Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Political Science

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 42

Full-Text Articles in Computer Engineering

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia Dec 2023

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia

Journal of Nonprofit Innovation

Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.

Imagine Doris, who is …


Continuity And Change In Saudi Arabia’S Development And Humanitarian Aid, Narayani Sritharan, Ammar A. Malik, Asad Sami Dec 2023

Continuity And Change In Saudi Arabia’S Development And Humanitarian Aid, Narayani Sritharan, Ammar A. Malik, Asad Sami

AidData

This paper delves into the motivations and drivers behind Saudi Arabia’s foreign aid, shedding light on the interplay between geopolitics, religious affinity, and strategic objectives. Drawing on newly released empirical data from the Saudi Aid Platform (SAP) dataset, encompassing 47 years of aid delivery, the study seeks to answer the long-standing debate surrounding the factors shaping Saudi Arabia’s foreign aid decisions. The study focuses on two pivotal periods: the Bosnian War and the post-Arab Spring era. By examining Saudi aid allocations during these periods, we investigate the influence of foreign policy and geostrategic objectives versus the humanitarian needs of the …


Artificial Intelligence Applications For Social Science Research, Megan Stubbs-Richardson, Lauren Brown, Mackenzie Paul, Devon Brenner Oct 2023

Artificial Intelligence Applications For Social Science Research, Megan Stubbs-Richardson, Lauren Brown, Mackenzie Paul, Devon Brenner

Social Science Research Center Publications and Scholarship

Our team developed a database of 250 Artificial Intelligence (AI) applications useful for social science research. To be included in our database, the AI tool had to be useful for: 1) literature reviews, summaries, or writing, 2) data collection, analysis, or visualizations, or 3) research dissemination. In the database, we provide a name, description, and links to each of the AI tools that were current at the time of publication on September 29, 2023. Supporting links were provided when an AI tool was found using other databases. To help users evaluate the potential usefulness of each tool, we documented information …


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum May 2023

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman May 2023

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane May 2023

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Du Undergraduate Showcase: Research, Scholarship, And Creative Works: Abstracts, Emma Aggeler, Elena Arroway, Daisy T. Booker, Justin Bravo, Kyle Bucholtz, Megan Burnham, Nicole Choi, Spencer Cockerell, Rosie Contino, Jackson Garske, Kaitlyn Glover, Caroline Hamilton, Haley Hartmann, Madalyne Heiken, Colin Holter, Leah Huzjak, Alyssa Jeng, Cole Jernigan, Chad Kashiwa, Adelaide Kerenick, Emily King, Abigail Langeberg, Maddie Leake, Meredith Lemons, Alec Mackay, Greer Mckinley, Ori Miller, Guy Milliman, Katherine Miromonti, Audrey Mitchell, Lauren Moak, Megan Morrell, Gelella Nebiyu, Zdenek Otruba, Toni V. Panzera, Kassidy Patarino, Sneha Patil, Alexandra Penney, Kevin Persky, Caitlin Pham, Gabriela Recinos, Mary Ringgenberg, Chase Routt, Olivia Schneider, Roman Shrestha, Arlo Simmerman, Alec Smith, Tessa Smith, Nhi-Lac Thai, Kyle Thurmann, Casey Tindall, Amelia Trembath, Maria Trubetskaya, Zachary Vangelisti, Peter Vo, Abby Walker, David Winter, Grayden Wolfe, Leah York May 2022

Du Undergraduate Showcase: Research, Scholarship, And Creative Works: Abstracts, Emma Aggeler, Elena Arroway, Daisy T. Booker, Justin Bravo, Kyle Bucholtz, Megan Burnham, Nicole Choi, Spencer Cockerell, Rosie Contino, Jackson Garske, Kaitlyn Glover, Caroline Hamilton, Haley Hartmann, Madalyne Heiken, Colin Holter, Leah Huzjak, Alyssa Jeng, Cole Jernigan, Chad Kashiwa, Adelaide Kerenick, Emily King, Abigail Langeberg, Maddie Leake, Meredith Lemons, Alec Mackay, Greer Mckinley, Ori Miller, Guy Milliman, Katherine Miromonti, Audrey Mitchell, Lauren Moak, Megan Morrell, Gelella Nebiyu, Zdenek Otruba, Toni V. Panzera, Kassidy Patarino, Sneha Patil, Alexandra Penney, Kevin Persky, Caitlin Pham, Gabriela Recinos, Mary Ringgenberg, Chase Routt, Olivia Schneider, Roman Shrestha, Arlo Simmerman, Alec Smith, Tessa Smith, Nhi-Lac Thai, Kyle Thurmann, Casey Tindall, Amelia Trembath, Maria Trubetskaya, Zachary Vangelisti, Peter Vo, Abby Walker, David Winter, Grayden Wolfe, Leah York

DU Undergraduate Research Journal Archive

Abstracts from the DU Undergraduate Showcase.


Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn May 2022

Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn

Military Cyber Affairs

Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …


Enter The Battleverse: China's Metaverse War, Josh Baughman May 2022

Enter The Battleverse: China's Metaverse War, Josh Baughman

Military Cyber Affairs

No abstract provided.


Putin And Putnam: Interpreting Russian Military Activity Through A Three Player, Two-Level Game, Nathan M. Colvin Apr 2022

Putin And Putnam: Interpreting Russian Military Activity Through A Three Player, Two-Level Game, Nathan M. Colvin

Modeling, Simulation and Visualization Student Capstone Conference

Is Vladimir Putin a bad strategist, perhaps irrational? Previous military activity by Russia, such as the annexation of Crimea of 2014, yielded limited international gains, at a significant economic and reputational cost. Yet as the 2022 invasion of Ukraine shows, Putin is willing to commit military power, despite the cost of sanctions and other possible retaliation. This three-player simultaneous game, originally created in June, 2021, demonstrates how domestic and international considerations of President Vladimir Putin might lead to otherwise unpredictable Russian military behavior. In this extended version of Robert Putnam’s “two-level game,” President Putin rationally uses the international venue as …


Comparing Political Implications Of Punitive Paradigms In Digital Surveillance And Data Driven Algorithms Between The Polities Of The United States Of America And The People's Republic Of China, Shedelande Lily Carpenter Jan 2022

Comparing Political Implications Of Punitive Paradigms In Digital Surveillance And Data Driven Algorithms Between The Polities Of The United States Of America And The People's Republic Of China, Shedelande Lily Carpenter

Senior Projects Spring 2022

Senior Project submitted to The Division of Social Studies of Bard College.


A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan Jan 2022

A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan

Dickinson Law Review (2017-Present)

Times of emergency present an inherent conflict between the public interest and the preservation of individual rights. Such times require granting emergency powers to the government on behalf of the public interest and relaxing safeguards against government actions that infringe rights. The lack of theoretical framework to assess governmental decisions in times of emergency leads to a polarized and politicized discourse about potential policies, and often, to public distrust and lack of compliance.

Such a discourse was evident regarding Digital Tracing Apps (“DTAs”), which are apps installed on cellular phones to alert users that they were exposed to people who …


Cyber Social Threats 2020 Workshop Meta-Report: Covid-19, Challenges, Methodological And Ethical Considerations, Ugur Kursuncu, Yelena Mejova, Jeremy Blackburn, Amit Sheth Aug 2020

Cyber Social Threats 2020 Workshop Meta-Report: Covid-19, Challenges, Methodological And Ethical Considerations, Ugur Kursuncu, Yelena Mejova, Jeremy Blackburn, Amit Sheth

Publications

Online platforms have been increasingly misused by ill-intentioned actors, affecting our society, often leading to real-world events of social significance. On the other hand, recog-nizing the narratives related to harmful behaviors is challeng-ing due to its complex and sensitive nature. The Cyber SocialThreats Workshop 2020 aimed to stimulate research for thechallenges on methodological and ethical considerations indeveloping novel approaches to analyze online harmful con-versations, concerning social, cultural, emotional, commu-nicative, and linguistic aspects. It provided a forum to bringtogether researchers and practitioners from both academiaand industry in the areas of computational social sciences, so-cial network analysis and mining, natural language process-ing, …


Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood Apr 2020

Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood

Independent Study Project (ISP) Collection

The digital domain is the emerging environment for which the internet and data connectivity exists. This new domain is challenging the traditional place for geopolitics to exist, and creating new challenges to international relations. The use of cyberweapons through direct cyberattacks, such as the possibility of an attack on the U.S. power grid, or misinformation campaigns, such as the one launched by Russia against the 2016 U.S. Presidential election, can expand the international threat landscape. While these new threats increase, states are widely not prepared to address the new challenges in the digital domain. This paper will use three primary …


How Data Became Part Of New Orleans’ Dna During The Katrina Recovery, Lamar Gardere, Allison Plyer, Denice Ross Mar 2020

How Data Became Part Of New Orleans’ Dna During The Katrina Recovery, Lamar Gardere, Allison Plyer, Denice Ross

New England Journal of Public Policy

Data intermediaries have a symbiotic relationship with government as the source of most of their information. The open-data movement in government and development of software-as-a-service technologies shaped the data landscape after Katrina. Through relationships and talent transfers with The Data Center, the City of New Orleans went from having its chief technology officer in federal prison and its data systems in shambles to being a nationally recognized leader in open and accountable government. To be effective during disasters, an intermediary should be (1) in place and widely respected before the event, (2) ready to respond immediately after the event and …


Transparency And Algorithmic Governance, Cary Coglianese, David Lehr Jan 2019

Transparency And Algorithmic Governance, Cary Coglianese, David Lehr

All Faculty Scholarship

Machine-learning algorithms are improving and automating important functions in medicine, transportation, and business. Government officials have also started to take notice of the accuracy and speed that such algorithms provide, increasingly relying on them to aid with consequential public-sector functions, including tax administration, regulatory oversight, and benefits administration. Despite machine-learning algorithms’ superior predictive power over conventional analytic tools, algorithmic forecasts are difficult to understand and explain. Machine learning’s “black-box” nature has thus raised concern: Can algorithmic governance be squared with legal principles of governmental transparency? We analyze this question and conclude that machine-learning algorithms’ relative inscrutability does not pose a …


Forecasting Changes In Religiosity And Existential Security With An Agent-Based Model, Ross J. Gore, Carlos Lemos, F. Leron Shults, Wesley J. Wildman Jan 2018

Forecasting Changes In Religiosity And Existential Security With An Agent-Based Model, Ross J. Gore, Carlos Lemos, F. Leron Shults, Wesley J. Wildman

VMASC Publications

We employ existing data sets and agent-based modeling to forecast changes in religiosity and existential security among a collective of individuals over time. Existential security reflects the extent of economic, socioeconomic and human development provided by society. Our model includes agents in social networks interacting with one another based on the education level of the agents, the religious practices of the agents, and each agent's existential security within their natural and social environments. The data used to inform the values and relationships among these variables is based on rigorous statistical analysis of the International Social Survey Programme Religion Module (ISSP) …


After The Avalanche: The Post-Snowden Intelligence Politics Between The United States, The United Kingdom, And Germany, Jobel Kyle P. Vecino Sep 2016

After The Avalanche: The Post-Snowden Intelligence Politics Between The United States, The United Kingdom, And Germany, Jobel Kyle P. Vecino

Claremont-UC Undergraduate Research Conference on the European Union

The revelations of PRISM and XKeyscore by ex-National Security Agency (NSA) analyst Edward Snowden resulted in arguably the largest intelligence leak so far in the 21st century. The leak revealed that the NSA was working with the British Government Communications Headquarters (GCHQ) on surveillance and data collection of individuals throughout Europe. Similarly, the NSA also colluded with the German Federal Intelligence Service (BND) on similar data collection and surveillance activities. Whereas the British government reacted relatively benignly to the revelations despite cries of government abuse, the German government reacted negatively to the revelations, eventually opening a rift between Washington …


The Digital Dionysus: Nietzsche & The Network-Centric Condition Dec 2015

The Digital Dionysus: Nietzsche & The Network-Centric Condition

Dan Mellamphy

No abstract provided.


Data To Decisions For Cyberspace Operations, Steve Stone Dec 2015

Data To Decisions For Cyberspace Operations, Steve Stone

Military Cyber Affairs

In 2011, the United States (U.S.) Department of Defense (DOD) named cyberspace a new operational domain. The U.S. Cyber Command and the Military Services are working to make the cyberspace environment a suitable place for achieving national objectives and enabling military command and control (C2). To effectively conduct cyberspace operations, DOD requires data and analysis of the Mission, Network, and Adversary. However, the DOD’s current data processing and analysis capabilities do not meet mission needs within critical operational timelines. This paper presents a summary of the data processing and analytics necessary to effectively conduct cyberspace operations.


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


Interpreting, Stephanie Jo Kent Aug 2014

Interpreting, Stephanie Jo Kent

Doctoral Dissertations

What do community interpreting for the Deaf in western societies, conference interpreting for the European Parliament, and language brokering in international management have in common? Academic research and professional training have historically emphasized the linguistic and cognitive challenges of interpreting, neglecting or ignoring the social aspects that structure communication. All forms of interpreting are inherently social; they involve relationships among at least three people and two languages. The contexts explored here, American Sign Language/English interpreting and spoken language interpreting within the European Parliament, show that simultaneous interpreting involves attitudes, norms and values about intercultural communication that overemphasize information and discount …


How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr Oct 2012

How Can Pacific Island Economies Benefits From The Advent Of Ict’S – Review Of Best Practices In Education, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This paper explored implementation and use of information and communication technologies in Fiji, in order to gain insight into recent government initiatives to introduce computers and other ICTs for the community of Fiji. The focus of this paper in that it provided the framework for an in-depth exploration of e-learning centers around the country and the benefits from the advent of ICT’s in e-learning community centers in Fiji. Areas concentrated on are outcome of ICT’s in formal education to students and community as a whole in areas of agriculture, health, environment and infrastructure etc. The research sought understanding from the …


Su People, Yuhan Xu, Paula Meseroll, Kathleen Haley, Jay Cox, Jim Reilly, Carol L. Boll Jan 2012

Su People, Yuhan Xu, Paula Meseroll, Kathleen Haley, Jay Cox, Jim Reilly, Carol L. Boll

Syracuse University Magazine

No abstract provided.