An increased availability of data and computing power has allowed organizations to apply machine learning techniques to various fleet monitoring activities. Additionally, our ability to acquire aircraft data has increased due to the miniaturization of small form factor computing machines. Aircraft data collection processes contain many data features in the form of multivariate time-series (continuous, discrete, categorical, etc.) which can be used to train machine learning models. Yet, three major challenges still face many flight organizations 1) integration and automation of data collection frameworks, 2) data cleanup and preparation, and 3) embedded machine learning framework. Data cleanup and preparation has …
Disaster Area Lora Mesh Communications, Joel Bulkley
Disaster Area Lora Mesh Communications, Joel Bulkley
Posters-at-the-Capitol
In the aftermath of the December 2021 tornado disaster that swept through Western Kentucky causing 57 fatalities, 500+ critical injuries, and millions of dollars’ worth in damages, one of the first things that became apparent was the lack of communications and underlying power infrastructure. The goal of this project is to create a highly resilient LoRa mesh communications network utilizing low power, low cost, and easy to deploy radios to enable first responders in a disaster area to communicate their location and send critical information in a situation where traditional communications infrastructure has been destroyed or is otherwise unavailable. Through …
Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes
Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes
Capstone Showcase
Our program collects vehicle data using an OBD-II device called Carloop that is plugged into the vehicle's diagnostic port. The device executes our code which then communicates with the vehicle's onboard computer to collect data such as engine RPM, vehicle speed, fuel level, and other diagnostic information. This data is then sent over WiFi to Particle’s Cloud, which is a platform for managing IoT devices.
Integrations set up on Particle take care of sending data to our InfluxDB Database, which is hosted on our own cloud-based machine. InfluxDB is a high-performance time-series database that is optimized for storing and querying …
A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan
A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan
Cybersecurity Undergraduate Research Showcase
Since the 1980’s and creation of the World Wide Web, Internet utilization is a common and arguably, necessary, part of daily life. The internet is young and still relatively new, but as of 2016, 3.4 billion people were online, and that number has since grown [1]. This is a significant number, but as such a common part of daily life, how elements of the internet or its infrastructure work is complex. The world would very likely be thrown into dark ages if DNS or any other significant aspect of the internet's infrastructure were to succumb to an attack. The Colonial …
Rural Broadband Usage: Analyzing Satisfaction And Internet Speed Within The Rural Digital Divide, Angela Hollman, Tim Obermier, Jesse Andrews
Rural Broadband Usage: Analyzing Satisfaction And Internet Speed Within The Rural Digital Divide, Angela Hollman, Tim Obermier, Jesse Andrews
Mountain Plains Business Conference
No abstract provided.
Introduction To Pub/Sub Systems Using Opcua, Mete Isiksalan
Introduction To Pub/Sub Systems Using Opcua, Mete Isiksalan
Undergraduate Student Research Internships Conference
The purpose of the project was to learn and implement the fundamental basics of OPCUA system architecture using pub/sub systems. The system allows the users to create multiple different publishers and subscribers while accessing data from a local server and a primary HTTP server. The system is designed to be a multi-client and multi-server system to simulate real-life scenarios while having two different sources of generated values to send via sockets in OPCUA protocols, multiple different APIs were used for the clients on how they retrieve data as well.
Analysis Of The Internal Delays Of Various Wireless Technologies For Autonomous Vehicle Applications, Luanne Seaman
Analysis Of The Internal Delays Of Various Wireless Technologies For Autonomous Vehicle Applications, Luanne Seaman
Symposium of Student Scholars
Analysis of the Internal Delays of Various Wireless Technologies for Autonomous Vehicle Applications
Poster Presentation Undergraduate Student: Luanne Seaman
Research Mentor: Dr. Billy Kihei
Autonomous vehicles use VANETs (vehicular ad-hoc networks) to communicate with the world around them. Despite the simple premise, VANETs rely on a variety of wireless technologies depending on range, internal delay, urgency of information, and other factors. Therefore, VANET algorithms will need to weigh these elements accordingly. Through this research, I hope to contribute reliable measurements of internal delay to reduce the algorithms’ complexity. To calculate internal delay, I connected two Arduinos to a STM32 Nucleo …
Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection, Rachel Meyer
Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection, Rachel Meyer
Scholar Week 2016 - present
Asteroid detection is a common field in astronomy for planetary defense which requires observations from survey telescopes to detect and classify different objects. The amount of data collected each night is increasing as better designed telescopes are created each year. This amount is quickly becoming unmanageable and many researchers are looking for ways to better process this data. The dominant solution is to implement computer algorithms to automatically detect these sources and to use Machine Learning in order to create a more efficient and accurate classifier. In the past there has been a focus on larger asteroids that create streaks …
Cova Cci Undergrad Cyber Research, Nana Jeffrey
Cova Cci Undergrad Cyber Research, Nana Jeffrey
Cybersecurity Undergraduate Research Showcase
Is your digital assistant your worst enemy? Modern technology has impacted our lives in a positive way making tasks that were once time consuming become more convenient. For example a few years ago writing down your grocery list with a paper and pen was a norm, now with technology we have access to IoT devices such as smart fridges that can inform us on what items are low in stock, send a message to our digital assistants such as iOS Siri and Amazon's Alexa to remind us to buy those groceries. Although these digital assistants have helped make our daily …
Ransombuster Iot: A Intrusion Detection And Dataset Creation Tool For Ransomware Attacks Within Iot Networks, Jackson M. Walker
Ransombuster Iot: A Intrusion Detection And Dataset Creation Tool For Ransomware Attacks Within Iot Networks, Jackson M. Walker
Cybersecurity Undergraduate Research Showcase
The proposed research follows the design-science guidelines(Hevner, 2004). This paper uses these design-science methods for developing the guidelines for the implementation of the proposed architecture, understanding previous research contributions, and evaluating of research. This paper proposes a network artifact for studying ransomware IoT intrusion detection techniques and offers a proposed network architecture to serve as a framework for creating a publicly available dataset for IoT research on ransomware.
Deepfakes: Ai Technology Of The Future, Hosanna Root
Deepfakes: Ai Technology Of The Future, Hosanna Root
Cybersecurity Undergraduate Research Showcase
Deepfakes technology’s danger stems from its ability to create realistic but fake synthesized media that people often identify as something that is real. With this powerful technology in the wrong hands, deepfakes can cause devastating havoc through information warfare, election campaign disruptions, and more, creating distrust in society. Disinformation is already rampant today, even without wide deployments of deepfakes, which is concerning given the fact that deepfakes’ nefarious full potentials are yet to be reached.
Corporate Cybersecurity In The Context Of M&A Transactions, Cameron Beck
Corporate Cybersecurity In The Context Of M&A Transactions, Cameron Beck
Cybersecurity Undergraduate Research Showcase
The rapid rise of digital devices has unlocked a new dimension of innovation and prosperity in the 21st century. Computers are now an integrated and ubiquitous part of our global culture. You would be hard-pressed to walk into any given room without several computer chips humming inaudibly inside the machines that facilitate our modern world. Even lightbulbs and doorbells are connected to the Internet, capturing information from the world around them and sending that information to the Cloud. The Internet expands access to communication, international marketplaces, entertainment, professional resources, and nearly every book in the world.
Modeling Iot Solutions: A Lack Of Iot Device Security, And User Education, Benjamin Newlin
Modeling Iot Solutions: A Lack Of Iot Device Security, And User Education, Benjamin Newlin
Cybersecurity Undergraduate Research Showcase
The Internet of Things, more commonly known as IoT devices, is an ever growing topic, both in the marketplace and in cyber security. While new devices are released into the public every year, a lack of standardized security concepts is also growing ever so clear. By having a model or standard for IoT devices and manufacturers to follow, the customer-base of these devices will have an easier time identifying trustworthy devices as well as how to secure their own devices.
Security Issues With Network Connected Scada Systems, Chad Holm
Security Issues With Network Connected Scada Systems, Chad Holm
Cybersecurity Undergraduate Research Showcase
The use of Supervisory Control and Data Acquisition (SCADA) systems has become common place and are being used in several different industries. These have evolved as the technology has progressed. The use of Internet of Things (IOT) devices makes for less human intervention to run daily operations in these industries. This can also allow hackers to gain access to these devices due to security holes that are overlooked. There have several different ways that have been exploited on SCADA networks and the goal is to recognize and secure them so hackers cannot gain access to them.
Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao
Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao
Posters-at-the-Capitol
Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …
Joint Latency-Energy Optimization Scheme For Offloading In Mobile Edge Computing Environment Based In Deep Reinforcement Learning, Jui Mhatre
Symposium of Student Scholars
With the increasing number of mobile devices (MD), IoT devices, and computation-intensive tasks deployed on these devices, there is a need to increase the efficiency and speed of the deliverable. Due to inadequate resources, it is infeasible to compute all the tasks locally. Similarly, due to time constraints, it is not possible to compute the entire task at a remote site. Edge computing (EC) and cloud computing (CC) play the role of providing the resources to these devices on the fly. But a major drawback is increased delay and energy consumption due to transmission and offloading of computation tasks to …
Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen
Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen
Cybersecurity Undergraduate Research Showcase
An existing StudentLife Study mobile dataset was evaluated and organized to be applied to different machine learning methods. Different variables like user activity, exercise, sleep, study space, social, and stress levels are optimized to train a model that could predict user stress level. The different machine learning methods would test if both patient data privacy and training efficiency can be ensured.
Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta
Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta
Cybersecurity Undergraduate Research Showcase
In recent years, the incorporation of cloud computing and cloud services has increased in many different types of organizations and companies. This paper will focus on the philosophical, economical, and political factors that cloud computing and cloud services have in the workforce and different organizations. Based on various scholarly articles and resources it was observed that organizations used cloud computing and cloud services to increase their overall productivity as well as decrease the overall cost of their operations, as well as the different policies that were created by lawmakers to control the realm of cloud computing. The results of this …
Rollover V2x Soft Antenna For Vehicular Safety, Jiwoo Park, Devansh Singh
Rollover V2x Soft Antenna For Vehicular Safety, Jiwoo Park, Devansh Singh
Symposium of Student Scholars
Vehicle-2-Everything (V2X) technology can make roads safer by allowing vehicles to communicate with each other. The goal of V2X is to reduce accidents where there is not a line-of-sight of the other vehicle, such as at intersections, in harsh driving conditions, and around curves. Considering that the antenna for V2X will be mounted on the roof, how then should a turned over vehicle communicate reliably with other vehicles if another antenna doesn't also exist on the bottom of the vehicle? We explore using soft-robotics for deploying a spare antenna from under the vehicle. Experiments show that when the antenna is …
Securing Global Positioning Systems In A Blockchain Using Vehicle-To-Everything Communications, Malik Purefoy
Securing Global Positioning Systems In A Blockchain Using Vehicle-To-Everything Communications, Malik Purefoy
Symposium of Student Scholars
Intelligent transportation systems (ITS) are being deployed globally to support vehicular safety innovation using wireless communication. The ITS paradigm of vehicle-to-everything communication (V2X) enables vehicles equipped with an on-board unit (OBU) to communicate with a roadside unit (RSU) infrastructure to provide safe intersection movements between similarly equipped vehicles, pedestrians, and animal life. However, the current paradigm relies heavily on the availability of a Global Positioning System (GPS) for ensuring road user safety. In a doomsday scenario where GPS becomes unavailable, collision avoidance services provided through V2X may be rendered unavailable. The proposed solution is to develop a secure and reliable …