Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 389

Full-Text Articles in Computer Engineering

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson Apr 2024

Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson

Cybersecurity Undergraduate Research Showcase

This paper explores the potential integration of predictive analytics AI into the United States Coast Guard's (USCG) Search and Rescue Optimal Planning System (SAROPS) for deep sea and nearshore search and rescue (SAR) operations. It begins by elucidating the concept of predictive analytics AI and its relevance in military applications, particularly in enhancing SAR procedures. The current state of SAROPS and its challenges, including complexity and accuracy issues, are outlined. By integrating predictive analytics AI into SAROPS, the paper argues for streamlined operations, reduced training burdens, and improved accuracy in locating drowning personnel. Drawing on insights from military AI applications …


Methods That Support The Validation Of Agent-Based Models: An Overview And Discussion, Andrew Collins, Matthew Koehler, Christopher Lynch Jan 2024

Methods That Support The Validation Of Agent-Based Models: An Overview And Discussion, Andrew Collins, Matthew Koehler, Christopher Lynch

Engineering Management & Systems Engineering Faculty Publications

Validation is the process of determining if a model adequately represents the system under study for the model’s intended purpose. Validation is a critical component in building the credibility of a simulation model with its end-users. Effectively conducting validation can be a daunting task for both novice and experienced simulation developers. Further compounding the difficult task of conducting validation is that there is no universally accepted approach for assessing a simulation. These challenges are particularly relevant to the paradigm of Agent-Based Modeling and Simulation (ABMS) because of the complexity found in these models’ mechanisms and in the real-world situations they …


Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson Dec 2023

Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson

Cybersecurity Undergraduate Research Showcase

For this research project I used a Raspberry Pi device and conducted online research to investigate potential security vulnerabilities along with mitigation strategies. I configured the Raspberry Pi by using the proper peripherals such as an HDMI cord, a microUSB adapter that provided 5V and at least 700mA of current, a TV monitor, PiSwitch, SD Card, keyboard, and mouse. I installed the Rasbian operating system (OS). The process to install the Rasbian took about 10 minutes to boot starting at 21:08 on 10/27/2023 and ending at 21:18. 1,513 megabytes (MB) was written to the SD card running at (2.5 MB/sec). …


Integrating Ai Into Uavs, Huong Quach Dec 2023

Integrating Ai Into Uavs, Huong Quach

Cybersecurity Undergraduate Research Showcase

This research project explores the application of Deep Learning (DL) techniques, specifically Convolutional Neural Networks (CNNs), to develop a smoke detection algorithm for deployment on mobile platforms, such as drones and self-driving vehicles. The project focuses on enhancing the decision-making capabilities of these platforms in emergency response situations. The methodology involves three phases: algorithm development, algorithm implementation, and testing and optimization. The developed CNN model, based on ResNet50 architecture, is trained on a dataset of fire, smoke, and neutral images obtained from the web. The algorithm is implemented on the Jetson Nano platform to provide responsive support for first responders. …


Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins Nov 2023

Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins

Cybersecurity Undergraduate Research Showcase

This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.


Framework For Implementing Advanced Radar Plotting Aid Capability For Small Maritime Vessels, Jason Stark Harris Oct 2023

Framework For Implementing Advanced Radar Plotting Aid Capability For Small Maritime Vessels, Jason Stark Harris

Electrical & Computer Engineering Theses & Dissertations

Every year in the United States many people are killed or injured when maritime vessels collide with other vessels or fixed objects. According to the United States Coast Guard, the top contributing factors to these collisions are operator inattention, operator inexperience and an improper lookout. Larger commercial vessels are required to have RADAR systems which support Automatic RADAR Plotting Aid (ARPA) which can automatically detect collisions and alert an operator to change course. These systems can be very expensive which put them out of reach of the average recreational boater. It is however possible to implement a low cost ARPA …


Data-Driven Predictive Modeling To Enhance Search Efficiency Of Glowworm-Inspired Robotic Swarms In Multiple Emission Source Localization Tasks, Payal Nandi Aug 2023

Data-Driven Predictive Modeling To Enhance Search Efficiency Of Glowworm-Inspired Robotic Swarms In Multiple Emission Source Localization Tasks, Payal Nandi

Mechanical & Aerospace Engineering Theses & Dissertations

In time-sensitive search and rescue applications, a team of multiple mobile robots broadens the scope of operational capabilities. Scaling multi-robot systems (< 10 agents) to larger robot teams (10 – 100 agents) using centralized coordination schemes becomes computationally intractable during runtime. One solution to this problem is inspired by swarm intelligence principles found in nature, offering the benefits of decentralized control, fault tolerance to individual failures, and self-organizing adaptability. Glowworm swarm optimization (GSO) is unique among swarm-based algorithms as it simultaneously focuses on searching for multiple targets. This thesis presents GPR-GSO—a modification to the GSO algorithm that incorporates Gaussian Process Regression (GPR) based data-driven predictive modeling—to improve the search efficiency of robotic swarms in multiple emission source localization tasks. The problem formulation and methods are presented, followed by numerical simulations to illustrate the working of the algorithm. Results from a comparative analysis show that the GPR-GSO algorithm exceeds the performance of the benchmark GSO algorithm on evaluation metrics of swarm size, search completion time, and travel distance.


Towards A Robust Defense: A Multifaceted Approach To The Detection And Mitigation Of Neural Backdoor Attacks Through Feature Space Exploration And Analysis, Liuwan Zhu Aug 2023

Towards A Robust Defense: A Multifaceted Approach To The Detection And Mitigation Of Neural Backdoor Attacks Through Feature Space Exploration And Analysis, Liuwan Zhu

Electrical & Computer Engineering Theses & Dissertations

From voice assistants to self-driving vehicles, machine learning(ML), especially deep learning, revolutionizes the way we work and live, through the wide adoption in a broad range of applications. Unfortunately, this widespread use makes deep learning-based systems a desirable target for cyberattacks, such as generating adversarial examples to fool a deep learning system to make wrong decisions. In particular, many recent studies have revealed that attackers can corrupt the training of a deep learning model, e.g., through data poisoning, or distribute a deep learning model they created with “backdoors” planted, e.g., distributed as part of a software library, so that the …


Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla Aug 2023

Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla

Computer Science Theses & Dissertations

The definition of scholarly content has expanded to include the data and source code that contribute to a publication. While major archiving efforts to preserve conventional scholarly content, typically in PDFs (e.g., LOCKSS, CLOCKSS, Portico), are underway, no analogous effort has yet emerged to preserve the data and code referenced in those PDFs, particularly the scholarly code hosted online on Git Hosting Platforms (GHPs). Similarly, Software Heritage is working to archive public source code, but there is value in archiving the surrounding ephemera that provide important context to the code while maintaining their original URIs. In current implementations, source code …


Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane Aug 2023

Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane

Engineering Management & Systems Engineering Theses & Dissertations

Cloud Manufacturing(CMfg) is an advanced manufacturing model that caters to fast-paced agile requirements (Putnik, 2012). For manufacturing complex products that require extensive resources, manufacturers explore advanced manufacturing techniques like CMfg as it becomes infeasible to achieve high standards through complete ownership of manufacturing artifacts (Kuan et al., 2011). CMfg, with other names such as Manufacturing as a Service (MaaS) and Cyber Manufacturing (NSF, 2020), addresses the shortcoming of traditional manufacturing by building a virtual cyber enterprise of geographically distributed entities that manufacture custom products through collaboration.

With manufacturing venturing into cyberspace, Digital Trust issues concerning product quality, data, and intellectual …


Towards Intelligent Runtime Framework For Distributed Heterogeneous Systems, Polykarpos Thomadakis Aug 2023

Towards Intelligent Runtime Framework For Distributed Heterogeneous Systems, Polykarpos Thomadakis

Computer Science Theses & Dissertations

Scientific applications strive for increased memory and computing performance, requiring massive amounts of data and time to produce results. Applications utilize large-scale, parallel computing platforms with advanced architectures to accommodate their needs. However, developing performance-portable applications for modern, heterogeneous platforms requires lots of effort and expertise in both the application and systems domains. This is more relevant for unstructured applications whose workflow is not statically predictable due to their heavily data-dependent nature. One possible solution for this problem is the introduction of an intelligent Domain-Specific Language (iDSL) that transparently helps to maintain correctness, hides the idiosyncrasies of lowlevel hardware, and …


Opensim-Based Musculoskeletal Modeling: Foundation For Interactive Obstetric Simulator, Bahador Dodge May 2023

Opensim-Based Musculoskeletal Modeling: Foundation For Interactive Obstetric Simulator, Bahador Dodge

Electrical & Computer Engineering Theses & Dissertations

The use of mathematical and computational models to understand complex biological systems, such as the human birth process, is a rapidly growing field in medicine. These models can be used to optimize and personalize medical treatments for individual patients, enhance training, and aid in educational efforts. While recent advancements in healthcare, particularly in obstetrics, have improved care for mothers and babies, studies and government reports indicate a rising rate of maternal mortality in the United States.

Despite this rising trend, there is a lack of detailed studies concerning the use of modeling and simulation to develop an interactive obstetrics simulator …


Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer May 2023

Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer

School of Cybersecurity Faculty Publications

The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of …


Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego May 2023

Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego

Electrical & Computer Engineering Theses & Dissertations

World Health Organization (WHO) data show that around 684,000 people die from falls yearly, making it the second-highest mortality rate after traffic accidents [1]. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. In light of the recent widespread adoption of wearable sensors, it has become increasingly critical that fall detection models are developed that can effectively process large and sequential sensor signal data. Several researchers have recently developed fall detection algorithms based on wearable sensor data. However, real-time fall detection remains challenging because of the wide …


Roboretrieve--In A Dual Role As A Hand-Held Surgical Robot And A Collaborative Robot End-Effector To Perform Spillage-Free Specimen Retrieval In Laparoscopy, Siqin Dong May 2023

Roboretrieve--In A Dual Role As A Hand-Held Surgical Robot And A Collaborative Robot End-Effector To Perform Spillage-Free Specimen Retrieval In Laparoscopy, Siqin Dong

Mechanical & Aerospace Engineering Theses & Dissertations

Recent advances in surgical robotics attempt to overcome limitations of manual surgery by augmenting the surgeon’s capabilities while performing suturing, incision, retraction, and retrieval tasks. This dissertation presents novel approaches for spillage-free specimen retrieval in confined spaces, targeted toward the surgical domain of minimally invasive robotic surgery. The retrieval task involves extraction of a resected specimen, residing in the abdominal cavity, completely outside of the patient’s body. A major challenge in this context is the spillage of content being retrieved, which may cause dissemination of malignancy. To address this challenge, this dissertation develops RoboRetrieve, a portable hand-held robot that …


Systemic Risk Analysis Of Human Factors In Phishing, Mark Guilford May 2023

Systemic Risk Analysis Of Human Factors In Phishing, Mark Guilford

Engineering Management & Systems Engineering Theses & Dissertations

The scope of this study is the systemic risk of the role of humans in the risk of phishing. The relevance to engineering managers and systems engineers of the risks of phishing attacks is the theft of data which has significantly increased in the past couple of years. Phishing has become a systemic persistent threat to all internet users. Understanding the role of humans in phishing from a systemic perspective is a critical objective towards creating a strong defense against complex and manipulative phishing attacks. The systemic view of phishing concentrates on how phishing affects the entire organizational system, not …


Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers Apr 2023

Ransomware: What Is Ransomware, And How To Prevent It, Brandon Chambers

Cybersecurity Undergraduate Research Showcase

This research paper answers the question, “What is Ransomware, and How to prevent it?”. This paper will discuss what ransomware is, its history about ransomware, how ransomware attacks Windows systems, how to prevent ransomware, how to handle ransomware once it is already on the network, ideas for training professionals to avoid ransomware, and how anti-virus helps defend against ransomware. Many different articles, case studies, and professional blogs will be used to complete the research on this topic.


Simulating Function Generators And Oscilloscopes In A Virtual Laboratory Environment, Yiyang Li, Yuzhong Shen, Charles I. Sukenik Apr 2023

Simulating Function Generators And Oscilloscopes In A Virtual Laboratory Environment, Yiyang Li, Yuzhong Shen, Charles I. Sukenik

Modeling, Simulation and Visualization Student Capstone Conference

This paper discusses the development of a virtual laboratory for simulating electronic instruments commonly used in science and engineering courses, such as function generators and digital storage oscilloscopes. Mathematical equations are used to represent continuous signals and ensure signal integrity, while C# delegates are adopted to enable communication between simulated devices. The approach allows for loose coupling between software components and high cohesion of individual components, and can be applied to other virtual laboratory developments. The virtual laboratory provides a means for students to gain hands-on experience with electronic instruments and improve their understanding of theoretical concepts.


Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen Apr 2023

Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen

Modeling, Simulation and Visualization Student Capstone Conference

Practical work guides for complex procedures are significant and highly affect the efficiency and accuracy of on-site users. This paper presents a technique to generate virtual work guides automatically for complex procedures. Firstly, the procedure information is extracted from the electronic manual in PDF format. And then, the extracted procedure steps are mapped to the virtual model parts in preparation for animation between adjacent steps. Next, smooth animations of the procedure are generated based on a 3D natural cubic spline curve to improve the spatial ability of the work guide. In addition, each step's annotation is automatically adjusted to improve …


Hampton Roads' Building Resilient Communities Flood Game, Gul Ayaz, Katherine Smith, Rafael Diaz, Joshua G. Behr Apr 2023

Hampton Roads' Building Resilient Communities Flood Game, Gul Ayaz, Katherine Smith, Rafael Diaz, Joshua G. Behr

Modeling, Simulation and Visualization Student Capstone Conference

As rising sea levels and subsequent recurrent flooding disproportionately affects coastal areas, it is crucial to develop a heightened awareness of the impacts of natural disasters on communities and the environments they live in. The Hampton Roads’ Building Resilient Communities (BRC) Flood Game is a simulation role-playing game designed to allow players to increase their understanding of the impact of various community response interventions to sea level rise and recurrent flooding. Players will examine and assess the tradeoffs of resiliency investments, the impact policies may have on the population, and the amount of time return on investment takes. The BRC …


Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith Apr 2023

Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith

Modeling, Simulation and Visualization Student Capstone Conference

Mathematics is an important subject that is pervasive across many disciplines. It is also a subject that has proven to be challenging to both teach and learn. Students face many challenges with learning math such as a lack of motivation and anxiety. To address these challenges, game-based learning has become a popular approach to stimulate students and create a more positive classroom environment. It can serve as an alternative or supplement to traditional teaching and can better engage students while developing a positive attitude toward learning. The use of games in a classroom can create a more exciting and engaging …


Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry Apr 2023

Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry

Modeling, Simulation and Visualization Student Capstone Conference

This work explores collecting performance metrics and leveraging the output for prediction on a memory-intensive parallel image classification algorithm - Inception v3 (or "Inception3"). Experimental results were collected by nvidia-smi on a computational node DGX-1, equipped with eight Tesla V100 Graphic Processing Units (GPUs). Time series analysis was performed on the GPU utilization data taken, for multiple runs, of Inception3’s image classification algorithm (see Figure 1). The time series model applied was Seasonal Autoregressive Integrated Moving Average Exogenous (SARIMAX).


Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis Apr 2023

Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis

Modeling, Simulation and Visualization Student Capstone Conference

Maritime autonomy, specifically the use of autonomous and semi-autonomous maritime vessels, is a key enabling technology supporting a set of diverse and critical research areas, including coastal and environmental resilience, assessment of waterway health, ecosystem/asset monitoring and maritime port security. Critical to the safe, efficient and reliable operation of an autonomous maritime vessel is its ability to perceive on-the-fly the external environment through onboard sensors. In this paper, buoy detection for LiDAR images is explored by using several tools and techniques: machine learning methods, Unity Game Engine (herein referred to as Unity) simulation, and traditional image processing. The Unity Game …


Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla Apr 2023

Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla

Modeling, Simulation and Visualization Student Capstone Conference

This study analyzes the impact of Venezuelan migrants on local frustration levels in Colombia. The study found a relationship between the influx of Venezuelan migrants and the level of frustration among locals towards migrants, infrastructure, government, and geopolitics. Additionally, we identified that frustration types have an impact on other frustrations. The study used articles from a national newspaper in Colombia from 2015 to 2020. News articles were coded during a previous study qualitatively and categorized into frustration types. The code frequencies were then used as variables in this study. We used path modeling to statistically study the relationship between dependent …


Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund Apr 2023

Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund

Modeling, Simulation and Visualization Student Capstone Conference

The sudden arrival of many migrants can present new challenges for host communities and create negative attitudes that reflect that tension. In the case of Colombia, with the influx of over 2.5 million Venezuelan migrants, such tensions arose. Our research objective is to investigate how those sentiments arise in social media. We focused on monitoring derogatory terms for Venezuelans, specifically veneco and veneca. Using a dataset of 5.7 million tweets from Colombian users between 2015 and 2021, we determined the proportion of tweets containing those terms. We observed a high prevalence of xenophobic and defamatory language correlated with the …


An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen Apr 2023

An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen

Modeling, Simulation and Visualization Student Capstone Conference

This work presents an algorithm for finding data dependencies in a discrete-event simulation system, from the event graph of the system. The algorithm can be used within a parallel discrete-event simulation. Also presented is an experimental system and event graph, which is used for testing the algorithm. Results indicate that the algorithm can provide information about which vertices in the experimental event graph can affect other vertices, and the minimum amount of time in which this interference can occur.


U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa Apr 2023

U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa

Modeling, Simulation and Visualization Student Capstone Conference

Satellite image analysis of natural disasters is critical for effective emergency response, relief planning, and disaster prevention. Semantic segmentation is believed to be on of the best techniques to capture pixelwise information in computer vision. In this work we will be using a U-Net architecture to do a three class semantic segmentation for the Xview2 dataset to capture the level of damage caused by different natural disaster which is beyond the visual scope of human eyes.


Lack Of Black Female Diversity Within The Cybersecurity Workforce, Eric Preston Apr 2023

Lack Of Black Female Diversity Within The Cybersecurity Workforce, Eric Preston

Cybersecurity Undergraduate Research Showcase

Cybersecurity methods, strategies, and programs for protecting computers and electronic devices have become critically important in all aspects of the technological infrastructure. However, while this is a vastly growing field that has a large workforce, it suffers from a lack of representation, specifically for Black/African American females. This study examines the barriers that prevent Black women from having representation within the cybersecurity workforce and solutions that address them. Some barriers noted include a lack of role models and resources, historical discrimination and systemic barriers, and cultural norms. Additionally, implications created by these barriers include less diversity, a lack of career …


Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan Apr 2023

Role Of Ai In Threat Detection And Zero-Day Attacks, Kelly Morgan

Cybersecurity Undergraduate Research Showcase

Cybercrime and attack methods have been steadily increasing since the 2019 pandemic. In the years following 2019, the number of victims and attacks per hour rapidly increased as businesses and organizations transitioned to digital environments for business continuity amidst lockdowns. In most scenarios cybercriminals continued to use conventional attack methods and known vulnerabilities that would cause minimal damage to an organization with a robust cyber security posture. However, zero-day exploits have skyrocketed across all industries with an increasingly growing technological landscape encompassing internet of things (IoT), cloud hosting, and more advanced mobile technologies. Reports by Mandiant Threat Intelligence (2022) concluded …