Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Computer Engineering

Data For Ai In Network Systems Workshop Report, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich Oct 2023

Data For Ai In Network Systems Workshop Report, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich

Workshop on Data for AI in Network Systems

No abstract provided.


Workshop On Data For Ai In Network Systems - Event Summary, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich Oct 2023

Workshop On Data For Ai In Network Systems - Event Summary, Kuang-Ching Wang, Ron Hutchins, Anita Nikolich

Workshop on Data for AI in Network Systems

No abstract provided.


Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild Apr 2023

Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild

Symposium of Student Scholars

The research project aims to find ways to detect malicious packets inside encrypted network traffic. In addition to this goal maintaining user privacy is a priority. As encryption has become less expensive to implement more and more network traffic is encrypted. Currently, 90% of all network traffic is encrypted, and this trend is expected to increase. The creators of malware areemploying various methods to ensure delivery of their malware, including encryption. One proposed method to combat this suggests implementing machine learning with various algorithms to analyze packet attributes to determine if they contain malware, without actually knowing what's inside …


Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers Apr 2023

Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers

Cybersecurity Undergraduate Research Showcase

This research paper answers the question, “What is Ransomware, and How to prevent it?”. This paper will discuss what ransomware is, its history about ransomware, how ransomware attacks Windows systems, how to prevent ransomware, how to handle ransomware once it is already on the network, ideas for training professionals to avoid ransomware, and how anti-virus helps defend against ransomware. Many different articles, case studies, and professional blogs will be used to complete the research on this topic.


Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng Apr 2023

Leveraging Artificial Intelligence And Machine Learning For Enhanced Cybersecurity: A Proposal To Defeat Malware, Emmanuel Boateng

Cybersecurity Undergraduate Research Showcase

Cybersecurity is very crucial in the digital age in order to safeguard the availability, confidentiality, and integrity of data and systems. Mitigation techniques used in the industry include Multi-factor Authentication (MFA), Incident Response Planning (IRP), Security Information and Event Management (SIEM), and Signature-based and Heuristic Detection.

MFA is employed as an additional layer of protection in several sectors to help prevent unauthorized access to sensitive data. IRP is a plan in place to address cybersecurity problems efficiently and expeditiously. SIEM offers real-time analysis and alerts the system of threats and vulnerabilities. Heuristic-based detection relies on detecting anomalies when it comes …


The Rise And Risks Of Internet Of Things, Diamond E. Hicks Mar 2023

The Rise And Risks Of Internet Of Things, Diamond E. Hicks

Cybersecurity Undergraduate Research Showcase

Internet of Things (IoT) has become a necessary part of our everyday lives. IoT is the network in which many different devices communicate, connect, and share data. Though how IoT got to where it is today, the issues it faced, and how it affects our lives today is not common knowledge. Despite the fact that IoT has advanced our technology to what it is today, people do not completely understand what it does.


Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden Jan 2023

Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden

National Training Aircraft Symposium (NTAS)

An increased availability of data and computing power has allowed organizations to apply machine learning techniques to various fleet monitoring activities. Additionally, our ability to acquire aircraft data has increased due to the miniaturization of small form factor computing machines. Aircraft data collection processes contain many data features in the form of multivariate time-series (continuous, discrete, categorical, etc.) which can be used to train machine learning models. Yet, three major challenges still face many flight organizations 1) integration and automation of data collection frameworks, 2) data cleanup and preparation, and 3) embedded machine learning framework. Data cleanup and preparation has …


Disaster Area Lora Mesh Communications, Joel Bulkley Jan 2023

Disaster Area Lora Mesh Communications, Joel Bulkley

Posters-at-the-Capitol

In the aftermath of the December 2021 tornado disaster that swept through Western Kentucky causing 57 fatalities, 500+ critical injuries, and millions of dollars’ worth in damages, one of the first things that became apparent was the lack of communications and underlying power infrastructure. The goal of this project is to create a highly resilient LoRa mesh communications network utilizing low power, low cost, and easy to deploy radios to enable first responders in a disaster area to communicate their location and send critical information in a situation where traditional communications infrastructure has been destroyed or is otherwise unavailable. Through …


Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes Jan 2023

Developing A Web-Based System For Remote Collection And Analysis Of Vehicle Electrical Systems Over Canbus Using Carloop, Joshua N. Valle, Alex Columna-Fuentes

Capstone Showcase

Our program collects vehicle data using an OBD-II device called Carloop that is plugged into the vehicle's diagnostic port. The device executes our code which then communicates with the vehicle's onboard computer to collect data such as engine RPM, vehicle speed, fuel level, and other diagnostic information. This data is then sent over WiFi to Particle’s Cloud, which is a platform for managing IoT devices.

Integrations set up on Particle take care of sending data to our InfluxDB Database, which is hosted on our own cloud-based machine. InfluxDB is a high-performance time-series database that is optimized for storing and querying …