Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (6)
- Physical Sciences and Mathematics (6)
- Electrical and Computer Engineering (3)
- Information Security (3)
- Arts and Humanities (2)
-
- Communication (2)
- Communication Technology and New Media (2)
- Education (2)
- Engineering Education (2)
- Philosophy (2)
- Social and Behavioral Sciences (2)
- Systems and Communications (2)
- Applied Ethics (1)
- Business (1)
- Computer Law (1)
- Curriculum and Instruction (1)
- Databases and Information Systems (1)
- Digital Humanities (1)
- Ethics and Political Philosophy (1)
- Feminist, Gender, and Sexuality Studies (1)
- Law (1)
- Library and Information Science (1)
- Medicine and Health Sciences (1)
- Online and Distance Education (1)
- Other Philosophy (1)
- Public Health (1)
- Science and Technology Studies (1)
- Keyword
-
- Engineering (2)
- IoT (2)
- Privacy (2)
- 5G networks (1)
- Association and scheduling (1)
-
- Blockchain (1)
- Collaboration (1)
- Communications (1)
- Computer science (1)
- Consent (1)
- Consortium (1)
- Contextual integrity (1)
- Crowdsourcing (1)
- Cultural norms (1)
- Data (1)
- Data communication and computer networks course (1)
- Deep learning (1)
- Engineering technology program (1)
- Ethics (1)
- Identity (1)
- Incentivization (1)
- Industrial internet (1)
- Internet of Intelligent Things (IoIT) (1)
- Ionospher (1)
- Key management (1)
- Magnetic (1)
- Marketplace of services (1)
- Millimeter Wave (mmWave) networks (1)
- Morality (1)
- Multi-agent artificial intelligence (1)
- Publication
- Publication Type
Articles 1 - 12 of 12
Full-Text Articles in Digital Communications and Networking
Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore
Snitch Application: Addressing Cyber Trust In Future Living Spaces, Russell Moore
Cybersecurity Undergraduate Research Showcase
The future of smart homes is filled with excitement and ample opportunity to live in an environment that features extraordinary convenience and energy efficiency. Devices such as Amazon Alexa and Roku Smart TV’s feature voice interaction options that provide the user with enhanced functionality. While voice-activated devices are accommodating, it is imperative to acknowledge how they work on the backend. The problem is that these devices collect and share a large amount of data from users who are oftentimes unaware that it’s even happening. The Snitch App is being developed in order to inform the user of what exactly is …
Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson
Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson
Cybersecurity Undergraduate Research Showcase
Human behavior and data security utilization must be intertwined; in order to mitigate the negative effects of cyber attacks. No consumer wants their data hacked, breached, stolen, shared or wiped out. It is imperative to survey the type of education is needed to keep users safe and interested in securing their data. This can be done by simply seeking out the consumer's view of data security. The information obtained would allow the cybersecurity community to offer a simple way for consumers to protect their mobile data. There is a constant interaction between human behavior and the need for increased data …
Upgrading Of A Data Communication And Computer Networks Course In Engineering Technology Program, Murat Kuzlu, Otilia Popescu
Upgrading Of A Data Communication And Computer Networks Course In Engineering Technology Program, Murat Kuzlu, Otilia Popescu
Engineering Technology Faculty Publications
Data network communications is traditionally a course offered by computer engineering technology curricula, with the primary objective to introduce to the fundamental concepts in data communication and computer networks, as well as some level of hands-on component related to this area. Typical topics in such courses are the layered model of data communication, specifically the OSI seven-layered model, Internet routing, communication standards, protocols and technologies, and learning methods used to design the network and send data over the network in a secure manner. In the last decades, the data communication and applications have grown and become ubiquitous in both industry …
From Protecting To Performing Privacy, Garfield Benjamin
From Protecting To Performing Privacy, Garfield Benjamin
The Journal of Sociotechnical Critique
Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …
Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson
Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson
Electrical & Computer Engineering Theses & Dissertations
The current naval strategy is based on a distributed force, networked together with high-speed communications that enable operations as an intelligent, fast maneuvering force. Satellites, the existing network connector, are weak and vulnerable to attack. HF is an alternative, but it does not have the information throughput to meet the distributed warfighting need. The US Navy does not have a solution to reduce dependency on space-based communication systems while providing the warfighter with the required information speed.
Virtual SATCOM is a solution that can match satellite communications (SATCOM) data speed without the vulnerable satellite. It is wireless communication on a …
Topology Control, Scheduling, And Spectrum Sensing In 5g Networks, Prosanta Paul
Topology Control, Scheduling, And Spectrum Sensing In 5g Networks, Prosanta Paul
Electrical & Computer Engineering Theses & Dissertations
The proliferation of intelligent wireless devices is remarkable. To address phenomenal traffic growth, a key objective of next-generation wireless networks such as 5G is to provide significantly larger bandwidth. To this end, the millimeter wave (mmWave) band (20 GHz -300 GHz) has been identified as a promising candidate for 5G and WiFi networks to support user data rates of multi-gigabits per second. However, path loss at mmWave is significantly higher than today's cellular bands. Fortunately, this higher path loss can be compensated through the antenna beamforming technique-a transmitter focuses a signal towards a specific direction to achieve high signal gain …
Minding Morality: Ethical Artificial Societies For Public Policy Modeling, Saikou Y. Diallo, F. Leron Shults, Wesley J. Wildman
Minding Morality: Ethical Artificial Societies For Public Policy Modeling, Saikou Y. Diallo, F. Leron Shults, Wesley J. Wildman
VMASC Publications
Public policies are designed to have an impact on particular societies, yet policy-oriented computer models and simulations often focus more on articulating the policies to be applied than on realistically rendering the cultural dynamics of the target society. This approach can lead to policy assessments that ignore crucial social contextual factors. For example, by leaving out distinctive moral and normative dimensions of cultural contexts in artificial societies, estimations of downstream policy effectiveness fail to account for dynamics that are fundamental in human life and central to many public policy challenges. In this paper, we supply evidence that incorporating morally salient …
Exploring The Relationship Between Teamwork Skills And Team Members' Centrality, Francisco Cima, Pilar Pazos, Ana Maria Canto
Exploring The Relationship Between Teamwork Skills And Team Members' Centrality, Francisco Cima, Pilar Pazos, Ana Maria Canto
Engineering Management & Systems Engineering Faculty Publications
The present paper describes an exploratory study of small teams working on a four-month project as part of a graduate engineering program. The research had two primary goals. The first was to utilize the log files from shared repositories used for team collaboration to describe the network structure of the teams. The second was to determine whether the network centrality of any individual team member is associated with their teamwork skills and attitudes towards the collaboration platform. The relationship between teamwork skills, attitudes towards the collaboration technology, and the centrality index was explored using Pearson correlations. A total of 35 …
Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor)
Smart Communities: From Sensors To Internet Of Things And To A Marketplace Of Services, Stephan Olariu, Nirwan Ansari (Editor), Andreas Ahrens (Editor), Cesar Benavente-Preces (Editor)
Computer Science Faculty Publications
Our paper was inspired by the recent Society 5.0 initiative of the Japanese Government that seeks to create a sustainable human-centric society by putting to work recent advances in technology: sensor networks, edge computing, IoT ecosystems, AI, Big Data, robotics, to name just a few. The main contribution of this work is a vision of how these technological advances can contribute, directly or indirectly, to making Society 5.0 reality. For this purpose we build on a recently-proposed concept of Marketplace of Services that, in our view, will turn out to be one of the cornerstones of Society 5.0. Instead of …
Deepmag+ : Sniffing Mobile Apps In Magnetic Field Through Deep Learning, Rui Ning, Cong Wang, Chunsheng Xin, Jiang Li, Hongyi Wu
Deepmag+ : Sniffing Mobile Apps In Magnetic Field Through Deep Learning, Rui Ning, Cong Wang, Chunsheng Xin, Jiang Li, Hongyi Wu
Electrical & Computer Engineering Faculty Publications
This paper reports a new side-channel attack to smartphones using the unrestricted magnetic sensor data. We demonstrate that attackers can effectively infer the Apps being used on a smartphone with an accuracy of over 80%, through training a deep Convolutional Neural Networks (CNN). Various signal processing strategies have been studied for feature extractions, including a tempogram based scheme. Moreover, by further exploiting the unrestricted motion sensor to cluster magnetometer data, the sniffing accuracy can increase to as high as 98%. To mitigate such attacks, we propose a noise injection scheme that can effectively reduce the App sniffing accuracy to only …
A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo
A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo
Computational Modeling & Simulation Engineering Faculty Publications
The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …
Iot Devices In The Public Health Sector, Cayla Young
Iot Devices In The Public Health Sector, Cayla Young
Cybersecurity Undergraduate Research Showcase
In this research, proper attention is drawn to privacy and security concerns with the integration of Internet of Things (IoT) devices in the public health sector. Often, not much attention is given to IoT devices and its vulnerabilities concerning the medical industry. Effects of COVID-19 contact tracing applications are explored through research of various source types. Mitigation techniques for these privacy and security issues is given. Focus is brought to topics outlining the risks associated with genetic testing companies and the vulnerabilities of data collection and data storage. Recommendations are provided to help consumers avoid these risks. Lastly, a comprehensive …