Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (47)
- Computer Sciences (46)
- Digital Communications and Networking (38)
- Information Security (29)
- Other Computer Engineering (28)
-
- Electrical and Computer Engineering (24)
- Computer and Systems Architecture (23)
- Social and Behavioral Sciences (19)
- Law (14)
- Business (13)
- Data Storage Systems (11)
- Computer Law (10)
- Databases and Information Systems (9)
- Management Information Systems (9)
- Hardware Systems (7)
- Systems Science (7)
- Intellectual Property Law (6)
- Military, War, and Peace (6)
- National Security Law (6)
- OS and Networks (6)
- Operations Research, Systems Engineering and Industrial Engineering (6)
- Political Science (6)
- Psychology (6)
- Systems and Communications (6)
- Technology and Innovation (6)
- International Relations (5)
- Internet Law (5)
- Public Affairs, Public Policy and Public Administration (5)
- Institution
-
- Old Dominion University (8)
- Embry-Riddle Aeronautical University (7)
- Air Force Institute of Technology (6)
- University of South Florida (6)
- City University of New York (CUNY) (4)
-
- Nova Southeastern University (4)
- University of Nebraska - Lincoln (4)
- University of New Haven (4)
- California State University, San Bernardino (3)
- Liberty University (3)
- Purdue University (3)
- Sacred Heart University (3)
- The University of Akron (3)
- University of Kentucky (3)
- Cedarville University (2)
- Kean University (2)
- Kennesaw State University (2)
- Selected Works (2)
- Southern Methodist University (2)
- Technological University Dublin (2)
- University of Louisville (2)
- Wayne State University (2)
- Western University (2)
- Wright State University (2)
- Boise State University (1)
- Butler University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Dartmouth College (1)
- DePaul University (1)
- Florida International University (1)
- Publication Year
- Publication
-
- Military Cyber Affairs (6)
- Theses and Dissertations (6)
- CCE Theses and Dissertations (4)
- Doctoral Dissertations and Master's Theses (3)
- Electrical & Computer Engineering and Computer Science Faculty Publications (3)
-
- Senior Honors Theses (3)
- Williams Honors College, Honors Research Projects (3)
- Browse all Theses and Dissertations (2)
- Center for Cybersecurity (2)
- Chemical Engineering and Materials Science Faculty Research Publications (2)
- Dissertations (2)
- Doctoral Dissertations (2)
- Electrical & Computer Engineering Theses & Dissertations (2)
- Electronic Thesis and Dissertation Repository (2)
- Journal of International Technology and Information Management (2)
- Publications (2)
- Publications and Research (2)
- SMU Data Science Review (2)
- School of Computer Science & Engineering Faculty Publications (2)
- All Faculty Scholarship (1)
- Alumni Publications (1)
- Capstone Design Expo Posters (1)
- Capstones (1)
- Computational Modeling & Simulation Engineering Theses & Dissertations (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Conference papers (1)
- Copyright, Fair Use, Scholarly Communication, etc. (1)
- Cornerstone 3 Reports : Interdisciplinary Informatics (1)
- Cyber Operations and Resilience Program Graduate Projects (1)
- Dartmouth College Ph.D Dissertations (1)
Articles 91 - 111 of 111
Full-Text Articles in Computer Engineering
Data Defenders, Madison Claire Cannon
User's Manual For Tardigrade Risk Assessment, Alexis M. Shook
User's Manual For Tardigrade Risk Assessment, Alexis M. Shook
University of New Orleans Theses and Dissertations
This user-guide provides instructions for operating Tardigrade 1.1.3, a cybersecurity software for Nollysoft, LLC. This guide instructs users step-by-step on how to set security controls, risk assessments, and administrative maintenance. Tardigrade 1.1.3 is a Risk Assessment Enterprise that evaluates the risk level of corporations and offers solutions to any security gaps within an organization. Tardigrade 1.1.3 is a role-based software that operates through three modules, Cybersecurity Assessment, Internal Control, and Security Requirement Traceability Matrix.
Ftc Regulating Cybersecurity Post Wyndham: An International Common Law Comparison On The Impact Of Regulation Of Cybersecurity, Andrew Z. R. Smith
Ftc Regulating Cybersecurity Post Wyndham: An International Common Law Comparison On The Impact Of Regulation Of Cybersecurity, Andrew Z. R. Smith
Georgia Journal of International & Comparative Law
No abstract provided.
Cybersecurity Assessment And Mitigation Stochastic Model, Matthew W. Davis
Cybersecurity Assessment And Mitigation Stochastic Model, Matthew W. Davis
Theses and Dissertations
With numerous cybersecurity incidents and vulnerability concerns in an increasingly contested cyber warfighting environment, the Department of Defense (DoD) has mandated cybersecurity assessment and authorization of all major weapon systems (MWS) before their use. In response to this direction, the Air Force Life Cycle Management Center (AFLCMC) created the Platform Information Technology Assessment and Authorization (PIT A&A) Process. Modeled after the NIST Risk Management Framework (RMF), this process applies a risk-based approach to cybersecurity with the goal of identifying risks and mitigating vulnerabilities in MWS. Within this work, a stochastic model of the PIT A&A Process is presented with an …
Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro
Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro
Journal of Human Performance in Extreme Environments
In this paper, we discuss the process we are using in the design and implementation of a tool to improve the situation awareness of cyberattacks in the power grid. We provide details of the steps we have taken to date and describe the steps that still need to be accomplished. The focus of this work is to provide situation awareness of the power grid to staff from different, non-overlapping roles in an electrical transmission organization in order to facilitate an understanding of a possible occurrence of a cyberattack. Our approach follows a user-centered design process and includes determining the types …
Perceptions Of Female Cybersecurity Professionals Toward Factors That Encourage Females To The Cybersecurity Field, Kembley Kay Lingelbach
Perceptions Of Female Cybersecurity Professionals Toward Factors That Encourage Females To The Cybersecurity Field, Kembley Kay Lingelbach
CCE Theses and Dissertations
Despite multiple national, educational, and industry initiatives, women continue to be underrepresented in the cybersecurity field. Only 11% of cybersecurity professionals, globally, are female. This contributes to the growing overall shortage of workers in the field. This research addressed the significant underrepresentation of females in the cybersecurity workforce. There are many practitioner and industry studies that suggest self-efficacy, discrimination and organizational culture play important roles in the low rate of women in the cybersecurity field. A limited number of scholarly studies identify causal factors; however, there is not a general consensus or framework to explain the problem thoroughly. Moreover, there …
Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook
Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook
Copyright, Fair Use, Scholarly Communication, etc.
The main aim of this thesis is to call for a new analysis of cyber security which departs from the traditional security theory. I argue that the cyber domain is inherently different in nature, in that it is lacking in traditional boundaries and is reflexive in nature. Policy-makers are aware of these characteristics, and in turn this awareness changes the way that national cyber security strategy is handled and understood. These changes cannot be adequately understood through traditional understanding of security, as they often are, without missing significant details. Rather, examining these changes through the lens of Ulrich Beck’s risk …
Malware Analysis Skills Taught In University Courses, Swetha Gorugantu
Malware Analysis Skills Taught In University Courses, Swetha Gorugantu
Browse all Theses and Dissertations
Career opportunities for malware analysts are growing at a fast pace due to the evolving nature of cyber threats as well as the necessity to counter them. However, employers are often unable to hire analysts fast though due to a lack of the required skillset. Hence, the primary purpose of the thesis is to conduct a gap analysis between the binary analysis skills taught in universities with those that the recruiters are looking for. Malware can be analyzed using three main types of tools and techniques: high-level profiling, static analysis, and dynamic analysis. These methods provide detailed information about the …
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Capstones
Breadcrumbs: Privacy as a Privilege Abstract
By: Prachi Bhardwaj
In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.
That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …
Cybersecurity Curriculum Development Initiatives, Seth Hamman, Kenneth M. Hopkinson
Cybersecurity Curriculum Development Initiatives, Seth Hamman, Kenneth M. Hopkinson
Engineering and Computer Science Faculty Presentations
No abstract provided.
Cybercrime: An Investigation Of The Attitudes And Environmental Factors That Make People More Willing To Participate In Online Crime, Dearbhail Kirwan
Cybercrime: An Investigation Of The Attitudes And Environmental Factors That Make People More Willing To Participate In Online Crime, Dearbhail Kirwan
Dissertations
Cybercrime incidence rates are increasing. In order to identify solutions to this problem, the sources of cybercrime need to be identified. This research attempted to identify a potential set of circumstances that create an environment in which people are more likely to engage in cybercrime. There are three aspects to this; (1) Behaviour on the internet – Are people more likely to engage in illicit activities online than in the physical world? (2) Crime Perceptions – Do people perceive cybercrime as being less serious than non-cybercrime? (3) Resources on the Internet – Are people aware of the types of free …
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Dynamic Adversarial Mining - Effectively Applying Machine Learning In Adversarial Non-Stationary Environments., Tegjyot Singh Sethi
Electronic Theses and Dissertations
While understanding of machine learning and data mining is still in its budding stages, the engineering applications of the same has found immense acceptance and success. Cybersecurity applications such as intrusion detection systems, spam filtering, and CAPTCHA authentication, have all begun adopting machine learning as a viable technique to deal with large scale adversarial activity. However, the naive usage of machine learning in an adversarial setting is prone to reverse engineering and evasion attacks, as most of these techniques were designed primarily for a static setting. The security domain is a dynamic landscape, with an ongoing never ending arms race …
Cyberpdx: A Camp For Broadening Participation In Cybersecurity, Wu-Chang Feng, Robert Liebman, Lois Delcambre, Michael Mooradian Lupro, Tim Sheard, Scott Britell, Gerald W. Recktenwald
Cyberpdx: A Camp For Broadening Participation In Cybersecurity, Wu-Chang Feng, Robert Liebman, Lois Delcambre, Michael Mooradian Lupro, Tim Sheard, Scott Britell, Gerald W. Recktenwald
University Studies Faculty Publications and Presentations
With society’s increasing dependence on technology infrastructure, the importance of securing the computers, networks, data, and algorithms that run our digital and physical lives is becoming critical. To equip the next generation of citizens for the challenges ahead, an effort is underway to introduce security content early in a student’s academic career. It is important that these efforts broaden participation and increase diversity in the field. While many camps and curricula focus on introducing technical content and skills related to cybersecurity, such approaches can prematurely limit how students view career opportunities in the field, potentially limiting those who ultimately pursue …
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
HON499 projects
The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information includes …
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Information Science Faculty Publications
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …
Cybersecurity In The Information Age
Cybersecurity In The Information Age
DePaul Magazine
According to the Identify Theft Resource Center, more than 750 breaches occurred in 2014, exposing more than 83 million records. Breaches occur because people have discovered that there’s money to be made from stealing corporate and customer information. Faced with this reality, consumers and companies may wonder if it’s possible to protect their personal and financial data. DePaul's College of Computing and Digital Media is training the next generation of cybersecurity experts to thwart cybersecurity attacks. In addition, DePaul faculty and alumni in data security offer advice to consumers on securing their financial and personal information.
Cybersecurity Vulnerabilities In The Smart Grid & Thermodynamical Properties Database Software, Abderrahmen Chouat, Shiyoon Joo, Jacob Holcombe
Cybersecurity Vulnerabilities In The Smart Grid & Thermodynamical Properties Database Software, Abderrahmen Chouat, Shiyoon Joo, Jacob Holcombe
Capstone Design Expo Posters
Project Scope: Smart grid stability and issues/ challenges associated with coupling nuclear and renewable energy source will be researched. The changes we can expect in grid technology so the robustness and resilience could be further improved will be addressed. This projects will entail literature surveys and may involve running some simulation software and comparisons. Another aspect of the project will be focus on nuclear plant as part of the future smart grid stability challenge. Specifically, this part of the project will entail CFD modeling of zig-zag Printed Circuit compact heat exchanger and modeling it in MATLAB and seeing the difference …
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
All Faculty Scholarship
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …
Enhancing The Interdisciplinary Curriculum In Cybersecurity By Engaging High-Impact Educational Practices, Li-Chiou Chen, Andreea Cotoranu
Enhancing The Interdisciplinary Curriculum In Cybersecurity By Engaging High-Impact Educational Practices, Li-Chiou Chen, Andreea Cotoranu
Cornerstone 3 Reports : Interdisciplinary Informatics
No abstract provided.
Cybersecurity: Growing Like Topsy!, Ibpp Editor
Cybersecurity: Growing Like Topsy!, Ibpp Editor
International Bulletin of Political Psychology
This article discusses cybersecurity in an intelligence context – what it is, what it does to us, and the sudden (and somewhat unplanned) increase in financial support for the area.