Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
The School Of Engineering And Computer Science Class Of 2024 Academic Celebration Program, Cedarville University
The School Of Engineering And Computer Science Class Of 2024 Academic Celebration Program, Cedarville University
Engineering and Computer Science Academic Celebrations
No abstract provided.
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Poster Presentations
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Enhancing Cybersecurity Learning Efficiency: Leveraging Spaced Repetition Systems For Rapid Adaptation, Takudzwanashe Nyabadza
Enhancing Cybersecurity Learning Efficiency: Leveraging Spaced Repetition Systems For Rapid Adaptation, Takudzwanashe Nyabadza
Research Week
No abstract provided.
Secure Cislunar Communication Architecture: Cryptographic Capabilities And Protocols For Lunar Missions, Michael Hamblin, Bilal Abu Bakr
Secure Cislunar Communication Architecture: Cryptographic Capabilities And Protocols For Lunar Missions, Michael Hamblin, Bilal Abu Bakr
Research Week
The surge in lunar missions intensifies concerns about congestion and communication reliability. This study proposes a secure cislunar architecture for real-time, cross-mission information exchange. We focus on cryptographic protocols and network design for a native IPv6 cislunar transit system.
Through a review of internet and space communication advancements, we emphasize the need for a secure network, exemplified by LunaNet. A robust data transit system with encryption is crucial for a common communication infrastructure. Traditional protocols face latency challenges. We advocate for user-friendly encryption methods to address confidentiality within the CIA Triad. Integrity is maintained through cryptographic message authentication codes. Availability …
How Can Personalised Feedback In Assignments Help Address Gender Balance In Computing Education?, Alina Berry
How Can Personalised Feedback In Assignments Help Address Gender Balance In Computing Education?, Alina Berry
Academic Posters Collection
Personalised feedback is frequently used in computing assessments in higher education. Research has shown that personalised feedback positively influences persistence in computer science. Computing and related disciplines are known to show relatively low retention rates. This includes female students, who are strongly underrepresented in computing disciplines, so they can be considered as a particularly important group for retention-driven initiatives. Female science students are more likely to act upon feedback, and personalised feedback has increased intentions to persist among female top performing students in computing. Hence, providing personalised feedback can be considered as a promising gender initiative that has a potential …