Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Engineering

The School Of Engineering And Computer Science Class Of 2024 Academic Celebration Program, Cedarville University May 2024

The School Of Engineering And Computer Science Class Of 2024 Academic Celebration Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark May 2024

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Poster Presentations

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


Enhancing Cybersecurity Learning Efficiency: Leveraging Spaced Repetition Systems For Rapid Adaptation, Takudzwanashe Nyabadza Apr 2024

Enhancing Cybersecurity Learning Efficiency: Leveraging Spaced Repetition Systems For Rapid Adaptation, Takudzwanashe Nyabadza

Research Week

No abstract provided.


Secure Cislunar Communication Architecture: Cryptographic Capabilities And Protocols For Lunar Missions, Michael Hamblin, Bilal Abu Bakr Apr 2024

Secure Cislunar Communication Architecture: Cryptographic Capabilities And Protocols For Lunar Missions, Michael Hamblin, Bilal Abu Bakr

Research Week

The surge in lunar missions intensifies concerns about congestion and communication reliability. This study proposes a secure cislunar architecture for real-time, cross-mission information exchange. We focus on cryptographic protocols and network design for a native IPv6 cislunar transit system.

Through a review of internet and space communication advancements, we emphasize the need for a secure network, exemplified by LunaNet. A robust data transit system with encryption is crucial for a common communication infrastructure. Traditional protocols face latency challenges. We advocate for user-friendly encryption methods to address confidentiality within the CIA Triad. Integrity is maintained through cryptographic message authentication codes. Availability …


How Can Personalised Feedback In Assignments Help Address Gender Balance In Computing Education?, Alina Berry Jan 2024

How Can Personalised Feedback In Assignments Help Address Gender Balance In Computing Education?, Alina Berry

Academic Posters Collection

Personalised feedback is frequently used in computing assessments in higher education. Research has shown that personalised feedback positively influences persistence in computer science. Computing and related disciplines are known to show relatively low retention rates. This includes female students, who are strongly underrepresented in computing disciplines, so they can be considered as a particularly important group for retention-driven initiatives. Female science students are more likely to act upon feedback, and personalised feedback has increased intentions to persist among female top performing students in computing. Hence, providing personalised feedback can be considered as a promising gender initiative that has a potential …