Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Digital Communications and Networking (6)
- Data Storage Systems (4)
- Robotics (4)
- Aerospace Engineering (3)
- Computer Sciences (3)
-
- Physical Sciences and Mathematics (3)
- Computer and Systems Architecture (2)
- Electrical and Computer Engineering (2)
- Information Security (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Other Computer Engineering (2)
- Propulsion and Power (2)
- Social and Behavioral Sciences (2)
- Systems and Communications (2)
- Automotive Engineering (1)
- Aviation (1)
- Aviation and Space Education (1)
- Cataloging and Metadata (1)
- Computational Engineering (1)
- Curriculum and Instruction (1)
- Education (1)
- Educational Assessment, Evaluation, and Research (1)
- Educational Technology (1)
- Engineering Education (1)
- Hardware Systems (1)
- Human Factors Psychology (1)
- Information Literacy (1)
- Library and Information Science (1)
- Keyword
-
- Android (2)
- Applications (2)
- Automation (2)
- Internet of Things (2)
- Malware (2)
-
- 6LowPAN (1)
- 6LowPSec (1)
- 6TiSCH (1)
- Adaboost (1)
- Aeronautical engineering (1)
- Aerospace engineering (1)
- Aviation Education (1)
- Aviation engineering (1)
- Big Data (1)
- Big data (1)
- Bit errors (1)
- Block-chain (1)
- Blockchain (1)
- Chip-off (1)
- Cloud Computing (1)
- CoAP (1)
- CoAPs (1)
- Competency-based Training (1)
- Cryptography (1)
- Cyber-physical system (1)
- Cybersecurity (1)
- Data separation (1)
- Design-Based Research (1)
- Detection (1)
- Digital Technology (1)
- Publication
- Publication Type
Articles 1 - 14 of 14
Full-Text Articles in Computer Engineering
Where We Are With Enterprise Architecture, Leila Halawi, Richard Mccarthy, James Farah
Where We Are With Enterprise Architecture, Leila Halawi, Richard Mccarthy, James Farah
Publications
Enterprise architecture has been continuously developing since the mid-1980s. Although there is now 35 years of research and use, there is still a lack consistent definitions and standards. This is apparent in the proliferation of so many different enterprise architecture frameworks. Despite the significant body of research, there is a need for standardization of terminology based upon a meta-analysis of the literature. Enterprise architecture programs require commitment throughout an organization to be effective and must be perceived to add value. This research offers an initial basis for researchers who need to expand and continue this research topic with an actual …
Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures, Ismail Butun, Houbing Song, Patrik Osterberg
Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures, Ismail Butun, Houbing Song, Patrik Osterberg
Publications
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. Hence, …
Automated Dynamic Detection Of Self-Hiding Behaviors, Luke Baird
Automated Dynamic Detection Of Self-Hiding Behaviors, Luke Baird
Student Works
Certain Android applications, such as but not limited to malware, conceal their presence from the user, exhibiting a self-hiding behavior. Consequently, these apps put the user’s security and privacy at risk by performing tasks without the user’s awareness. Static analysis has been used to analyze apps for self-hiding behavior, but this approach is prone to false positives and suffers from code obfuscation. This research proposes a set of three tools utilizing a dynamic analysis method of detecting self-hiding behavior of an app in the home, installed, and running application lists on an Android emulator. Our approach proves both highly accurate …
Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers
Automated Dynamic Detection Of Self-Hiding Behavior In Android Apps, Luke Baird, Seth Rodgers
Student Works
Android applications that conceal themselves from a user, defined as exhibiting a “self-hiding behavior,” pose a threat to the user’s privacy, as these applications can live on a device undetected by the user. Malicious applications can do this to execute without being found by the user. Three lists are analyzed in particular—the home, running, and installed lists—as they are directly related to the typical Android app life cycle. Additionally, self-hiding behavior in the device admin list is analyzed due to the potential for catastrophic actions to be taken by device admin malware. This research proposes four dynamic analysis tools that …
Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad
Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad
Publications
Today’s vehicles are no longer stand-alone transportation means, due to the advancements on vehicle-tovehicle (V2V) and vehicle-to-infrastructure (V2I) communications enabled to access the Internet via recent technologies in mobile communications, including WiFi, Bluetooth, 4G, and even 5G networks. The Internet of vehicles was aimed toward sustainable developments in transportation by enhancing safety and efficiency. The sensor-enabled intelligent automation of vehicles’ mechanical operations enhances safety in on-road traveling, and cooperative traffic information sharing in vehicular networks improves traveling efficiency.
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv
Publications
With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more and …
Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen
Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen
Publications
With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results …
Analogies And Comparisons For Stm Data Bodies, Phillip M. Cunio, Brien Flewelling
Analogies And Comparisons For Stm Data Bodies, Phillip M. Cunio, Brien Flewelling
Space Traffic Management Conference
Space Traffic Management (STM) has already demonstrated its potential to be extremely data-intensive. The large number of objects on orbit today, if observed constantly throughout their lifetimes, could produce a staggeringly large number of observations that might in turn generate large numbers of orbits. Orbit data with a lengthy time history can be used to produce estimates of maneuver frequency, susceptibility to natural forces such as drag, and (if combined with photometric data) assessments of behavioral patterns of life.
A future of mega-constellations and a growing number of nations and organizations with assets on orbit would make it likely that …
Advanced Inflatable De-Orbit Solutions For Derelict Satellites And Orbital Debris, Aman Chandra, Greg Wilburn, Jekan Thanga
Advanced Inflatable De-Orbit Solutions For Derelict Satellites And Orbital Debris, Aman Chandra, Greg Wilburn, Jekan Thanga
Space Traffic Management Conference
The exponential rise in small-satellites and CubeSats in Low Earth Orbit (LEO) poses important challenges for future space traffic management. At altitudes of 600 km and lower, aerodynamic drag accelerates de-orbiting of satellites. However, placement of satellites at higher altitudes required for constellations pose important challenges. The satellites will require on-board propulsion to lower their orbits to 600 km and let aerodynamic drag take-over. In this work we analyze solutions for de-orbiting satellites at altitudes of up to 3000 km. We consider a modular robotic de-orbit device that has stowed volume of a regular CubeSat. The de-orbit device would be …
End To End Satellite Servicing And Space Debris Management, Aman Chandra, Himangshu Kalita, Roberto Furfaro, Jekan Thanga
End To End Satellite Servicing And Space Debris Management, Aman Chandra, Himangshu Kalita, Roberto Furfaro, Jekan Thanga
Space Traffic Management Conference
There is growing demand for satellite swarms and constellations for global positioning, remote sensing and relay communication in higher LEO orbits. This will result in many obsolete, damaged and abandoned satellites that will remain on-orbit beyond 25 years. These abandoned satellites and space debris maybe economically valuable orbital real-estate and resources that can be reused, repaired or upgraded for future use. Space traffic management is critical to repair damaged satellites, divert satellites into warehouse orbits and effectively deorbit satellites and space debris that are beyond repair and salvage. Current methods for on-orbit capture, servicing and repair require a large service …
Chip-Off Success Rate Analysis Comparing Temperature And Chip Type, Choli Ence, Joan Runs Through, Gary D. Cantrell
Chip-Off Success Rate Analysis Comparing Temperature And Chip Type, Choli Ence, Joan Runs Through, Gary D. Cantrell
Journal of Digital Forensics, Security and Law
Throughout the digital forensic community, chip-off analysis provides examiners with a technique to obtain a physical acquisition from locked or damaged digital device. Thermal based chip-analysis relies upon the application of heat to remove the flash memory chip from the circuit board. Occasionally, a flash memory chip fails to successfully read despite following similar protocols as other flash memory chips. Previous research found the application of high temperatures increased the number of bit errors present in the flash memory chip. The purpose of this study is to analyze data collected from chip-off analyses to determine if a statistical difference exists …
Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design, Houbing Song, Ya Jiang, Mingzhe Wang, Xun Jiao, Hui Kong, Rui Wang, Yongxin Liu, Jian Wang, Jiaguang Sun
Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design, Houbing Song, Ya Jiang, Mingzhe Wang, Xun Jiao, Hui Kong, Rui Wang, Yongxin Liu, Jian Wang, Jiaguang Sun
Publications
Cyber-physical systems (CPSs) are built from, and depend upon, the seamless integration of software and hardware components. The most important challenge in CPS design and verification is to design CPS to be reliable in a variety of uncertainties, i.e., unanticipated and rapidly evolving environments and disturbances. The costs, delays and reliability of the designed CPS are highly dependent on software-hardware partitioning in the design. The key challenges in partitioning CPSs is that it is difficult to formalize reliability characterization in the same way as the uncertain cost and time delay.
In this paper, we propose a new CPS design paradigm …
Evaluation Of Suas Education And Training Tools, Brent Terwilliger, Scott Burgess, James Solti, Kristine Kiernan, Christian Janke, Andrew Shepherd
Evaluation Of Suas Education And Training Tools, Brent Terwilliger, Scott Burgess, James Solti, Kristine Kiernan, Christian Janke, Andrew Shepherd
Publications
The wide distribution and demographic composition of students seeking small unmanned aircraft system (sUAS) education presents a need to fully understand the capabilities, limitations, and dependencies of effective training tools. Concepts, practices, and technologies associated with modeling and simulation, immersive gaming, augmented and mixed-reality, and remote operation have demonstrated efficacy to support engaged student learning and objective satisfaction. Identification and comparison of key attributes critical to an aviation educational framework, such as competency-based training, enables educational designers to identify those tools with the highest potential to support successful learning. A series of factors, such as system performance, regulatory compliance, environmental …
Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez
Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez
International Journal of Aviation, Aeronautics, and Aerospace
The constant demands that technology creates in aerospace engineering also influence education. The identification of the technologies with practical application in aerospace engineering is of current interest to decision makers in both universities and industry. A social network approach enhances this scoping review of the research literature to identify the main topics using the Big Five technologies in aerospace engineering education. The conceptual structure of the dataset (n=447) was analyzed from different approaches: at macro-level, a comparative of the digital technology identified by cluster analysis with the number of co-words established in 3 and 8 and, a keyword central structure …