Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (5)
- Cyber (3)
- Battleverse (2)
- China (2)
- Cyber war (2)
-
- Metaverse (2)
- Virtual reality (2)
- Activity and travel patterns (1)
- Adversarial machine learning (1)
- Artificial intelligence (1)
- Biomanufacturing (1)
- Cell Therapy (1)
- Chinese (1)
- Chinese Commercial Enablers (1)
- Collegiate education (1)
- Commercialization (1)
- Community Engagement (1)
- Convergence Research (1)
- Critical Race Theory (1)
- Cyber Intelligence (1)
- Cyber Policy (1)
- Cyber warfare (1)
- Cyberattacks (1)
- Deep learning (1)
- Defense (1)
- Digital Twins (1)
- Dual-use (1)
- Education (1)
- Enforcement (1)
- Environmental Resource Permit Program (1)
- Publication
- Publication Type
Articles 1 - 18 of 18
Full-Text Articles in Engineering
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Military Cyber Affairs
Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Military Cyber Affairs
Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
Military Cyber Affairs
On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Military Cyber Affairs
No abstract provided.
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Military Cyber Affairs
No abstract provided.
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn
Military Cyber Affairs
Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …
Offensive Cyber Operations And Future Littoral Operating Concepts, Jd Work
Offensive Cyber Operations And Future Littoral Operating Concepts, Jd Work
Military Cyber Affairs
Introduction of new ground-launch cruise missile options to hold adversary naval targets at risk in order to support conventional deterrence objectives through sea control and sea denial missions is the centerpiece of proposed reorganization of Marine Littoral forces, as part of new “Expeditionary Advanced Base Operations,” and “Littoral Operations in Contested Environments” concepts. Effective distributed sea control fires against pacing threat maritime formations requires defeat of integrated air defense systems. Offensive cyber operations capabilities may be considered as a means of altering the calculus of attrition in missile fires exchanges, but due to various sensitivities it has been difficult to …
Enter The Battleverse: China's Metaverse War, Josh Baughman
Enter The Battleverse: China's Metaverse War, Josh Baughman
Military Cyber Affairs
No abstract provided.
Human-Machine Teaming And Its Legal And Ethical Implications, Jim Q. Chen, Thomas Wingfield
Human-Machine Teaming And Its Legal And Ethical Implications, Jim Q. Chen, Thomas Wingfield
Military Cyber Affairs
Humans rely on machines in accomplishing missions while machines need humans to make them more intelligent and more powerful. Neither side can go without the other, especially in complex environments when autonomous mode is initiated. Things are becoming more complicated when law and ethical principles should be applied in these complex environments. One of the solutions is human-machine teaming, as it takes advantage of both the best humans can offer and the best that machines can provide. This article intends to explore ways of implementing law and ethical principles in artificial intelligence (AI) systems using human-machine teaming. It examines the …
Black Lives Matter In Engineering, Too! An Environmental Justice Approach Towards Equitable Decision-Making For Stormwater Management In African American Communities, Maya Elizabeth Carrasquillo
Black Lives Matter In Engineering, Too! An Environmental Justice Approach Towards Equitable Decision-Making For Stormwater Management In African American Communities, Maya Elizabeth Carrasquillo
USF Tampa Graduate Theses and Dissertations
The United States and the world have recently been challenged with the disparate effects of COVID-19 and the continual killings of unarmed Black men and women across the nation. A history of anti-black racism has led to systemic structures of inequity that thread throughout institutions and communities across the nation. This environmental engineering research comes at a time when understanding how to effectively engage in, and with Black communities is at the forefront of discourse in academia, utilities and private sector.
In 2018 the Brookings Institute published a report on workforce in the water sector demonstrating the lack of diversity …
Regulatory Methodology And Unmitigated Wetland Loss In Southwest Florida, Kathleen B. Castor
Regulatory Methodology And Unmitigated Wetland Loss In Southwest Florida, Kathleen B. Castor
USF Tampa Graduate Theses and Dissertations
This research used Geographical Information System (GIS) data to estimate the acreage of wetland loss due to small-scale activities (taking into account exempt, permitted, and unauthorized activities) in the Southwest District of the Department of Environmental Protection (DEP) between 2006 and 2011 and compared that net loss with the unmitigated wetland net loss that DEP documented during that time for authorized activities and violations that were discovered. The comparison allowed an estimation of the extent of undocumented small-scale unmitigated wetland loss that occurred during those six years. DEP records show that 88% of non-compliance cases remain unresolved, and the net …
Understanding The Linkages Between Urban Transportation Design And Population Exposure To Traffic-Related Air Pollution: Application Of An Integrated Transportation And Air Pollution Modeling Framework To Tampa, Fl, Sashikanth Gurram
USF Tampa Graduate Theses and Dissertations
Rapid and unplanned urbanization has ushered in a variety of public health challenges, including exposure to traffic pollution and greater dependence on automobiles. Moreover, vulnerable population groups often bear the brunt of negative outcomes and are subject to disproportionate exposure and health effects. This makes it imperative for urban transportation engineers, land use planners, and public health professionals to work synergistically to understand both the relationship between urban design and population exposure to traffic pollution, and its social distribution. Researchers have started to pay close attention to this connection, mainly by conducting observational studies on the relationship between transportation, urban …
Building Codes To Minimize Cover Collapses In Sinkhole-Prone Areas, George Veni, Connie Campbell Brashear, Andrew Glasbrenner
Building Codes To Minimize Cover Collapses In Sinkhole-Prone Areas, George Veni, Connie Campbell Brashear, Andrew Glasbrenner
Sinkhole Conference 2015
Cover- collapse sinkholes are forming with increasing frequency under buildings. Analyses of sinkhole distribution in Beacon Woods, Florida, preliminarily indicate their occurrence is an order of magnitude greater in urban versus undeveloped areas, suggesting the structures themselves are enhancing the collapse process. The most likely causes are induced recharge via at least one of two sources. First, runoff and drainage from roads, structures, and impoundments that is not adequately dispersed will promote sinkhole development. Second, leaking water, sewer, and septic systems beneath or adjacent to a structure will also promote collapse. The process of cover-collapse from induced recharge is well …