Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Electrical and Computer Engineering

A New Classification Method For Encrypted Internet Traffic Using Machine Learning, Mesut Uğurlu, İbrahi̇m Alper Doğru, Recep Si̇nan Arslan Jan 2021

A New Classification Method For Encrypted Internet Traffic Using Machine Learning, Mesut Uğurlu, İbrahi̇m Alper Doğru, Recep Si̇nan Arslan

Turkish Journal of Electrical Engineering and Computer Sciences

The rate of internet usage in the world is over 62% and this rate is increasing day by day. With this increase, it becomes important to ensure the confidentiality of the information in the traffic flowing over the internet. Encryption algorithms and protocols are used for this purpose. This situation, which is beneficial for normal users, is also used by attackers to hide. Cyber attackers or hackers gain the ability to bypass security precautions such as IDS/IPS and antivirus systems with using encrypted traffic. Since payload analysis cannot be performed without deciphering the encrypted traffic, existing commercial security solutions fall …


A Study Of Security Problems In Big Data And Their Solutions, Nozima Akhmedova Aug 2020

A Study Of Security Problems In Big Data And Their Solutions, Nozima Akhmedova

Chemical Technology, Control and Management

Statistical data on information security that concerns Big Data and is the most important for enterprises are provided. Based on this data, we studied problems such as the lack of big data practices and protection, the lack of techniques for protecting big data, the lack of standards for protecting big data, the lack of regulation of big data and ecosystems, security problems in Big Data, and proposed several proposals to improve the security of systems that use this technology.


Digital Forensics In Law Enforcement: A Needs Based Analysis Of Indiana Agencies, Teri A. Cummins Flory Jan 2016

Digital Forensics In Law Enforcement: A Needs Based Analysis Of Indiana Agencies, Teri A. Cummins Flory

Journal of Digital Forensics, Security and Law

Cyber crime is a growing problem, with the impact to society increasing exponentially, but the ability of local law enforcement agencies to investigate and successfully prosecute criminals for these crimes is unclear. Many national needs assessments have previously been conducted, and all indicated that state and local law enforcement did not have the training, tools, or staff to effectively conduct digital investigations, but very few have been completed recently. This study provided a current and localized assessment of the ability of Indiana law enforcement agencies to effectively investigate crimes involving digital evidence, the availability of training for both law enforcement …


On Cyber Attacks And Signature Based Intrusion Detection For Modbus Based Industrial Control Systems, Wei Gao, Thomas H. Morris Jan 2014

On Cyber Attacks And Signature Based Intrusion Detection For Modbus Based Industrial Control Systems, Wei Gao, Thomas H. Morris

Journal of Digital Forensics, Security and Law

Industrial control system communication networks are vulnerable to reconnaissance, response injection, command injection, and denial of service attacks. Such attacks can lead to an inability to monitor and control industrial control systems and can ultimately lead to system failure. This can result in financial loss for control system operators and economic and safety issues for the citizens who use these services. This paper describes a set of 28 cyber attacks against industrial control systems which use the MODBUS application layer network protocol. The paper also describes a set of standalone and state based intrusion detection system rules which can be …


Developing A Conceptual Framework For Modeling Deviant Cyber Flash Mob: A Socio-Computational Approach Leveraging Hypergraph Constructs, Samer Al-Khateeb, Nitin Agarwal Jan 2014

Developing A Conceptual Framework For Modeling Deviant Cyber Flash Mob: A Socio-Computational Approach Leveraging Hypergraph Constructs, Samer Al-Khateeb, Nitin Agarwal

Journal of Digital Forensics, Security and Law

In a Flash Mob (FM) a group of people get together in the physical world perform an unpredicted act and disperse quickly. Cyber Flash Mob (CFM) is the cyber manifestation of flash mob coordinated primarily using social media. Deviant Cyber Flash Mob (or, DCFM) is a special case of CFM, which is categorized as the new face of transnational crime organizations (TCOs). The DCFM phenomenon can be considered as a form of a cyber-collective action that is defined as an action aiming to improve group’s conditions (such as, status or power). In this paper, we conduct a conceptual analysis of …


An Australian Perspective On The Challenges For Computer And Network Security For Novice Endusers, Patryk Szewczyk Jan 2012

An Australian Perspective On The Challenges For Computer And Network Security For Novice Endusers, Patryk Szewczyk

Journal of Digital Forensics, Security and Law

It is common for end-users to have difficulty in using computer or network security appropriately and thus have often been ridiculed when misinterpreting instructions or procedures. This discussion paper details the outcomes of research undertaken over the past six years on why security is overly complex for endusers. The results indicate that multiple issues may render end-users vulnerable to security threats and that there is no single solution to address these problems. Studies on a small group of senior citizens has shown that educational seminars can be beneficial in ensuring that simple security aspects are understood and used appropriately.


Electronic Publishing For Engineering Education, Donald G. Dudley Jan 2006

Electronic Publishing For Engineering Education, Donald G. Dudley

Turkish Journal of Electrical Engineering and Computer Sciences

Electronic transmission of text is a revolution in progress with a profound effect on engineering education. As with all revolutions, the result is both a threat and a promise. The promise is the ease and speed of dissemination of text. The threat involves serious difficulties that arise in efforts to protect the intellectual property rights of the authors and publishers of the technical information. In this paper, we discuss both the threat and the promise. We highlight the differences in dealing with books and with journals. We give a wide range of examples from both inside of and outside of …