Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 241 - 270 of 12784

Full-Text Articles in Computer Engineering

Privacy And Security Of The Windows Registry, Edward L. Amoruso Jan 2024

Privacy And Security Of The Windows Registry, Edward L. Amoruso

Graduate Thesis and Dissertation 2023-2024

The Windows registry serves as a valuable resource for both digital forensics experts and security researchers. This information is invaluable for reconstructing a user's activity timeline, aiding forensic investigations, and revealing other sensitive information. Furthermore, this data abundance in the Windows registry can be effortlessly tapped into and compiled to form a comprehensive digital profile of the user. Within this dissertation, we've developed specialized applications to streamline the retrieval and presentation of user activities, culminating in the creation of their digital profile. The first application, named "SeeShells," using the Windows registry shellbags, offers investigators an accessible tool for scrutinizing and …


A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami Jan 2024

A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami

VMASC Publications

Named Data Network (NDN) is proposed for the Internet as an information-centric architecture. Content storing in the router’s cache plays a significant role in NDN. When a router’s cache becomes full, a cache replacement policy determines which content should be discarded for the new content storage. This paper proposes a new cache replacement policy called Discard of Fast Retrievable Content (DFRC). In DFRC, the retrieval time of the content is evaluated using the FIB table information, and the content with less retrieval time receives more discard priority. An impact weight is also used to involve both the grade of retrieval …


Anonymous Attribute-Based Broadcast Encryption With Hidden Multiple Access Structures, Tran Viet Xuan Phuong Jan 2024

Anonymous Attribute-Based Broadcast Encryption With Hidden Multiple Access Structures, Tran Viet Xuan Phuong

School of Cybersecurity Faculty Publications

Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the correct participant but also respects the security of the identity user. In addition, when delivered, all the information must be protected for the party who employs the broadcasting service. Currently, Attribute-Based Broadcast Encryption (ABBE) is useful to apply for the broadcasting service. (ABBE) is a combination of Attribute-Based Encryption (ABE) and Broadcast Encryption (BE), which allows a broadcaster (or encrypter) to broadcast an encrypted message, including a predefined user set and specified access policy to …


Development Of A Collaborative Research Platform For Efficient Data Management And Visualization Of Qubit Control, Devanshu Brahmbhatt Jan 2024

Development Of A Collaborative Research Platform For Efficient Data Management And Visualization Of Qubit Control, Devanshu Brahmbhatt

Computer Science and Engineering Theses

This thesis introduces QubiCSV, a pioneering open-source platform for quantum computing field. With an emphasis on collaborative research, QubiCSV addresses the critical need for specialized data management and visualization tools in qubit control. The platform is crafted to overcome the challenges posed by the high costs and complexities associated with quantum experimental setups. It emphasizes efficient utilization of resources through shared ideas, data, and implementation strategies. One of the primary obstacles in quantum computing research has been the ineffective management of extensive calibration data and the inability to visualize complex quantum experiment outcomes effectively. QubiCSV fills this gap by offering …


Intelligent Millimeter-Wave System For Human Activity Monitoring For Telemedicine, Abdullah K. Alhazmi, Mubarak A. Alanazi, Awwad H. Alshehry, Saleh M. Alshahry, Jennifer Jaszek, Cameron Djukic, Anna Brown, Kurt Jackson, Vamsy P. Chodavarapu Jan 2024

Intelligent Millimeter-Wave System For Human Activity Monitoring For Telemedicine, Abdullah K. Alhazmi, Mubarak A. Alanazi, Awwad H. Alshehry, Saleh M. Alshahry, Jennifer Jaszek, Cameron Djukic, Anna Brown, Kurt Jackson, Vamsy P. Chodavarapu

Electrical and Computer Engineering Faculty Publications

Telemedicine has the potential to improve access and delivery of healthcare to diverse and aging populations. Recent advances in technology allow for remote monitoring of physiological measures such as heart rate, oxygen saturation, blood glucose, and blood pressure. However, the ability to accurately detect falls and monitor physical activity remotely without invading privacy or remembering to wear a costly device remains an ongoing concern. Our proposed system utilizes a millimeter-wave (mmwave) radar sensor (IWR6843ISK-ODS) connected to an NVIDIA Jetson Nano board for continuous monitoring of human activity. We developed a PointNet neural network for real-time human activity monitoring that can …


Methods That Support The Validation Of Agent-Based Models: An Overview And Discussion, Andrew Collins, Matthew Koehler, Christopher Lynch Jan 2024

Methods That Support The Validation Of Agent-Based Models: An Overview And Discussion, Andrew Collins, Matthew Koehler, Christopher Lynch

Engineering Management & Systems Engineering Faculty Publications

Validation is the process of determining if a model adequately represents the system under study for the model’s intended purpose. Validation is a critical component in building the credibility of a simulation model with its end-users. Effectively conducting validation can be a daunting task for both novice and experienced simulation developers. Further compounding the difficult task of conducting validation is that there is no universally accepted approach for assessing a simulation. These challenges are particularly relevant to the paradigm of Agent-Based Modeling and Simulation (ABMS) because of the complexity found in these models’ mechanisms and in the real-world situations they …


Multimodal Fusion For Audio-Image And Video Action Recognition, Muhammad B. Shaikh, Douglas Chai, Syed M. S. Islam, Naveed Akhtar Jan 2024

Multimodal Fusion For Audio-Image And Video Action Recognition, Muhammad B. Shaikh, Douglas Chai, Syed M. S. Islam, Naveed Akhtar

Research outputs 2022 to 2026

Multimodal Human Action Recognition (MHAR) is an important research topic in computer vision and event recognition fields. In this work, we address the problem of MHAR by developing a novel audio-image and video fusion-based deep learning framework that we call Multimodal Audio-Image and Video Action Recognizer (MAiVAR). We extract temporal information using image representations of audio signals and spatial information from video modality with the help of Convolutional Neutral Networks (CNN)-based feature extractors and fuse these features to recognize respective action classes. We apply a high-level weights assignment algorithm for improving audio-visual interaction and convergence. This proposed fusion-based framework utilizes …


Expanding Australia's Defence Capabilities For Technological Asymmetric Advantage In Information, Cyber And Space In The Context Of Accelerating Regional Military Modernisation: A Systemic Design Approach, Pi-Shen Seet, Anton Klarin, Janice Jones, Michael N. Johnstone, Violetta Wilk, Stephanie Meek, Summer O'Brien Jan 2024

Expanding Australia's Defence Capabilities For Technological Asymmetric Advantage In Information, Cyber And Space In The Context Of Accelerating Regional Military Modernisation: A Systemic Design Approach, Pi-Shen Seet, Anton Klarin, Janice Jones, Michael N. Johnstone, Violetta Wilk, Stephanie Meek, Summer O'Brien

Research outputs 2022 to 2026

Introduction. The aim of the project was to conduct a systemic design study to evaluate Australia'sopportunities and barriers for achieving a technological advantage in light of regional military technological advancement. It focussed on the three domains of (1) cybersecurity technology, (2) information technology, and (3) space technology.

Research process. Employing a systemic design approach, the study first leveraged scientometric analysis, utilising informetric mapping software (VOSviewer) to evaluate emerging trends and their implications on defence capabilities. This approach facilitated a broader understanding of the interdisciplinary nature of defence technologies, identifying key areas for further exploration. The subsequent survey study, engaging 828 …


Reliable Emergency Rescue Model Of Uavs Based On Blockchain, Mengyao Du, Kai Xu, Miao Zhang, Xiang Fu, Quanjun Yin Dec 2023

Reliable Emergency Rescue Model Of Uavs Based On Blockchain, Mengyao Du, Kai Xu, Miao Zhang, Xiang Fu, Quanjun Yin

Journal of System Simulation

Abstract: Natural disasters may unpredictably disrupt ground communication infrastructure and transportation systems, and UAVs emergency response can deal with such uncertainties and highly dynamic scenarios. Aiming at the robustness requirements of decentralized rescue systems. UAV emergency rescue chain (UERChain) based on blockchain technology is proposed. By deploying UAV backbone nodes within a layered local network, the smart contracts for managing reputation considering UAV social relationships are designed. The blockchain is employed as a trust mechanism to realize the trustworthy interactions among distributed UAVs. Experimental results show that, UERChain has higher robustness, and within controllable resource constraints, the reputation management and …


Automatic Target Recognition Of Substation 3d Scene For Digital Twin, Qian Tu, Jun Li, Dongliang Fan, Qi Kong, Jie Shen Dec 2023

Automatic Target Recognition Of Substation 3d Scene For Digital Twin, Qian Tu, Jun Li, Dongliang Fan, Qi Kong, Jie Shen

Journal of System Simulation

Abstract: In order to improve the accuracy of automatic target recognition and promote the effect on substation operation and maintenance, automatic target recognition of substation 3D scene for digital twin is proposed. The automatic target recognition model for the three dimensional scene of the substation is constructed. The perception module of the model is used to collect the real-time status data of substation, and the communication module is used to transmit the data to digital twin modules. This module, based on the received data information, realizes the deep fusion and panoramic mapping of substation information through the knowledge base constructed …


Urban Uav Path Planning Based On Improved Beetle Search Algorithm, Qingqing Yang, Minyi Deng, Yi Peng Dec 2023

Urban Uav Path Planning Based On Improved Beetle Search Algorithm, Qingqing Yang, Minyi Deng, Yi Peng

Journal of System Simulation

Abstract: An improved SABAS is proposed to improve the safety and path smoothing of UAV missions in urban multi-obstacle environments and to obtain the shortest path. The algorithm no longer completely depends on the difference of odor concentration between the left and the right tentacles of beetle when exploring the path for position update. Instead, it makes full use of the strong searching ability of BAS algorithm, and introduces the annealing algorithm to add the neighborhood position solution of the next position, and finally selects the next best position from the neighborhood position solution. Metropolis criterion of annealing algorithm is …


Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia Dec 2023

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia

Journal of Nonprofit Innovation

Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.

Imagine Doris, who is …


Optimized Scheduling Of Distribution Network With Distributed Generation Based On Coronavirus Herd Immunity Optimizer Algorithm, Xiaomeng Wu, Rongze Yuan, Yingliang Li, Qi Zhu Dec 2023

Optimized Scheduling Of Distribution Network With Distributed Generation Based On Coronavirus Herd Immunity Optimizer Algorithm, Xiaomeng Wu, Rongze Yuan, Yingliang Li, Qi Zhu

Journal of System Simulation

Abstract: Following the large-scale entry of distributed new energy into the network, the uncertainty factor of the distribution network increases significantly, and the difficulty of reactive power optimization scheduling increases accordingly. Traditional optimization solutions have many limitations and shortcomings, and a dynamic reactive power optimization scheme for active distribution networks based on a multi-scenario approach is proposed. The mathematical modeling is carried out separately for the uncertainty of new energy and load, and the multi-scenario method is used to transform the uncertainty problem into a deterministic problem. A mathematical model is constructed on the distribution network side to pursue the …


Research On Network Public Opinion Propagation Model Of Major Epidemics Under Cross-Infection Of Double Emotions, Yaming Zhang, Yanyuan Su, Guiru Zhao, Xiaoyu Guo Dec 2023

Research On Network Public Opinion Propagation Model Of Major Epidemics Under Cross-Infection Of Double Emotions, Yaming Zhang, Yanyuan Su, Guiru Zhao, Xiaoyu Guo

Journal of System Simulation

Abstract: Major epidemics provoke a variety of netizens' emotions. To some degree, the interaction of netizens' intense emotions determine the development direction of public opinion. Considering the complexity and dual emotional contagion, the impact of emotional factors in network public opinion is quantified to three dimensions indicators, emotional enhancement, differences and conversion rates. SIPINR public opinion propagation model is constructed. The equilibrium points and the transmission threshold are estimated and the stability is proved. The law of network public opinion propagation during major epidemics is revealed through numerical simulation. The results show that the dual emotional contagion would lead to …


Development Of Several Typical Virtual Reality Fusion Technologies, Qiqi Feng, Zhiming Dong, Wencheng Peng, Yi Dai, Bingshan Si Dec 2023

Development Of Several Typical Virtual Reality Fusion Technologies, Qiqi Feng, Zhiming Dong, Wencheng Peng, Yi Dai, Bingshan Si

Journal of System Simulation

Abstract: Virtual reality fusion can realize the two-way interaction, mapping and linkage between virtual world and physical world, which attracts the attention of countries in the world. In order to sort out and make statistics on concept connotation, academic status and application of the related new technologies, digital twin, cyber-physical systems, metaverse and live-virtual-constructive simulation are taken as representatives. The comparison on the development process, functional characteristics, target trends, etc. is carried out.


Task Scheduling For Internet Of Vehicles Based On Deep Reinforcement Learning In Edge Computing, Xiang Ju, Shengchao Su, Chaojie Xu, Beibei He Dec 2023

Task Scheduling For Internet Of Vehicles Based On Deep Reinforcement Learning In Edge Computing, Xiang Ju, Shengchao Su, Chaojie Xu, Beibei He

Journal of System Simulation

Abstract: Aiming at the offloading and execution of delay-constrained computing tasks for internet of vehicles in edge computing, a task scheduling method based on deep reinforcement learning is proposed. In multi-edge server scenario, a software-defined network-aided internet of vehicles task offloading system is built. On this basis, the task scheduling model of vehicle computation offloading is given. According to the characteristics of task scheduling, a scheduling method based on an improved pointer network is designed. Considering the complexity of task scheduling and computing resource allocation, the deep reinforcement learning algorithm is used to train the pointer network. The vehicle offloading …


Application Of Improved Path Tracking Algorithm In Robot Slam, Qian Li, Ye Tao, Hui Li Dec 2023

Application Of Improved Path Tracking Algorithm In Robot Slam, Qian Li, Ye Tao, Hui Li

Journal of System Simulation

Abstract: Mapping is an important part of automated logistics. At present, SLAM is widely used. However, in large-scale scenes, errors are accumulated because robots often repeatedly measure and scan the region edge, which makes it impossible to quickly build a high-precision and complete map. An autonomous mapping method based on auxiliary path tracking is proposed, in which the given initial sketch is grid denoised and the auxiliary path is fitted and improved by multi segment cubic polynomial. The improved pure pursuit algorithm is used to guide the robot to build the map and improve the total distance and time of …


Unrelated Parallel Machine Scheduling With Additional Resource And Learning Effect, Youlian Zheng, Deming Lei Dec 2023

Unrelated Parallel Machine Scheduling With Additional Resource And Learning Effect, Youlian Zheng, Deming Lei

Journal of System Simulation

Abstract: To solve unrelated parallel machine scheduling problem(UPMSP) with additional resource and learning effect, a dynamical artificial bee colony(DABC) algorithm is proposed to minimize the makespan. A new representation and decoding process is given and two initial bee swarms are constructed. A swarm evaluation method is applied to dynamically decide employed bee swarms and onlooker bee swarms. Employed bee phase and onlooker bee phase are implemented in different ways to increase exploration ability. The experimental results show that the new strategies of DABC are effective and reasonable, and can obtain results with better convergence, average value and stability, which d …


Research And Development Of Simulation Training Platform For Multi-Agent Collaborative Decision-Making, Cheng Cheng, Zhijie Chen, Ziming Guo, Ni Li Dec 2023

Research And Development Of Simulation Training Platform For Multi-Agent Collaborative Decision-Making, Cheng Cheng, Zhijie Chen, Ziming Guo, Ni Li

Journal of System Simulation

Abstract: Reinforcement learning simulation platform can be an interactive and training environment for reinforcement learning. In order to make the simulation platform compatible with the multi-agent reinforcement learning algorithms and meet the needs of simulation in military field, the similar processes in multi-agent reinforcement learning algorithms are refined and a unified interface is designed to embed and verify different types of deep reinforcement learning algorithms on the simulation platform and to optimize the back-end service of the simulation platform to accelerate the training process of the algorithm model. The experimental results show that, by unifing the interface, the simulation platform …


Data Simulation Testing Framework For Complex Process Equipment Software, Jinkun Zhang, Longfei Shi, Chi Hu, Hao Zhang, Yonghui Yang Dec 2023

Data Simulation Testing Framework For Complex Process Equipment Software, Jinkun Zhang, Longfei Shi, Chi Hu, Hao Zhang, Yonghui Yang

Journal of System Simulation

Abstract: Due to the complex task, tight coupling, strict timing, and a large amount of interchange data, the technical threshold of automated testing of bus communication equipment software is high, and the implementation is difficult. The ideas of data-driven testing and keyword-driven testing are introduced, and a data simulation testing framework is proposed. Configuration rules are formulated and implemented in the framework. Testers can simulate peripheral data for complex process equipment software and implement automated testing by only focusing on the task analysis, and configuring interchange data and keywords. There is no need to develop test scripts, which reduces the …


Airport Operational Efficiency Evaluation Based On Combined Weighting-Topsis Model, Jie Hu, Fan Bao Dec 2023

Airport Operational Efficiency Evaluation Based On Combined Weighting-Topsis Model, Jie Hu, Fan Bao

Journal of System Simulation

Abstract: In order to improve the scientificity and comprehensiveness of the airport operational efficiency evaluation, a new method based on the combined weighting-TOPSIS model is proposed. From 4 dimensions of stand operational efficiency, passenger boarding efficiency, aircraft taxiing efficiency, and coordination efficiency, a new airport operational efficiency evaluation system consisting of 11 indicators, such as flight approach rate, corridor bridge turnover rate, stand change ratio, etc., are constructed. G1 method and entropy weight method are implemented respectively to calculate the subjective and objective weights of the evaluation indicators, and the combined weights are calculated by minimizing the deviation of subjective …


Simulation On High-Speed Train Carriage Evacuation Considering Passengers Moving To Adjacent Carriages, Zuoan Hu, Tian Zeng, Yidong Wei, Yi Ma Dec 2023

Simulation On High-Speed Train Carriage Evacuation Considering Passengers Moving To Adjacent Carriages, Zuoan Hu, Tian Zeng, Yidong Wei, Yi Ma

Journal of System Simulation

Abstract: To study the influence of passengers moving to adjacent carriages on high-speed train carriages' evacuation, a cellular automata model considering export selection is established. Taking the CR400BF second-class carriage as the research object, some analytical indexes such as evacuation efficiency, number of conflicts and the congestion degree are used to study the effect of passengers moving to adjacent carriages on carriage evacuation, and the passenger seat distribution, the number of passengers transferred from adjacent carriages and the opening door modes of adjacent carriages are discussed. The simulation results show that the discretized seat distribution reduces the times of conflicts …


Research And Design Of Etc Simulation Platform For Expressway, Fumin Zou, Feng Guo, Sijie Luo, Lüchao Liao, Nan Li, Yue Xing Dec 2023

Research And Design Of Etc Simulation Platform For Expressway, Fumin Zou, Feng Guo, Sijie Luo, Lüchao Liao, Nan Li, Yue Xing

Journal of System Simulation

Abstract: It is difficult to quantitatively calculate and display the real-time traffic situation of expressway ETC system, and there is no simulation system for ETC to optimize the operating situation. A simulation system based on ETC data in proposed, in witch there are three key algorithms. ETC data feature extraction algorithm provides the feature of generating simulation data for the simulation platform. The improved multitask scheduling algorithm has the computing ability of multitasks in simulation environment. The algorithm of expressway traffic flow control strategy provides the decision index for traffic flow control on the way. The experimental results show that …


Research On Digital Twin Data Modeling And Evaluation Method Of Automated Container Terminal, Guoxuan Xu, Daofang Chang, Jiaqi Li, Qiang Ling Dec 2023

Research On Digital Twin Data Modeling And Evaluation Method Of Automated Container Terminal, Guoxuan Xu, Daofang Chang, Jiaqi Li, Qiang Ling

Journal of System Simulation

Abstract: To make full use of the massive operation data of automated container terminals and further realize the digital and intelligent transformation of terminals driven by digital twin, a method for digital twin data modeling and effect verification and evaluation of automated container terminals is proposed. The application framework and operation mechanism based on digital twin are studied. Based on the data processing logic of digital twin framework, a method of terminal operation process evolution and dynamic data modeling based on digital twin is proposed. To verify whether the data could meet the effective operation of the digital twin, a …


Modeling And Simulation On Production Logistics Of Intelligent Workshop Manufacturing System Based On Efsm, Liuzhen Li, Chao Jin, Tingyu Lin, Yaoqin Zhu Dec 2023

Modeling And Simulation On Production Logistics Of Intelligent Workshop Manufacturing System Based On Efsm, Liuzhen Li, Chao Jin, Tingyu Lin, Yaoqin Zhu

Journal of System Simulation

Abstract: The production logistics mode of manufacturing industry is developing rapidly, on which the modeling and simulation can provide the decision support for the design, analysis and transformation of manufacturing system. A description of the entity elements in intelligent workshop manufacturing system is given according to the classification of "human machine material environment rule". A production and logistics componentized EFSM model is created on the basis of EFSM and componentized modeling ideas. The modeling process for multi-job production in smart shop and the component model instantiation methodology are elaborated. The simulation running through the automatic conversion of EFSM-DEVS model and …


Research On 3d Object Detection Method With Cross-Module Attention, Renjie Xu, Xiaoming Zhang, Chen Wang, Peng Wu Dec 2023

Research On 3d Object Detection Method With Cross-Module Attention, Renjie Xu, Xiaoming Zhang, Chen Wang, Peng Wu

Journal of System Simulation

Abstract: To address the issue of feature loss that occurs during the extraction and transmission of target features in 3D object detection tasks using point cloud data, this study proposes an object detection method based on cross-module attention. This method incorporates a channel attention module and a spatial attention module to enhance the crucial feature information. Through feature transformation, the features from different stages of the attention module are connected to mitigate the loss of features during the extraction and transmission process. To tackle the problem of inadequate detection performance in target detection networks for objects of different scales, a …


Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances Dec 2023

Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances

AFIT Patents

A method for cyber security monitor includes monitoring a network interface that is input-only configured to surreptitiously and covertly receive bit-level, physical layer communication between networked control and sensor field devices. During a training mode, a baseline distinct native attribute (DNA) fingerprint is generated for each networked field device. During a protection mode, a current DNA fingerprint is generated for each networked field device. The current DNA fingerprint is compared to the baseline DNA fingerprint for each networked field device. In response to detect at least one of RAA and PAA based on a change in the current DNA fingerprint …


Ssl Everywhere: Leveraging Hsms For Enhanced Intra-Domain Security, Yazan Aref Dec 2023

Ssl Everywhere: Leveraging Hsms For Enhanced Intra-Domain Security, Yazan Aref

Electronic Thesis and Dissertation Repository

In a world where digitalization is rapidly advancing, the security and privacy of intra-domain communication within organizations are of critical concern. The imperative to secure communication channels among physical systems has led to the deployment of various security approaches aimed at fortifying networking protocols. However, these approaches have typically been designed to secure protocols individually, lacking a holistic perspective on the broader challenge of intra-domain communication security. This omission raises fundamental concerns about the safety and integrity of intra-domain environments, where all communication occurs within a single domain. As a result, this thesis introduces SSL Everywhere, a comprehensive solution designed …


Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman Dec 2023

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …


Finding Diffs Of Pull Request Commits, Chalinee Karawek, John Businge Dec 2023

Finding Diffs Of Pull Request Commits, Chalinee Karawek, John Businge

Undergraduate Research Symposium Posters

Github is a social network that allows developers' projects to be forked for various uses, such as developing the existing repository or use the code to steer development into a new direction. As more forks are made, the more bugs that can occur due to new pull requests not synchronizing with the upstream repository. PaReco is a clone detection tool by Ramkisoen et al. (Ramkisoen et al. 2022) that identifies the changes inside the files inside a pull request by performing diff on every file. However, in this study, we take a different approach to identifying the changes inside the …