Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (7)
- Physical Sciences and Mathematics (7)
- Electrical and Computer Engineering (6)
- Social and Behavioral Sciences (6)
- Computer and Systems Architecture (5)
-
- Information Security (5)
- Digital Communications and Networking (4)
- Operations Research, Systems Engineering and Industrial Engineering (4)
- Business (3)
- Data Storage Systems (3)
- Library and Information Science (3)
- Management Information Systems (3)
- Operational Research (3)
- Other Computer Engineering (3)
- Business Intelligence (2)
- Cognitive Psychology (2)
- Communication (2)
- Communication Technology and New Media (2)
- Databases and Information Systems (2)
- E-Commerce (2)
- Information Literacy (2)
- Management Sciences and Quantitative Methods (2)
- Other Electrical and Computer Engineering (2)
- Power and Energy (2)
- Psychology (2)
- Science and Technology Studies (2)
- Social Media (2)
- Technology and Innovation (2)
- Institution
-
- California State University, San Bernardino (2)
- Nova Southeastern University (2)
- Old Dominion University (2)
- University of Nebraska - Lincoln (2)
- Air Force Institute of Technology (1)
-
- Butler University (1)
- City University of New York (CUNY) (1)
- Dartmouth College (1)
- Embry-Riddle Aeronautical University (1)
- Florida International University (1)
- Sacred Heart University (1)
- University of Kentucky (1)
- University of Louisville (1)
- University of New Haven (1)
- University of North Florida (1)
- University of Tennessee, Knoxville (1)
- University of Texas at El Paso (1)
- Publication
-
- CCE Theses and Dissertations (2)
- Journal of International Technology and Information Management (2)
- Dartmouth College Ph.D Dissertations (1)
- Department of Electrical and Computer Engineering: Faculty Publications (1)
- Dissertations and Theses (1)
-
- Doctoral Dissertations (1)
- Doctoral Dissertations and Master's Theses (1)
- Electrical & Computer Engineering and Computer Science Faculty Publications (1)
- Engineering Technology Faculty Publications (1)
- FIU Electronic Theses and Dissertations (1)
- Faculty Scholarship (1)
- Library Philosophy and Practice (e-journal) (1)
- Open Access Theses & Dissertations (1)
- Psychology Theses & Dissertations (1)
- Scholarship and Professional Work - Business (1)
- School of Computer Science & Engineering Faculty Publications (1)
- Theses and Dissertations (1)
- Theses and Dissertations--Electrical and Computer Engineering (1)
- UNF Graduate Theses and Dissertations (1)
- Publication Type
Articles 1 - 21 of 21
Full-Text Articles in Computer Engineering
Federated Agentless Detection Of Endpoints Using Behavioral And Characteristic Modeling, Hansaka Angel Dias Edirisinghe Kodituwakku
Federated Agentless Detection Of Endpoints Using Behavioral And Characteristic Modeling, Hansaka Angel Dias Edirisinghe Kodituwakku
Doctoral Dissertations
During the past two decades computer networks and security have evolved that, even though we use the same TCP/IP stack, network traffic behaviors and security needs have significantly changed. To secure modern computer networks, complete and accurate data must be gathered in a structured manner pertaining to the network and endpoint behavior. Security operations teams struggle to keep up with the ever-increasing number of devices and network attacks daily. Often the security aspect of networks gets managed reactively instead of providing proactive protection. Data collected at the backbone are becoming inadequate during security incidents. Incident response teams require data that …
Addressing Security And Privacy Issues By Analyzing Vulnerabilities In Iot Applications, Francsico Javier Candelario Burgoa
Addressing Security And Privacy Issues By Analyzing Vulnerabilities In Iot Applications, Francsico Javier Candelario Burgoa
Open Access Theses & Dissertations
The Internet of Things (IoT) environment has been expanding rapidly for the past few years into several areas of our lives, from factories, to stores and even into our own homes. All these new devices in our homes make our day-to-day lives easier and more comfortable with less effort on our part, converting our simple houses into smart homes. This increase in inter-connectivity brings multiple benefits including the improvement in energy efficiency in our homes, however it also brings with it some potential dangers since more points of connection mean more potential vulnerabilities in our grid. These vulnerabilities bring security …
Cybert: Cybersecurity Claim Classification By Fine-Tuning The Bert Language Model, Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla
Cybert: Cybersecurity Claim Classification By Fine-Tuning The Bert Language Model, Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla
Department of Electrical and Computer Engineering: Faculty Publications
We introduce CyBERT, a cybersecurity feature claims classifier based on bidirectional encoder representations from transformers and a key component in our semi-automated cybersecurity vetting for industrial control systems (ICS). To train CyBERT, we created a corpus of labeled sequences from ICS device documentation collected across a wide range of vendors and devices. This corpus provides the foundation for fine-tuning BERT’s language model, including a prediction-guided relabeling process. We propose an approach to obtain optimal hyperparameters, including the learning rate, the number of dense layers, and their configuration, to increase the accuracy of our classifier. Fine-tuning all hyperparameters of the resulting …
Another Brick In The Wall: An Exploratory Analysis Of Digital Forensics Programs In The United States, Syria Mccullough, Stella Abudu, Ebere Onwubuariri, Ibrahim Baggili
Another Brick In The Wall: An Exploratory Analysis Of Digital Forensics Programs In The United States, Syria Mccullough, Stella Abudu, Ebere Onwubuariri, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
We present a comprehensive review of digital forensics programs offered by universities across the United States (U.S.). While numerous studies on digital forensics standards and curriculum exist, few, if any, have examined digital forensics courses offered across the nation. Since digital forensics courses vary from university to university, online course catalogs for academic institutions were evaluated to curate a dataset. Universities were selected based on online searches, similar to those that would be made by prospective students. Ninety-seven (n = 97) degree programs in the U.S. were evaluated. Overall, results showed that advanced technical courses are missing from curricula. We …
A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami
A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami
Doctoral Dissertations and Master's Theses
Social engineering attacks (SE-attacks) in enterprises are hastily growing and are becoming increasingly sophisticated. Generally, SE-attacks involve the psychological manipulation of employees into revealing confidential and valuable company data to cybercriminals. The ramifications could bring devastating financial and irreparable reputation loss to the companies. Because SE-attacks involve a human element, preventing these attacks can be tricky and challenging and has become a topic of interest for many researchers and security experts. While methods exist for detecting SE-attacks, our literature review of existing methods identified many crucial factors such as the national cultural, organizational, and personality traits of employees that enable …
Authentication Schemes' Impact On Working Memory, Janine D. Mator
Authentication Schemes' Impact On Working Memory, Janine D. Mator
Psychology Theses & Dissertations
Authentication is the process by which a computing system validates a user’s identity. Although this process is necessary for system security, users view authentication as a frequent disruption to their primary tasks. During this disruption, primary task information must be actively maintained in working memory. As a result, primary task information stored in working memory is at risk of being lost or corrupted while users authenticate. For over two decades, researchers have focused on developing more memorable passwords by replacing alphanumeric text with visual graphics (Biddle et al., 2012). However, very little attention has been given to the impact authentication …
Digital Twin-Based Cooperative Control Techniques For Secure And Intelligent Operation Of Distributed Microgrids, Ahmed Aly Saad Ahmed
Digital Twin-Based Cooperative Control Techniques For Secure And Intelligent Operation Of Distributed Microgrids, Ahmed Aly Saad Ahmed
FIU Electronic Theses and Dissertations
Networked microgrids play a key role in constructing future active distribution networks for providing the power system with resiliency and reliability against catastrophic physical and cyber incidents. Motivated by the increasing penetration of renewable resources and energy storage systems in the distribution grids, utility companies are encouraged to unleash the capabilities of the distributed microgrid to work as virtual power plants that can support the power systems. The microgrids nature is transforming the grid and their control systems from centralized architecture into distributed architectures. The distributed networked microgrids introduced many benefits to the future smart grids, it created many challenges …
Infiniband Network Monitoring: Challenges And Possibilities, Kyle D. Hintze
Infiniband Network Monitoring: Challenges And Possibilities, Kyle D. Hintze
Theses and Dissertations
Within the realm of High Performance Computing, the InfiniBand Architecture is among the leading interconnects used today. Capable of providing high bandwidth and low latency, InfiniBand is finding applications outside the High Performance Computing domain. One of these is critical infrastructure, encompassing almost all essential sectors as the work force becomes more connected. InfiniBand is not immune to security risks, as prior research has shown that common traffic analyzing tools cannot effectively monitor InfiniBand traffic transmitted between hosts, due to the kernel bypass nature of the IBA in conjunction with Remote Direct Memory Access operations. If Remote Direct Memory Access …
Role Of Artificial Intelligence In The Internet Of Things (Iot) Cybersecurity, Murat Kuzlu, Corinne Fair, Ozgur Guler
Role Of Artificial Intelligence In The Internet Of Things (Iot) Cybersecurity, Murat Kuzlu, Corinne Fair, Ozgur Guler
Engineering Technology Faculty Publications
In recent years, the use of the Internet of Things (IoT) has increased exponentially, and cybersecurity concerns have increased along with it. On the cutting edge of cybersecurity is Artificial Intelligence (AI), which is used for the development of complex algorithms to protect networks and systems, including IoT systems. However, cyber-attackers have figured out how to exploit AI and have even begun to use adversarial AI in order to carry out cybersecurity attacks. This review paper compiles information from several other surveys and research papers regarding IoT, AI, and attacks with and against AI and explores the relationship between these …
Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite
Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite
Library Philosophy and Practice (e-journal)
Background: Zero Knowledge Proof is a persuasive cryptographic protocol employed to provide data security by keeping the user's identity, using the services anonymously. Zero Knowledge Proof can be the preferred option to use in multiple circumstances. Instead of using the public key cryptographic protocols, the zero-knowledge proof usage does not expose or leak confidential data or information during the transmission. Zero Knowledge Proof protocols are comparatively lightweight; this results in making it efficient in terms of memory. Zero Knowledge Proof applications can reside in authentication, identity management, cryptocurrency transactions, and many more. Traditional authentication schemes are vulnerable to attacks …
Transdisciplinary Ai Observatory—Retrospective Analyses And Future-Oriented Contradistinctions, Nadisha Marie Aliman, Leon Kester, Roman Yampolskiy
Transdisciplinary Ai Observatory—Retrospective Analyses And Future-Oriented Contradistinctions, Nadisha Marie Aliman, Leon Kester, Roman Yampolskiy
Faculty Scholarship
In the last years, artificial intelligence (AI) safety gained international recognition in the light of heterogeneous safety-critical and ethical issues that risk overshadowing the broad beneficial impacts of AI. In this context, the implementation of AI observatory endeavors represents one key research direction. This paper motivates the need for an inherently transdisciplinary AI observatory approach integrating diverse retrospective and counterfactual views. We delineate aims and limitations while providing hands-on-advice utilizing concrete practical examples. Distinguishing between unintentionally and intentionally triggered AI risks with diverse socio-psycho-technological impacts, we exemplify a retrospective descriptive analysis followed by a retrospective counterfactual risk analysis. Building on …
Blockchain-Based Architecture For Secured Cyberattack Signatures And Features Distribution, Oluwaseyi J. Ajayi
Blockchain-Based Architecture For Secured Cyberattack Signatures And Features Distribution, Oluwaseyi J. Ajayi
Dissertations and Theses
One effective way of detecting malicious traffic in computer networks is intrusion detection systems (IDS). Despite the increased accuracy of IDSs, distributed or coordinated attacks can still go undetected because of the single vantage point of the IDSs. Due to this reason, there is a need for attack characteristics' exchange among different IDS nodes. Another reason for IDS coordination is that a zero-day attack (an attack without a known signature) experienced in organizations located in different regions is not the same. Collaborative efforts of the participating IDS nodes can stop more attack threats if IDS nodes exchange these attack characteristics …
Research Framework Of Human Factors Interactions With Technical And Security Factors In Cloud Computing, Hongjiang Xu, Sakthi Mahenthiran
Research Framework Of Human Factors Interactions With Technical And Security Factors In Cloud Computing, Hongjiang Xu, Sakthi Mahenthiran
Scholarship and Professional Work - Business
There are many advantages to adopt cloud computing, however, some important issues need to be addressed, such as cybersecurity, cost-saving, trust, implementation complexity, and cloud provider’s reliability. This study developed a research framework to study the human factors that interact with technical and cybersecurity factors to affect the cloud-computing provider’s performance from the user’s perspective. Research hypotheses were developed and a survey was conducted to test the hypotheses and validate the research framework.
Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci
Pause For A Cybersecurity Cause: Assessing The Influence Of A Waiting Period On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci
CCE Theses and Dissertations
Social engineering costs organizations billions of dollars a year. Social engineering exploits the weakest link of information security systems, the people who are using them. Phishing is a form of social engineering in which the perpetrator depends on the victim’s instinctual thinking towards an email designed to create a fear or excitement response. It is well-documented in literature that users continue to click on phishing emails costing them and their employers significant monetary resources and data loss. Training does not appear to mitigate the effects of phishing much; other solutions are necessary to mitigate phishing.
Kahneman introduced the concepts of …
Energy Considerations In Blockchain-Enabled Applications, Cesar Enrique Castellon Escobar
Energy Considerations In Blockchain-Enabled Applications, Cesar Enrique Castellon Escobar
UNF Graduate Theses and Dissertations
Blockchain-powered smart systems deployed in different industrial applications promise operational efficiencies and improved yields, while mitigating significant cybersecurity risks pertaining to the main application. Associated tradeoffs between availability and security arise at implementation, however, triggered by the additional resources (e.g., memory, computation) required by each blockchain-enabled host. This thesis applies an energy-reducing algorithmic engineering technique for Merkle Tree root and Proof of Work calculations, two principal elements of blockchain computations, as a means to preserve the promised security benefits but with less compromise to system availability. Using pyRAPL, a python library to measure computational energy, we experiment with both the …
An Empirical Assessment Of Users' Information Security Protection Behavior Towards Social Engineering Breaches, Nisha Jatin Patel
An Empirical Assessment Of Users' Information Security Protection Behavior Towards Social Engineering Breaches, Nisha Jatin Patel
CCE Theses and Dissertations
User behavior is one of the most significant information security risks. Information Security is all about being aware of who and what to trust and behaving accordingly. Due to technology becoming an integral part of nearly everything in people's daily lives, the organization's need for protection from security threats has continuously increased. Social engineering is the act of tricking a user into revealing information or taking action. One of the riskiest aspects of social engineering is that it depends mainly upon user errors and is not necessarily a technology shortcoming. User behavior should be one of the first apprehensions when …
Data Driven Analysis And Characterization Of Modern Android Malware, Qian Han
Data Driven Analysis And Characterization Of Modern Android Malware, Qian Han
Dartmouth College Ph.D Dissertations
Google’s Android operating system was first announced to the public in 2007 and was installed on more than three billion mobile devices by 2019. With the prevalence of Android OS, Android malware has since proliferated. Android malware is malicious software designed to exploit Android operating systems running on smart devices. Some variants of Android malware have the capability of disabling the device, allowing a malicious actor to remotely control the device, track the user’s activity, lock the device, and so on. Moreover, the evolution and sophistication of modern Android malware obfuscation and detection bypassing methods have significantly improved in recent …
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
Journal of International Technology and Information Management
While many researchers have investigated soft skills for different roles related to business, engineering, healthcare and others, the soft skills needed by the chief information security officer (CISO) in a leadership position are not studied in-depth. This paper describes a first study aimed at filling this gap.
In this multimethod research, both the business leaders perspective as well as an analysis of CISO job ads is studied. The methodology used to capture the business leaders perspective is via a Delphi study and the jobs adds are studied using a quantitative content analysis.
With an increasing threat to information security for …
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Journal of International Technology and Information Management
Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …
Energy Harvesting And Sensor Based Hardware Security Primitives For Cyber-Physical Systems, Carson Labrado
Energy Harvesting And Sensor Based Hardware Security Primitives For Cyber-Physical Systems, Carson Labrado
Theses and Dissertations--Electrical and Computer Engineering
The last few decades have seen a large proliferation in the prevalence of cyber-physical systems. Although cyber-physical systems can offer numerous advantages to society, their large scale adoption does not come without risks. Internet of Things (IoT) devices can be considered a significant component within cyber-physical systems. They can provide network communication in addition to controlling the various sensors and actuators that exist within the larger cyber-physical system. The adoption of IoT features can also provide attackers with new potential avenues to access and exploit a system's vulnerabilities. Previously, existing systems could more or less be considered a closed system …
Cybersecurity Analysis Of Load Frequency Control In Power Systems: A Survey, Sahaj Saxena, Sajal Bhatia, Rahul Gupta
Cybersecurity Analysis Of Load Frequency Control In Power Systems: A Survey, Sahaj Saxena, Sajal Bhatia, Rahul Gupta
School of Computer Science & Engineering Faculty Publications
Today, power systems have transformed considerably and taken a new shape of geographically distributed systems from the locally centralized systems thereby leading to a new infrastructure in the framework of networked control cyber-physical system (CPS). Among the different important operations to be performed for smooth generation, transmission, and distribution of power, maintaining the scheduled frequency, against any perturbations, is an important one. The load frequency control (LFC) operation actually governs this frequency regulation activity after the primary control. Due to CPS nature, the LFC operation is vulnerable to attacks, both from physical and cyber standpoints. The cyber-attack strategies ranges from …