Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
Articles 1 - 7 of 7
Full-Text Articles in Computer Engineering
Data For Ai In Network Systems Workshop Report, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Data For Ai In Network Systems Workshop Report, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Workshop on Data for AI in Network Systems
No abstract provided.
Workshop On Data For Ai In Network Systems - Event Summary, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Workshop On Data For Ai In Network Systems - Event Summary, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich
Workshop on Data for AI in Network Systems
No abstract provided.
Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers
Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers
Cybersecurity Undergraduate Research Showcase
This research paper answers the question, “What is Ransomware, and How to prevent it?”. This paper will discuss what ransomware is, its history about ransomware, how ransomware attacks Windows systems, how to prevent ransomware, how to handle ransomware once it is already on the network, ideas for training professionals to avoid ransomware, and how anti-virus helps defend against ransomware. Many different articles, case studies, and professional blogs will be used to complete the research on this topic.
Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng
Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng
Cybersecurity Undergraduate Research Showcase
Cybersecurity is very crucial in the digital age in order to safeguard the availability, confidentiality, and integrity of data and systems. Mitigation techniques used in the industry include Multi-factor Authentication (MFA), Incident Response Planning (IRP), Security Information and Event Management (SIEM), and Signature-based and Heuristic Detection.
MFA is employed as an additional layer of protection in several sectors to help prevent unauthorized access to sensitive data. IRP is a plan in place to address cybersecurity problems efficiently and expeditiously. SIEM offers real-time analysis and alerts the system of threats and vulnerabilities. Heuristic-based detection relies on detecting anomalies when it comes …
The Rise And Risks Of Internet Of Things, Diamond E. Hicks
The Rise And Risks Of Internet Of Things, Diamond E. Hicks
Cybersecurity Undergraduate Research Showcase
Internet of Things (IoT) has become a necessary part of our everyday lives. IoT is the network in which many different devices communicate, connect, and share data. Though how IoT got to where it is today, the issues it faced, and how it affects our lives today is not common knowledge. Despite the fact that IoT has advanced our technology to what it is today, people do not completely understand what it does.
Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden
Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden
National Training Aircraft Symposium (NTAS)
An increased availability of data and computing power has allowed organizations to apply machine learning techniques to various fleet monitoring activities. Additionally, our ability to acquire aircraft data has increased due to the miniaturization of small form factor computing machines. Aircraft data collection processes contain many data features in the form of multivariate time-series (continuous, discrete, categorical, etc.) which can be used to train machine learning models. Yet, three major challenges still face many flight organizations 1) integration and automation of data collection frameworks, 2) data cleanup and preparation, and 3) embedded machine learning framework. Data cleanup and preparation has …
Disaster Area Lora Mesh Communications, Joel Bulkley
Disaster Area Lora Mesh Communications, Joel Bulkley
Posters-at-the-Capitol
In the aftermath of the December 2021 tornado disaster that swept through Western Kentucky causing 57 fatalities, 500+ critical injuries, and millions of dollars’ worth in damages, one of the first things that became apparent was the lack of communications and underlying power infrastructure. The goal of this project is to create a highly resilient LoRa mesh communications network utilizing low power, low cost, and easy to deploy radios to enable first responders in a disaster area to communicate their location and send critical information in a situation where traditional communications infrastructure has been destroyed or is otherwise unavailable. Through …