Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Physical Sciences and Mathematics

Combating Intersection-Related Imposter Phenomenon In The Workplace Through Career Readiness, Simone Stewart Nov 2019

Combating Intersection-Related Imposter Phenomenon In The Workplace Through Career Readiness, Simone Stewart

Black Issues Conference

Research has determined that Impostor Phenomenon (IP) most likely occurs in members of minority groups, students, first generation professionals and persons for whom success came quickly. Other studies have shown that many professional women are One of the ways to combat IP is through the development of competencies needed in your career. Attend this workshop to learn how to develop strategies to approach career competency while on campus and throughout your career to keep you on top of your game!


Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne Oct 2019

Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points have greatly improved users' ability to connect to the Internet. However, they often lack the security mechanisms needed to protect users. Malicious actors could create a rogue access point (RAP), using a device such as the WiFi Pineapple Nano, that could trick users into connecting to an illegitimate access point (AP). To make them look legitimate, adversaries tend to setup RAPs to include a captive portal. This is very effective, since most public networks use captive portals as a means to provide genuine access. The objective of this study is to examine the effectiveness of RAP identification …


Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li Oct 2019

Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li

KSU Proceedings on Cybersecurity Education, Research and Practice

The security threats to mobile application are growing explosively. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Secure software development must be addressed earlier in the development lifecycle rather than fixing the security holes after attacking. Early eliminating against possible security vulnerability will help us increase the security of software and mitigate the consequence of damages of data loss caused by potential malicious attacking. In this paper, we present a static security analysis approach with open source FindSecurityBugs plugin for Android StThe security threats to mobile application are growing explosively. Mobile app …


Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne Oct 2019

Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.

These replay attacks can be accomplished by capturing recorded …


A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar Oct 2019

A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar

KSU Proceedings on Cybersecurity Education, Research and Practice

The massive global network that connects billions of humans and millions of devices and allow them to communicate with each other is known as the internet. Over the last couple of decades, the internet has grown expeditiously and became easier to use and became a great educational tool. Now it can used as a weapon that can steal someone’s identity, expose someone’s financial information, or can destroy your networking devices. Even in the last decade, there have been more cyber attacks and threats destroying major companies by breaching the databases that have millions of personal information that can be sold …


An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam Oct 2019

An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam

KSU Proceedings on Cybersecurity Education, Research and Practice

The growing market of the mobile application is overtaking the web application. Mobile application development environment is open source, which attracts new inexperienced developers to gain hands on experience with applicationn development. However, the security of data and vulnerable coding practice is an issue. Among all mobile Operating systems such as, iOS (by Apple), Android (by Google) and Blackberry (RIM), Android dominates the market. The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via the inadvertent or side channel, unsecured sensitive data storage, data transition and many others. Most of these …


Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward Oct 2019

Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward

KSU Proceedings on Cybersecurity Education, Research and Practice

Both consumers and businesses are rapidly adopting IoT premised on convenience and control. Industry and academic literature talk about billions of embedded IoT devices being implemented with use-cases ranging from smart speakers in the home, to autonomous trucks, and trains operating in remote industrial sites. Historically information systems supporting these disparate use-cases have been categorised as Information Technology (IT) or Operational Technology (OT), but IoT represents a fusion between these traditionally distinct information security models.

This paper presents a review of IEEE and Elsevier peer reviewed papers that identifies the direction in IoT education and training around information security. It …


Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez Oct 2019

Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.


Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz Oct 2019

Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Today’s college and university cybersecurity programs often contain multiple laboratory activities on various different hardware and software-based cybersecurity tools. These include preventive tools such as firewalls, virtual private networks, and intrusion detection systems. Some of these are tools used in attacking a network, such as packet sniffers and learning how to craft cross-site scripting attacks or man-in-the-middle attacks. All of these are important in learning cybersecurity. However, there is another important component of cybersecurity education – teaching students how to protect a system or network from attackers by learning their motivations, and how they think, developing the students’ “abilities to …


Internet Core Functions: Security Today And Future State, Jeffrey Jones Oct 2019

Internet Core Functions: Security Today And Future State, Jeffrey Jones

KSU Proceedings on Cybersecurity Education, Research and Practice

Never in the history of the world has so much trust been given to something that so few understand. Jeff reviews three core functions of the Internet along with recent and upcoming changes that will impact security and the world.


Preparing For Tomorrow By Looking At Yesterday, Peter Dooley Oct 2019

Preparing For Tomorrow By Looking At Yesterday, Peter Dooley

KSU Proceedings on Cybersecurity Education, Research and Practice

Why do we learn? Why do we study history? Why do we research the work of others? The answer is that there is value today in what was already learned and experienced, successes and failures. Mr. Dooley, a 25-year security professional and 20-year hospitality executive, will share his experiences and how our history in security will help us in thinking about our future.


Leadership’S Influence On Environmental Sustainability, Stallar Lufrano-Jardine May 2019

Leadership’S Influence On Environmental Sustainability, Stallar Lufrano-Jardine

International Conference on Gambling & Risk Taking

A phenomenological study within the gaming industry is currently being conducted to determine influential indicators within business operations. Based on interviews of executive leadership at global companies, participants disclosed the environmental developments at their organization based on industry norms and the ability to develop/execute environmental initiatives. Four themes emerged: the leader’s ideology and the political climate; the company’s founding principles; support from the industry and/or within the company; and the ability to change industry dynamics. Each leader touched on these four points. Regardless of department type, level of leadership, and the desire to be globally conscious, all participants remarked on …


Kelly Fraction Estimation For Multiple Correlated Bets, William Chin May 2019

Kelly Fraction Estimation For Multiple Correlated Bets, William Chin

International Conference on Gambling & Risk Taking

It is well-known that expected portfolio growth is maximized by maximizing

expected logarithmic utility. This investment criterion is known as Kelly betting.

It has many optimality properties but is considered to be risky. Blackjack

teams and other advantage gamblers practice a fraction of the Kelly optimal to

decrease risk. Some hedge fund managers are thought to practice according to

Kelly principles. We use a continuous multivariate Geometric Brownian motion

model and present an interval estimate for the historical fraction for a portfolio

of correlated bets, possibly including a risk-free asset. Historical data comes

from a range of sources and the …


Carolinas Sports Analytics Meeting. 2019 Schedule, Ben Grannan Apr 2019

Carolinas Sports Analytics Meeting. 2019 Schedule, Ben Grannan

Carolinas Sports Analytics Meeting

No abstract provided.


Plenary Speaker Biographies, Peter Keating, Hart Zwingelberg Apr 2019

Plenary Speaker Biographies, Peter Keating, Hart Zwingelberg

Carolinas Sports Analytics Meeting

Biographies of the 2019 Plenary Speakers for the Carolina Sports Analytics Meeting


12th Annual Research Week--Event Proceedings, Office Of Research And Sponsored Projects Operations Apr 2019

12th Annual Research Week--Event Proceedings, Office Of Research And Sponsored Projects Operations

Research Week Archived Proceedings

12th Annual Research Week

"A Celebration of Student Research"


If They Would Just Hush And Pay Attention, Quinton Granville Mar 2019

If They Would Just Hush And Pay Attention, Quinton Granville

National Youth Advocacy and Resilience Conference

An interactive session that prepares educators to apply literacy strategies such as “Real-Talk” to overcoming the challenges associated with engaging post-millennials in college and career aligned skill practice. The presenter demonstrates how to plan standards-based instruction that incorporates students’ voice as a tool for empowering students to apply their verbal and written communication skills to complete content-specific (i.e., social studies, ELA, science, etc.) assignments.


Use Of Exploratory Data Analysis And Visualization In Identification Of Commingled Human Remains, Vivek Bhat Hosmat Mar 2019

Use Of Exploratory Data Analysis And Visualization In Identification Of Commingled Human Remains, Vivek Bhat Hosmat

UNO Student Research and Creative Activity Fair

The field of Exploratory data analysis and Visualization is revolutionizing the way we perceive things. At times, Visualization is seen as a subset of Exploratory data analysis and then there are branches in Visualization, types, technologies, tools which makes one feel that Visualization is a standalone pillar. Either way, they both work well together to extract meaningful information from almost any kind of data. These fields can very well be the stepping stone for in-depth or conclusive research. They can direct research based on facts and observations rather than one’s intuition or even a brute force technique. This project was …


How Climate Change Is Driving Corporate Social Responsibility And Business Innovation, Faith Taylor Feb 2019

How Climate Change Is Driving Corporate Social Responsibility And Business Innovation, Faith Taylor

Sustainability Seminar Series

Climate Change continues to create ongoing challenges to companies, our communities and planet. Key stakeholders from employees to Investors request that we are all held accountable. Learn how companies have responded and the innovation that is driving change and hope for a better world. Be humbled, educated and inspired to make a difference.