Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Old Dominion University (12)
- California State University, San Bernardino (8)
- University of Arkansas, Fayetteville (8)
- California Polytechnic State University, San Luis Obispo (6)
- Technological University Dublin (6)
-
- Clemson University (4)
- University of Nebraska - Lincoln (4)
- Air Force Institute of Technology (3)
- The University of Akron (3)
- University of Kentucky (3)
- Bowling Green State University (2)
- Florida International University (2)
- Penn State Dickinson Law (2)
- Southwestern Oklahoma State University (2)
- Universitas Negeri Yogyakarta (2)
- University of South Florida (2)
- West Virginia University (2)
- Western University (2)
- Aga Khan University (1)
- Association of Arab Universities (1)
- City University of New York (CUNY) (1)
- Cleveland State University (1)
- Dakota State University (1)
- Dartmouth College (1)
- East Tennessee State University (1)
- Eastern Washington University (1)
- Embry-Riddle Aeronautical University (1)
- Illinois Math and Science Academy (1)
- Kean University (1)
- Kennesaw State University (1)
- Keyword
-
- Machine learning (8)
- Cybersecurity (5)
- Blockchain (4)
- IoT (4)
- Privacy (4)
-
- Security (4)
- Machine Learning (3)
- SDN (3)
- Aviation (2)
- Awareness (2)
- China (2)
- Computer vision (2)
- Deep learning (2)
- Fantasy (2)
- Internet (2)
- Internet of Things (2)
- Internet of things (2)
- Object detection (2)
- Random forest (2)
- Ransomware (2)
- Resource Allocation (2)
- Robot (2)
- Science Fiction (2)
- Service Placement (2)
- Simulation (2)
- Small business (2)
- Sustainability (2)
- Testbeds (2)
- Tolkien (2)
- Vehicular Cloud Computing (2)
- Publication
-
- Journal of International Technology and Information Management (8)
- Cybersecurity Undergraduate Research Showcase (7)
- Articles (4)
- Computer Science and Computer Engineering Undergraduate Honors Theses (3)
- Faculty Publications (3)
-
- Graduate Theses and Dissertations (3)
- Williams Honors College, Honors Research Projects (3)
- All Dissertations (2)
- All Theses (2)
- Computer Engineering (2)
- Conference papers (2)
- Dickinson Law Review (2017-Present) (2)
- Distance Learning Faculty & Staff Books (2)
- Elinvo (Electronics, Informatics, and Vocational Education) (2)
- FIU Electronic Theses and Dissertations (2)
- Faculty Books & Book Chapters (2)
- Graduate Theses, Dissertations, and Problem Reports (2)
- Honors Projects (2)
- Honors Theses (2)
- Mechanical Engineering (2)
- Military Cyber Affairs (2)
- Theses and Dissertations--Computer Science (2)
- All Faculty Scholarship (1)
- Center for Cybersecurity (1)
- Computational Modeling & Simulation Engineering Theses & Dissertations (1)
- Computer Science Faculty Publications and Presentations (1)
- Computer Science and Engineering Theses and Dissertations (1)
- Computer Science: Faculty Publications and Other Works (1)
- Dartmouth College Master’s Theses (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Publication Type
Articles 1 - 30 of 104
Full-Text Articles in Computer Engineering
Monitoring And Controlling Temperature Egg Incubator Prototype Based Lora Communication, Mas Aly Afandi, Fadhila Karin Purnomo, Raditya Artha Rochmanto, Sevia Indah Purnama
Monitoring And Controlling Temperature Egg Incubator Prototype Based Lora Communication, Mas Aly Afandi, Fadhila Karin Purnomo, Raditya Artha Rochmanto, Sevia Indah Purnama
Elinvo (Electronics, Informatics, and Vocational Education)
Poultry industries encounter problem in produce day old chicken (DOC). Poultry industries usually produce DOC using egg incubator. Egg incubator must have high accuracy in reading environment temperature inside the machine. The temperature environment inside the egg incubator machine needs to keep in range 36°C - 40°C. On the other hand, hatcheries and chicken coop usually not in one place. Poultry industries require applied technology to solve this problem. This problem can be solved by using internet of things. But internet of things can be so expensive. This research is aim to implement monitoring and controlling temperature inside egg incubator …
Performance Analysis Of The Energy Harvesting Techniques In Cooperative Communication Systems Of Nbiot Devices With Amplify And Forward (Af) Relaying Protocol, Ines Sastre Umayya, Muhamad Milchan, Hendy Briantoro, Yoedy Moegiharto
Performance Analysis Of The Energy Harvesting Techniques In Cooperative Communication Systems Of Nbiot Devices With Amplify And Forward (Af) Relaying Protocol, Ines Sastre Umayya, Muhamad Milchan, Hendy Briantoro, Yoedy Moegiharto
Elinvo (Electronics, Informatics, and Vocational Education)
This study examines the system's performance with implementation of the energy harvesting (EH) techniques at source node, S and relay node, R. The RF signals which are used to energy harvesting proccess are broadcasted by destination node, D. The information signals from S are sent to D via a R in a cooperative communication framework. The R uses the amplify and forward (AF) protocol to forward the received signal from S to D. We propose a network system which contain of three femto cells, and an access point of each femto cells work as a relay (R), in a macro …
Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico De Luca
Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico De Luca
Human-Machine Communication
Mainly, the scholarly debate on Alexa has focused on sexist/anti-woman gender representations in the everyday life of many families, on a cluster of themes such as privacy, insecurity, and trust, and on the world of education and health. This paper takes another stance and explores via online survey methodology how university student respondents in two countries (the United States, n = 333; and Italy, n = 322) perceive Alexa’s image and gender, what they expect from this voice-based assistant, and how they would like Alexa to be. Results of a free association exercise showed that Alexa’s image was scarcely embodied …
Digital Platform To Aid Youth Substance Abuse Prevention, Bingxuan Li
Digital Platform To Aid Youth Substance Abuse Prevention, Bingxuan Li
Discovery Undergraduate Interdisciplinary Research Internship
Through research and interviews, I discovered that a significant portion of students in Africa become drug addicts and drop out of school. The solution is to prevent youth substance abuse before it happens, so that more students in Africa may continue their education. With the strong motivation of expanding African student involvement in higher education, I participated DURI program to increase higher education rates in the Democratic Republic of the Congo, Africa. The local government is establishing rehabilitation centers to monitor at-risk students and prevent youth substance abuse, but due to extremely limited resources, it is critical to evaluate the …
A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan
A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan
Cybersecurity Undergraduate Research Showcase
Since the 1980’s and creation of the World Wide Web, Internet utilization is a common and arguably, necessary, part of daily life. The internet is young and still relatively new, but as of 2016, 3.4 billion people were online, and that number has since grown [1]. This is a significant number, but as such a common part of daily life, how elements of the internet or its infrastructure work is complex. The world would very likely be thrown into dark ages if DNS or any other significant aspect of the internet's infrastructure were to succumb to an attack. The Colonial …
Effective Short Text Classification Via The Fusion Of Hybrid Features For Iot Social Data, Xiong Luo, Zhijian Yu, Zhigang Zhao, Wenbing Zhao, Jenq-Haur Wang
Effective Short Text Classification Via The Fusion Of Hybrid Features For Iot Social Data, Xiong Luo, Zhijian Yu, Zhigang Zhao, Wenbing Zhao, Jenq-Haur Wang
Electrical and Computer Engineering Faculty Publications
Nowadays short texts can be widely found in various social data in relation to the 5G-enabled Internet of Things (IoT). Short text classification is a challenging task due to its sparsity and the lack of context. Previous studies mainly tackle these problems by enhancing the semantic information or the statistical information individually. However, the improvement achieved by a single type of information is limited, while fusing various information may help to improve the classification accuracy more effectively. To fuse various information for short text classification, this article proposes a feature fusion method that integrates the statistical feature and the comprehensive …
Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-Chi Feng, Feng Liu
Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-Chi Feng, Feng Liu
Computer Science Faculty Publications and Presentations
Video data is ubiquitous; capturing, transferring, and storing even compressed video data is challenging because it requires substantial resources. With the large amount of video traffic being transmitted on the internet, any improvement in compressing such data, even small, can drastically impact resource consumption. In this paper, we present a hybrid video compression framework that unites the advantages of both DCT-based and interpolation-based video compression methods in a single framework. We show that our work can deliver the same visual quality or, in some cases, improve visual quality while reducing the bandwidth by 10--20%.
Instructional Systems Design And The Diffusion And Adoption Of Technology: (Volume 1), Miguel Ramlatchan (Author & Editor), Mark Parsons (Author), Meghan Soldani (Author), Josie Joswick Mendoza (Author), Maria Satre (Author), Brittany Spitz (Author), Jasmine Bundy (Author), Amanda Kline (Author)
Instructional Systems Design And The Diffusion And Adoption Of Technology: (Volume 1), Miguel Ramlatchan (Author & Editor), Mark Parsons (Author), Meghan Soldani (Author), Josie Joswick Mendoza (Author), Maria Satre (Author), Brittany Spitz (Author), Jasmine Bundy (Author), Amanda Kline (Author)
Distance Learning Faculty & Staff Books
Instructional designers, instructional systems designers, and other educational technologists are, by their nature, innovators. These professionals apply and extend the applied science of learning, systems, communication, and instructional design theory to help students learn. Technology in some capacity is used to make the connections between subject matter experts, teachers, instructors, and their learners. It is common for instructional designers to seek new tools, techniques, and innovations for the improvement of learning, access, quality, and student satisfaction. However, the adoption and diffusion of new educational technology and innovation is a complex process that depends on many variables. Understanding these processes and …
Daylight-Artificial Light Integrated System With The Camera As The Sensor And Wireless Sensor Actuator Networked (Wsan) System, Susan G. Varghese Dr.
Daylight-Artificial Light Integrated System With The Camera As The Sensor And Wireless Sensor Actuator Networked (Wsan) System, Susan G. Varghese Dr.
Technical Collection
Image based wireless sensor actuator network-based daylight artificial light control scheme is developed. Now the work is progressing by incorporating Internet of Things. The work is under lighting control technology and applications.
Present work is based on IoT based lighting and venetian blind automation for smart building:-
- Design low power wireless sensor network for an IoT based smart lighting
- Model-based control strategy implementation for optimized visual comfort, thermal comfort, energy efficiency and Circadian Entrainment suitable for operating with IoT sensors and actuators.
- Sensor Integration and algorithm formulation for remote monitoring and control of building parameters for smart lighting
Research focuses …
Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon
Applications Of Blockchain In Business Processes: A Comprehensive Review, Wattana Viriyasitavat, Li Xu, Dusit Niyato, Zhuming Bi, Danupol Hoonsopon
Information Technology & Decision Sciences Faculty Publications
Blockchain (BC), as an emerging technology, is revolutionizing Business Process Management (BPM) in multiple ways. The main adoption is to serve as a trusted infrastructure to guarantee the trust of collaborations among multiple partners in trustless environments. Especially, BC enables trust of information by using Distributed Ledger Technology (DLT). With the power of smart contracts, BC enforces the obligations of counterparties that transact in a business process (BP) by programming the contracts as transactions. This paper aims to study the state-of-the-art of BC technologies by (1) exploring its applications in BPM with the focus on how BC provides the trust …
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
Device Free Indoor Localization Of Human Target Using Wifi Fingerprinting, Prasanga Neupane
LSU Master's Theses
Indoor localization of human objects has many important applications nowadays. Proposed here is a new device free approach where all the transceiver devices are fixed in an indoor environment so that the human target doesn't need to carry any transceiver device with them. This work proposes radio-frequency fingerprinting for the localization of human targets which makes this even more convenient as radio-frequency wireless signals can be easily acquired using an existing wireless network in an indoor environment. This work explores different avenues for optimal and effective placement of transmitter devices for better localization. In this work, an experimental environment is …
Rural Broadband Usage: Analyzing Satisfaction And Internet Speed Within The Rural Digital Divide, Angela Hollman, Tim Obermier, Jesse Andrews
Rural Broadband Usage: Analyzing Satisfaction And Internet Speed Within The Rural Digital Divide, Angela Hollman, Tim Obermier, Jesse Andrews
Mountain Plains Business Conference
No abstract provided.
Performance Analytics Of Cloud Networks, Derek Phanekham
Performance Analytics Of Cloud Networks, Derek Phanekham
Computer Science and Engineering Theses and Dissertations
As the world becomes more inter-connected and dependent on the Internet, networks become ever more pervasive, and the stresses placed upon them more demanding. Similarly, the expectations of networks to maintain a high level of performance have also increased. Network performance is highly important to any business that operates online, depends on web traffic, runs any part of their infrastructure in a cloud environment, or even hosts their own network infrastructure. Depending upon the exact nature of a network, whether it be local or wide-area, 10 or 100 Gigabit, it will have distinct performance characteristics and it is important for …
Machine Learning And Artificial Intelligence Methods For Cybersecurity Data Within The Aviation Ecosystem, Anna Baron Garcia
Machine Learning And Artificial Intelligence Methods For Cybersecurity Data Within The Aviation Ecosystem, Anna Baron Garcia
Doctoral Dissertations and Master's Theses
Aviation cybersecurity research has proven to be a complex topic due to the intricate nature of the aviation ecosystem. Over the last two decades, research has been centered on isolated modules of the entire aviation systems, and it has lacked the state-of-the-art tools (e.g. ML/AI methods) that other cybersecurity disciplines have leveraged in their fields. Security research in aviation in the last two decades has mainly focused on: (i) reverse engineering avionics and software certification; (ii) communications due to the rising new technologies of Software Defined Radios (SDRs); (iii) networking cybersecurity concerns such as the inter and intra connections of …
Quantifying Dds-Cerberus Network Control Overhead, Andrew T. Park, Nathaniel R. Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry
Quantifying Dds-Cerberus Network Control Overhead, Andrew T. Park, Nathaniel R. Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry
Faculty Publications
Securing distributed device communication is critical because the private industry and the military depend on these resources. One area that adversaries target is the middleware, which is the medium that connects different systems. This paper evaluates a novel security layer, DDS-Cerberus (DDS-C), that protects in-transit data and improves communication efficiency on data-first distribution systems. This research contributes a distributed robotics operating system testbed and designs a multifactorial performance-based experiment to evaluate DDS-C efficiency and security by assessing total packet traffic generated in a robotics network. The performance experiment follows a 2:1 publisher to subscriber node ratio, varying the number of …
Coded Matrix Multiplication, Xiaodi Fan
Coded Matrix Multiplication, Xiaodi Fan
Dissertations, Theses, and Capstone Projects
Matrix multiplication is a fundamental building block in many machine learning models. As the input matrices may be too large to be multiplied on a single server, it is common to split input matrices into multiple sub-matrices and execute the multiplications on different servers. However, in a distributed infrastructure, it is common to observe stragglers whose performance is significantly lower than other servers at some time. Compared to replicating each task on multiple servers, coded matrix multiplication, i.e., a combination of coding theoretic techniques and distributed matrix multiplication, can tolerate the same number of stragglers with much fewer servers. The …
Nudging Social Online Referrals: Evidence From A Randomized Field Experiment, Qian Zeng
Nudging Social Online Referrals: Evidence From A Randomized Field Experiment, Qian Zeng
Dissertations and Theses Collection (Open Access)
With the rise of social commerce platforms and customer engagement in online products and services, firms are focusing their attention on effective social online referral program to encourage customers’ online referral behaviors to grow their customer base. Hence, how to influence customers to participate in online referral is a matter of the utmost importance to firms. However, little empirical research has examined the impact of online referral program on customers’ online referral on social commerce platform. To close this research gap, this dissertation investigates the effectiveness of digital nudging for consumers’ social online referral on social commerce platforms.
Working with …
Efficient Discovery And Utilization Of Radio Information In Ultra-Dense Heterogeneous 3d Wireless Networks, Mattaka Gamage Samantha Sriyananda
Efficient Discovery And Utilization Of Radio Information In Ultra-Dense Heterogeneous 3d Wireless Networks, Mattaka Gamage Samantha Sriyananda
Electronic Thesis and Dissertation Repository
Emergence of new applications, industrial automation and the explosive boost of smart concepts have led to an environment with rapidly increasing device densification and service diversification. This revolutionary upward trend has led the upcoming 6th-Generation (6G) and beyond communication systems to be globally available communication, computing and intelligent systems seamlessly connecting devices, services and infrastructure facilities. In this kind of environment, scarcity of radio resources would be upshot to an unimaginably high level compelling them to be very efficiently utilized. In this case, timely action is taken to deviate from approximate site-specific 2-Dimensional (2D) network concepts in radio resource utilization …
Introduction To Pub/Sub Systems Using Opcua, Mete Isiksalan
Introduction To Pub/Sub Systems Using Opcua, Mete Isiksalan
Undergraduate Student Research Internships Conference
The purpose of the project was to learn and implement the fundamental basics of OPCUA system architecture using pub/sub systems. The system allows the users to create multiple different publishers and subscribers while accessing data from a local server and a primary HTTP server. The system is designed to be a multi-client and multi-server system to simulate real-life scenarios while having two different sources of generated values to send via sockets in OPCUA protocols, multiple different APIs were used for the clients on how they retrieve data as well.
A Memory-Centric Customizable Domain-Specific Fpga Overlay For Accelerating Machine Learning Applications, Atiyehsadat Panahi
A Memory-Centric Customizable Domain-Specific Fpga Overlay For Accelerating Machine Learning Applications, Atiyehsadat Panahi
Graduate Theses and Dissertations
Low latency inferencing is of paramount importance to a wide range of real time and userfacing Machine Learning (ML) applications. Field Programmable Gate Arrays (FPGAs) offer unique advantages in delivering low latency as well as energy efficient accelertors for low latency inferencing. Unfortunately, creating machine learning accelerators in FPGAs is not easy, requiring the use of vendor specific CAD tools and low level digital and hardware microarchitecture design knowledge that the majority of ML researchers do not possess. The continued refinement of High Level Synthesis (HLS) tools can reduce but not eliminate the need for hardware-specific design knowledge. The designs …
Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt
Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt
Electronic Theses and Dissertations
Vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication enable the sharing, in real time, of vehicular locations and speeds with other vehicles, traffic signals, and traffic control centers. This shared information can help traffic to better traverse intersections, road segments, and congested neighborhoods, thereby reducing travel times, increasing driver safety, generating data for traffic planning, and reducing vehicular pollution. This study, which focuses on vehicular pollution, used an analysis of data from NREL, BTS, and the EPA to determine that the widespread use of V2V-based truck platooning—the convoying of trucks in close proximity to one another so as to reduce air drag …
Securing Information On A Web Application System To Facilitate Online Blood Donation Booking, Hrishitva Patel
Securing Information On A Web Application System To Facilitate Online Blood Donation Booking, Hrishitva Patel
Faculty Publications
Blood donation has saved many lives in the past. According to statistics presented by the American Red Cross, a patient is in need of a blood transfusion every two seconds. There are many benefits that arise from blood donation to both the donor and the blood recipients. With blood donation, cancer patients, people involved in accidents, or those battling diseases that require blood donation have access to enough blood to sustain their survival. There is a need to digitize the blood donation booking to facilitate blood donation across the United States, and ensure patients in need of blood, receive their …
Snap : A Software-Defined & Named-Data Oriented Publish-Subscribe Framework For Emerging Wireless Application Systems, Manveen Kaur
Snap : A Software-Defined & Named-Data Oriented Publish-Subscribe Framework For Emerging Wireless Application Systems, Manveen Kaur
All Dissertations
The evolution of Cyber-Physical Systems (CPSs) has given rise to an emergent class of CPSs defined by ad-hoc wireless connectivity, mobility, and resource constraints in computation, memory, communications, and battery power. These systems are expected to fulfill essential roles in critical infrastructure sectors. Vehicular Ad-Hoc Network (VANET) and a swarm of Unmanned Aerial Vehicles (UAV swarm) are examples of such systems. The significant utility of these systems, coupled with their economic viability, is a crucial indicator of their anticipated growth in the future. Typically, the tasks assigned to these systems have strict Quality-of-Service (QoS) requirements and require sensing, perception, and …
Cyber Deception For Critical Infrastructure Resiliency, Md Ali Reza Al Amin
Cyber Deception For Critical Infrastructure Resiliency, Md Ali Reza Al Amin
Computational Modeling & Simulation Engineering Theses & Dissertations
The high connectivity of modern cyber networks and devices has brought many improvements to the functionality and efficiency of networked systems. Unfortunately, these benefits have come with many new entry points for attackers, making systems much more vulnerable to intrusions. Thus, it is critically important to protect cyber infrastructure against cyber attacks. The static nature of cyber infrastructure leads to adversaries performing reconnaissance activities and identifying potential threats. Threats related to software vulnerabilities can be mitigated upon discovering a vulnerability and-, developing and releasing a patch to remove the vulnerability. Unfortunately, the period between discovering a vulnerability and applying a …
Demonstrating Configuration Of Software Defined Networking In Real Wireless Testbeds, Saish Urumkar, Gianluca Fontanesi, Avishek Nag, Sachin Sharma
Demonstrating Configuration Of Software Defined Networking In Real Wireless Testbeds, Saish Urumkar, Gianluca Fontanesi, Avishek Nag, Sachin Sharma
Conference papers
Currently, several wireless testbeds are available to test networking solutions including Fed4Fire testbeds such as w-ilab. t and CityLab in the EU, and POWDER and COSMOS in the US. In this demonstration, we use the w-ilab.t testbed to set up a wireless ad-hoc Software-Defined Network (SDN). OpenFlow is used as an SDN protocol and is deployed using a grid wireless ad-hoc topology in w-ilab.t. In this paper, we demonstrate: (1) the configuration of a wireless ad-hoc network based on w-ilab.t and (2) the automatic deployment of OpenFlow in an ad-hoc wireless network where some wireless nodes are not directly connected …
Experimenting An Edge-Cloud Computing Model On The Gpulab Fed4fire Testbed, Vikas Tomer, Sachin Sharma
Experimenting An Edge-Cloud Computing Model On The Gpulab Fed4fire Testbed, Vikas Tomer, Sachin Sharma
Conference papers
There are various open testbeds available for testing algorithms and prototypes, including the Fed4Fire testbeds. This demo paper illustrates how the GPULAB Fed4Fire testbed can be used to test an edge-cloud model that employs an ensemble machine learning algorithm for detecting attacks on the Internet of Things (IoT). We compare experimentation times and other performance metrics of our model based on different characteristics of the testbed, such as GPU model, CPU speed, and memory. Our goal is to demonstrate how an edge-computing model can be run on the GPULab testbed. Results indicate that this use case can be deployed seamlessly …
The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan
The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan
Distance Learning Faculty & Staff Books
The message design and human performance technology in video games, especially early video games have always been fascinating to me. From an instructional design perspective, the capabilities of the technology of the classic game consoles required a careful balance of achievable objectives, cognitive task analysis, guided problem solving, and message design. Raiders on the Atari is an excellent example of this balance. It is an epic adventure game, spanning 13+ distinct areas, with an inventory of items, where those hard to find items had to be used by the player to solve problems during their quest (and who would have …
Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Future Computing and Informatics Journal
This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today's banking sector is fraud detection. Fraud is one of the most serious concerns in terms of monetary …
A General And Practical Framework For Realization Of Sdn-Based Vehicular Networks, Juan V. Leon
A General And Practical Framework For Realization Of Sdn-Based Vehicular Networks, Juan V. Leon
FIU Electronic Theses and Dissertations
With the recent developments of communication technologies surrounding vehicles, we witness the simultaneous availability of multiple onboard communication interfaces on vehicles. While most of the current interfaces already include Bluetooth, WiFi, and LTE, they are augmented further by IEEE 802.11p and the 5G interfaces, which will serve for safety, maintenance, and infotainment applications. However, dynamic management of interfaces depending on application needs becomes a significant issue that can be best addressed by Software Defined Networking (SDN) capabilities. While SDN-based vehicular networks have been promoted previously, none of these works deal with practical challenges. In this thesis, we propose and develop …
Honeypot-Based Security Enhancements For Information Systems, Javier R. Franco
Honeypot-Based Security Enhancements For Information Systems, Javier R. Franco
FIU Electronic Theses and Dissertations
The purpose of this thesis is to explore honeypot-based security enhancements for information systems. First, we provide a comprehensive survey of the research that has been carried out on honeypots and honeynets for Internet of Things (IoT), Industrial Internet of Things (IIoT), and Cyber-physical Systems (CPS). We provide a taxonomy and extensive analysis of the existing honeypots and honeynets, state key design factors for the state-of-the-art honeypot/honeynet research and outline open issues. Second, we propose S-Pot, a smart honeypot framework based on open-source resources. S-Pot uses enterprise and IoT honeypots to attract attackers, learns from attacks via ML classifiers, and …