Open Access. Powered by Scholars. Published by Universities.®
- Publication
- Publication Type
Articles 1 - 2 of 2
Full-Text Articles in Computer Engineering
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Posters-at-the-Capitol
Title: Securing Edge Computing: A Hierarchical IoT Service Framework
Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.
Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University
Abstract:
Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.
Our secure by design approach prioritizes …
Ransomware Education: Availability, Accessibility, And Ease Of Use, Judson Gager, Judson Gager
Ransomware Education: Availability, Accessibility, And Ease Of Use, Judson Gager, Judson Gager
Honors College Theses
With cybersecurity constantly in the media outlets with breaches, cybercrime, and cyberwarfare, it has become a significant concern for all. One of the most recent breaches in the summer of 2021 was the Colonial Pipeline breach, which has proven the country's reliance on these industrial control systems and networking. The systems were taken for ransom by a new type of ransomware written in a different programming language. Although the Colonial Pipeline breach was quickly addressed, the impact of the gas shortage and the response time were alarming at triaging the breach. However, this attack showed the public how dangerous ransomware …