Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Old Dominion University (193)
- Selected Works (168)
- Air Force Institute of Technology (163)
- California State University, San Bernardino (143)
- California Polytechnic State University, San Luis Obispo (131)
-
- Singapore Management University (122)
- University of Nebraska - Lincoln (71)
- Technological University Dublin (60)
- New Jersey Institute of Technology (54)
- University of Pennsylvania Carey Law School (52)
- University for Business and Technology in Kosovo (51)
- Purdue University (43)
- University of Arkansas, Fayetteville (43)
- University of Kentucky (43)
- Embry-Riddle Aeronautical University (39)
- SelectedWorks (38)
- Edith Cowan University (35)
- Western University (35)
- Portland State University (32)
- University of New Mexico (29)
- The University of Akron (27)
- Institute of Business Administration (26)
- Kennesaw State University (26)
- Association of Arab Universities (25)
- University of Nevada, Las Vegas (25)
- Florida International University (24)
- University of Tennessee, Knoxville (17)
- City University of New York (CUNY) (16)
- Cleveland State University (15)
- University of Georgia School of Law (15)
- Keyword
-
- Security (54)
- Cybersecurity (44)
- Computer networks (43)
- Internet (38)
- Wireless communication systems (38)
-
- Machine learning (36)
- Internet of Things (34)
- Computerized Conferencing & Communications Center (31)
- IoT (31)
- Blockchain (29)
- Privacy (28)
- #antcenter (25)
- Routing (25)
- Wireless sensor networks (25)
- Networking (23)
- Machine Learning (22)
- Sensor networks (20)
- Digital libraries (19)
- Deep Learning (18)
- Technology (18)
- Computer networks--Security measures (17)
- Deep learning (17)
- Android (16)
- Communication (16)
- Authentication (15)
- Wireless (15)
- Artificial intelligence (14)
- Cloud computing (14)
- Social media (14)
- Telecommunications (14)
- Publication Year
- Publication
-
- Theses and Dissertations (170)
- Journal of International Technology and Information Management (119)
- Research Collection School Of Computing and Information Systems (107)
- Electrical & Computer Engineering Theses & Dissertations (59)
- Computer Engineering (57)
-
- All Faculty Scholarship (52)
- Faculty Publications (52)
- Computer Science Faculty Publications (41)
- UBT International Conference (38)
- Master's Theses (37)
- Theses (36)
- Computerized Conferencing and Communications Center Reports (33)
- Computer Science Theses & Dissertations (32)
- Electronic Thesis and Dissertation Repository (32)
- Williams Honors College, Honors Research Projects (27)
- Patrick Tague (26)
- Conference papers (25)
- International Conference on Information and Communication Technologies (24)
- FIU Electronic Theses and Dissertations (23)
- Library Philosophy and Practice (e-journal) (23)
- Electrical and Computer Engineering Faculty Publications (21)
- Hong-Ning Dai (21)
- Graduate Theses and Dissertations (20)
- Electronic Theses and Dissertations (19)
- Computer Science and Software Engineering (18)
- Theses Digitization Project (18)
- Articles (17)
- Cybersecurity Undergraduate Research Showcase (17)
- Publications (17)
- Applied Mathematics & Information Sciences (16)
- Publication Type
Articles 1 - 30 of 2226
Full-Text Articles in Engineering
Synthetic Network Creation And Visualization, Kaylee Sloat, Jeremy Evert
Synthetic Network Creation And Visualization, Kaylee Sloat, Jeremy Evert
Student Research
The code in the repository, “synthetic_network_creation_and_visualization” is inspired by the foundational work presented in "NetProbe: A Fast and Scalable System for Fraud Detection in Online Auction Networks" by Shashank Pandit, Duen Horng Chau, Samuel Wang, and Christos Faloutsos.
Link to the original paper:https://kilthub.cmu.edu...
You Want Me To Do What? But I Can’T Read That... Cataloging Soviet Russia Space Exploration Books, Katherine Loving, Phillip Fitzsimmons
You Want Me To Do What? But I Can’T Read That... Cataloging Soviet Russia Space Exploration Books, Katherine Loving, Phillip Fitzsimmons
Faculty Books & Book Chapters
The Al Harris Library received a donation of the archive of retired astronaut General Thomas P. Stafford. The continually growing collection includes over 200 boxes containing NASA reports, professional and personal pictures, videos, and more. Part of the collection is the approximately 700 books used for research by Stafford and his co-author Michael Cassutt to write the memoir We Have Capture: Tom Stafford and the Space Race (2002). Half of these books are a collection of Soviet-era Russia (USSR) space program books and periodicals written in Russian. Michael Cassutt has characterized the books as the most comprehensive collection about the …
Instructional Systems Design: The Diffusion And Adoption Of Technology: (Volume 2), Cassandra Celaya (Author), Pamela J. Downing (Author), Jessica Shifflett (Author), Debbie Gdula (Author), Tracie Barr (Author), Miguel Ramlatchan (Author & Editor)
Instructional Systems Design: The Diffusion And Adoption Of Technology: (Volume 2), Cassandra Celaya (Author), Pamela J. Downing (Author), Jessica Shifflett (Author), Debbie Gdula (Author), Tracie Barr (Author), Miguel Ramlatchan (Author & Editor)
University Administration Bookshelf
Instructional designers, instructional systems designers, and other educational technologists are, by their nature, innovators. These professionals apply and extend the applied science of learning, systems, communication, and instructional design theory to help students learn. Technology in some capacity is used to make the connections between subject matter experts, teachers, instructors, and their learners. It is common for instructional designers to seek new tools, techniques, and innovations for the improvement of learning, access, quality, and student satisfaction. However, the adoption and diffusion of new educational technology and innovation is a complex process that depends on many variables. Understanding these processes and …
Exploration Of Esp32 Vulnerabilities And Malware, Charles T. Moreno
Exploration Of Esp32 Vulnerabilities And Malware, Charles T. Moreno
College of Engineering Summer Undergraduate Research Program
The rapid expansion of the Internet of Things (IoT) has revolutionized industries by enabling connected smart devices to monitor, communicate, and automate tasks in real-time. Central to the functioning of many IoT systems are microcontrollers like the ESP32, a versatile and low-cost microcontroller known for its integrated Wi-Fi and Bluetooth capabilities. The ESP32's powerful processing, energy efficiency, and adaptability make it a popular choice for IoT applications ranging from smart home devices to industrial automation. However, as IoT adoption grows, so too do the security challenges posed by vulnerabilities in these devices, particularly within ESP32-based systems. For this project, I …
Cyber Threat Intelligence Sharing In Nigeria, Muhammad Abubakar Nainna, Julian Bass, Lee Speakman
Cyber Threat Intelligence Sharing In Nigeria, Muhammad Abubakar Nainna, Julian Bass, Lee Speakman
Communications of the IIMA
Cybersecurity challenges are common in Nigeria. Sharing cyber threat intelligence is essential in addressing the extensive challenges posed by cyber threats. It also helps in meeting regulatory compliance. There are a range of impediments that prevent cyber threat intelligence sharing. We hypothesise that we want to maximise this cyber threat intelligence sharing to resist malicious attackers. Therefore, this research investigates factors influencing threat intelligence sharing in Nigeria's cyber security practitioners. To achieve this aim, we conducted research interviews with 14 cyber security practitioners using a semi-structured, open-ended interview guide, which was recorded and transcribed. We analysed the data using an …
Federated Learning Systems For Mobile Sensing Data, Xiaopeng Jiang
Federated Learning Systems For Mobile Sensing Data, Xiaopeng Jiang
Dissertations
Federated Learning (FL) has emerged as a new distributed Deep Learning (DL) paradigm that enables privacy-aware training and inference on mobile devices with help from the cloud. This dissertation presents a comprehensive exploration of FL with mobile sensing data, covering systems, applications, and optimizations.
First, a mobile-cloud FL system, FLSys, is designed to balance model performance with resource consumption, tolerate communication failures, and achieve scalability. In FLSys, different DL models with different FL aggregation methods can be trained and accessed concurrently by different apps. In addition, FLSys provides advanced privacy-preserving mechanisms and a common API for third-party app developers to …
Future-Ready Digitalized Education: Unraveling The Dynamics Of Sustainable And Ethical Digital Transformation, Vaishnavi Rode
Future-Ready Digitalized Education: Unraveling The Dynamics Of Sustainable And Ethical Digital Transformation, Vaishnavi Rode
Electronic Theses, Projects, and Dissertations
Amid the brisk advancement of digital technologies, higher educational institutions and universities are finding themselves at a crucial turning point, with significant obstacles and new prospects in the realm of digital transformation. This culminating experience project delves deeply into the compounded terrain of digital transformation in higher education, emphasizing the need for sustainable practices in the face of rapidly evolving technical advancements. The research questions are: (Q1) What strategies can universities adopt to foster digital literacy among students and faculty while promoting sustainability values within their digital education programs and Why? (Q2) What ethical considerations, concerning data privacy and digital …
Adaptable Quantum Education Platform Using Learning Objects, Krishna Puja Anumula
Adaptable Quantum Education Platform Using Learning Objects, Krishna Puja Anumula
Master's Theses
In recent years, the need to make classroom learning more interactive and engaging has become increasingly important. The lack of workforce in interdisciplinary fields such as quantum networking and quantum internet requires a new approach that addresses every learner’s individual needs. To address this challenge, this thesis introduces an adaptive learning platform rooted in the theory of learning objects and Kolb’s experiential learning model. The platform aids educators and learners in designing and utilizing various learning objects for quantum networking and quantum internet.
The platform enables educators and learners to build their own lessons and lesson plans using learning objects …
Welcome To Cheney App, Timothy Nelson, Nolan Posey, Tanner Stephenson, Daniel Palmer, Matthew Matriciano
Welcome To Cheney App, Timothy Nelson, Nolan Posey, Tanner Stephenson, Daniel Palmer, Matthew Matriciano
2024 Symposium
Welcome to Cheney is a non-profit organization committed to fostering communication, connection, and action within the city of Cheney. Their primary purpose is to provide timely and accurate information to the residents of Cheney. Welcome to Cheney has tried utilizing other forms of social media such as Facebook and Instagram to share information, but their presence is being overshadowed amidst the noise on those platforms. Therefore, the intention of this project is to develop a mobile app with the sole purpose of being a reliable means of sharing important information with the residents of Cheney.
The information being shared on …
“The Role Of Modern Technologies In Effective Management Of Crowds”, Ayman El-Din
“The Role Of Modern Technologies In Effective Management Of Crowds”, Ayman El-Din
Journal of Police and Legal Sciences
Scientists started to think about the importance of developing crowd management methods, because of human gatherings - in different countries - have been accompanied by lots of disasters that have killed many and resulted in many injuries. Gathering crowd data is vital in the process of managing crowds, as crowd information contributes significantly to planning and decision-making processes and increasing communication between parties interacting with them, and data collected includes "the number of crowd members, crowd density, and problems that may occur”. Technology and technical awareness play an important role in “collecting, organizing, analyzing” real-time collected data of crowd. This …
Authenticated Diagnosing Of Covid-19 Using Deep Learning-Based Ct Image Encryption Approach, Mohamed Attia Abdelgwad, Amira Hassan Abed, Mahmoud Bahloul
Authenticated Diagnosing Of Covid-19 Using Deep Learning-Based Ct Image Encryption Approach, Mohamed Attia Abdelgwad, Amira Hassan Abed, Mahmoud Bahloul
Future Computing and Informatics Journal
Researchers are motivated to use artificial intelligence in biometrics, medical imaging encryption, as well as cybersecurity due to its rapid progress. An encryption method for CT scans—which are used to diagnose COVID-19 disease—is proposed in this study. The suggested encryption method creates a connection among an individual's face picture and CT image to increase confidentiality. The simple CT picture is first enhanced with a host image. An encryption key is multiplied by the final result. This key is produced by applying a Convolutional Neural Network (CNN) to recognize characteristics from people's face photographs. Additionally, a straightforward CNN with three convolutional …
A Secure Lightweight Wireless M-Bus Protocol For Iot: Leveraging The Noise Protocol Framework, Wafaa Anani
A Secure Lightweight Wireless M-Bus Protocol For Iot: Leveraging The Noise Protocol Framework, Wafaa Anani
Electronic Thesis and Dissertation Repository
The expansion of smart metering within the Internet of Things (IoT) ecosystem underscores the need for robust security protocols that safeguard data transmission while optimizing device efficiency. Wireless Meter-Bus (wM-Bus), a key protocol for remote meter reading in utility systems such as gas, water, and heat meters, faces significant security challenges. This dissertation introduces a method to enhance wM-Bus security by integrating the Noise Protocol Framework (NPF), which secures wM-Bus against vulnerabilities and optimizes for the energy constraints of IoT devices. Initially examining wM-Bus security issues, particularly in battery-operated smart meters, the study explores the NPF’s lightweight, adaptable security solutions. …
Cyber Risks In Ontario Online Elections, James D. Brunet
Cyber Risks In Ontario Online Elections, James D. Brunet
Electronic Thesis and Dissertation Repository
Online voting is increasingly prevalent in Ontario's municipalities, despite a lack of regulated technological and procedural safeguards. Individual municipalities, lacking deep knowledge of online voting technologies, are responsible for procuring technology from private vendors which make security and privacy claims that are difficult to verify. These reasons, among others, have contributed to an anomalous environment where election technology, security, and procedures diverge greatly from other robust democracies that use electronic voting. This thesis demonstrates this divergence by first presenting a novel security vulnerability in a popular online voting system used in Ontario, as well as the difficulty communicating this risk …
Comprehensive Network Redundancy Implementation And Cybersecurity Hardening Project: Ensuring Resilience And Defending Against Dhcp Starvation, Stp Man-In-The-Middle, And Brute Force Attacks, Seth Shaheen
Williams Honors College, Honors Research Projects
I have created a network topology that contains three Cisco routers, three Cisco switches, and three endpoints. The network has been built using the software GNS-3. The endpoints on the topology include one VPC, one Kali Linux VM, and one Ubuntu Server VM. The main purpose of this network topology is to show the skills I have learned during my tenure at The University of Akron. This will be done by hardening this network to ensure that the network is impervious to cyber-attacks. The Kali Linux VM will act as the attacker on the network and conduct three attacks: STP …
A Study On Privacy Over Security And Privacy Enhancing Networks, Everett Lee Conway
A Study On Privacy Over Security And Privacy Enhancing Networks, Everett Lee Conway
Master's Theses
With rapid developments in communication technologies and awareness of security and privacy risks online, Security and Privacy Enhancing Networks (SPENs) have become increasingly popular. Especially during the COVID-19 pandemic, workplaces encouraged employees to take additional security measures, such as VPNs. In this work, we conduct a comprehensive study on website fingerprinting attacks. A comprehensive system model and threat model based on two types of SPENs (Virtual Private Networks and Tor Networks) are presented. Moreover, we demonstrate a website fingerprinting attack by ethically collecting website fetch data and analyzing the collected data using five different machine learning classification models including k …
Optimal False Data Injection (Fdi) In Simulated Cooperative Adaptive Cruise Control (Cacc) Systems, Lovro Dukic
Optimal False Data Injection (Fdi) In Simulated Cooperative Adaptive Cruise Control (Cacc) Systems, Lovro Dukic
Master's Theses
In the rapidly advancing field of autonomous vehicles, ensuring the security and reliability of self-driving systems is crucial. Autonomous vehicle systems, such as cooperative adaptive cruise control (CACC), must undergo significant research and testing before their integration into commercial intelligent transportation systems. CACC considers multiple vehicles in close proximity as a single entity, or platoon, with each vehicle equipped with a controller that uses sensor-based measurements and vehicle-to-vehicle (V2V) communication to control inter-vehicle spacing. While this system offers numerous potential benefits for traffic safety and efficiency, it is also susceptible to False Data Injection (FDI) attacks, which can cause the …
Anomaly Detection In Heterogeneous Iot Systems: Leveraging Symbolic Encoding Of Performance Metrics For Anomaly Classification, Maanav Patel
Anomaly Detection In Heterogeneous Iot Systems: Leveraging Symbolic Encoding Of Performance Metrics For Anomaly Classification, Maanav Patel
Master's Theses
Anomaly detection in Internet of Things (IoT) systems has become an increasingly popular field of research as the number of IoT devices proliferate year over year. Recent research often relies on machine learning algorithms to classify sensor readings directly. However, this approach leads to solutions being non-portable and unable to be applied to varying IoT platform infrastructure, as they are trained with sensor data specific to one configuration. Moreover, sensors generate varying amounts of non-standard data which complicates model training and limits generalization. This research focuses on addressing these problems in three ways a) the creation of an IoT Testbed …
Expanding The Horizon: Blockchain Technology Beyond The Bounds Of Cryptocurrency, Hassan Azhar
Expanding The Horizon: Blockchain Technology Beyond The Bounds Of Cryptocurrency, Hassan Azhar
SMU Data Science Review
Blockchain technology has extended beyond its initial role as the infrastructure for cryptocurrencies to transform various industries with its decentralized and transparent ledger system. This paper examines the broad spectrum of blockchain applications beyond cryptocurrency. It explores its potential to innovate and drive change across finance, supply chain management, healthcare, real estate, and voting systems. We review recent literature, detail specific use cases, and discuss blockchain's challenges and opportunities, aiming to provide a comprehensive overview of its transformative impact. Integrating emerging technologies, scalability, regulatory considerations, and energy consumption are critical challenges to its adoption. Our findings underscore the need for …
Analysis Of Inequality In Household Internet Utilization And Policy Implications, Shanisara Chamwong, Thoedsak Chomtohsuwan, Narissara Charoenphandhu
Analysis Of Inequality In Household Internet Utilization And Policy Implications, Shanisara Chamwong, Thoedsak Chomtohsuwan, Narissara Charoenphandhu
Journal of Demography
This research investigates the pervasive inequality in household internet access and use that contributes to the digital divide. As the internet becomes an integral part of daily life, variations in access and use carry significant implications for social and economic opportunities. A quantitative approach is applied, analyzing data from The National Statistical Office of Thailand to capture a comprehensive understanding of inequality in household internet access and use, as measured by the Gini coefficient. Five aspects of internet access and use are considered as the determinants of inequality, including internet connectivity, internet affordability, internet quality, device availability, and flexibility and …
Learning Proximal Operators With Gaussian Process And Adaptive Quantization In Distributed Optimization, Aldo Duarte Vera Tudela
Learning Proximal Operators With Gaussian Process And Adaptive Quantization In Distributed Optimization, Aldo Duarte Vera Tudela
LSU Doctoral Dissertations
In networks consisting of agents communicating with a central coordinator and working together to solve a global optimization problem in a distributed manner, the agents are often required to solve private proximal minimization subproblems. Such a setting often requires a further decomposition method to solve the global distributed problem, resulting in extensive communication overhead. In networks where communication is expensive, it is crucial to reduce the communication overhead of the distributed optimization scheme. Integrating Gaussian processes (GP) as a learning component to the Alternating Direction Method of Multipliers (ADMM) has proven effective in learning each agent's local proximal operator to …
Effects Of A Wi-Fi Link On The Performance Of A Path Following Autonomous Ground Vehicle, Anthony Iwejuo, Austin Cagle, Billy Kihei, Ph.D.
Effects Of A Wi-Fi Link On The Performance Of A Path Following Autonomous Ground Vehicle, Anthony Iwejuo, Austin Cagle, Billy Kihei, Ph.D.
Symposium of Student Scholars
As vehicles become more automated and connected, the future of safe and efficient travel will be dependent on efficient wireless networks. Artificial intelligence (AI) demands high power resources and computing resources that can be resource-intensive for mobile robotic systems. A new paradigm involving the remote computing of A.I. can enable robotics that are built lighter and more power efficient. In this study, we compare a locally run artificial intelligence algorithm for autonomous ground vehicle navigation against remote computation through various wireless links to highlight the need for low-latency access to remote computing resources over Wi-Fi network calls. Our findings show …
Computer Security Lab Experiment, Orit D. Gruber, Herbert Schanker
Computer Security Lab Experiment, Orit D. Gruber, Herbert Schanker
Open Educational Resources
This is a basic experiment for all students of all majors to explore Computer Security. Each instruction included in this experiment is conducted online via a Web Browser; Firefox or Chrome is recommended. Software does not need to be downloaded nor installed. The step by step instructions in this experiment include interactive questions and observations which are then included in the (student's) final report.
Evaluating The Effect Of Noise On Secure Quantum Networks, Karthick Anbalagan
Evaluating The Effect Of Noise On Secure Quantum Networks, Karthick Anbalagan
Master's Theses
This thesis focuses on examining the resilience of secure quantum networks to environmental noise. Specifically, we evaluate the effectiveness of two well-known quantum key distribution (QKD) protocols: the Coherent One-Way (COW) protocol and Kak’s Three-Stage protocol (Kak06). The thesis systematically evaluates these protocols in terms of their efficiency, operational feasibility, and resistance to noise, thereby contributing to the progress of secure quantum communications. Using simulations, this study evaluates the protocols in realistic scenarios that include factors such as noise and decoherence. The results illustrate each protocol’s relative benefits and limitations, highlighting the three-stage protocol’s superior security characteristics, resistance to interference, …
Machine Learning For Intrusion Detection Into Unmanned Aerial System 6g Networks, Faisal Alrefaei
Machine Learning For Intrusion Detection Into Unmanned Aerial System 6g Networks, Faisal Alrefaei
Doctoral Dissertations and Master's Theses
Progress in the development of wireless network technology has played a crucial role in the evolution of societies and provided remarkable services over the past decades. It remotely offers the ability to execute critical missions and effective services that meet the user's needs. This advanced technology integrates cyber and physical layers to form cyber-physical systems (CPS), such as the Unmanned Aerial System (UAS), which consists of an Unmanned Aerial Vehicle (UAV), ground network infrastructure, communication link, etc. Furthermore, it plays a crucial role in connecting objects to create and develop the Internet of Things (IoT) technology. Therefore, the emergence of …
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Military Cyber Affairs
Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.