Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- San Jose State University (9)
- Florida International University (3)
- University of Arkansas, Fayetteville (3)
- East Tennessee State University (2)
- Embry-Riddle Aeronautical University (2)
-
- University of Massachusetts Amherst (2)
- University of Nebraska - Lincoln (2)
- Clemson University (1)
- Edith Cowan University (1)
- Georgia State University (1)
- Kennesaw State University (1)
- La Salle University (1)
- Louisiana State University (1)
- Old Dominion University (1)
- Singapore Management University (1)
- Technological University Dublin (1)
- The University of Southern Mississippi (1)
- West Virginia University (1)
- Western University (1)
- Publication
-
- Master's Projects (9)
- FIU Electronic Theses and Dissertations (3)
- Doctoral Dissertations (2)
- Electronic Theses and Dissertations (2)
- Graduate Theses and Dissertations (2)
-
- All Theses (1)
- Articles (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Cybersecurity: Deep Learning Driven Cybersecurity Research in a Multidisciplinary Environment (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Dissertations (1)
- Doctoral Dissertations and Master's Theses (1)
- EBCS Articles (1)
- Electronic Thesis and Dissertation Repository (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- Journal of Cybersecurity Education, Research and Practice (1)
- Journal of Digital Forensics, Security and Law (1)
- LSU Doctoral Dissertations (1)
- Library Philosophy and Practice (e-journal) (1)
- Mathematics and Computer Science Capstones (1)
- Research Collection School Of Computing and Information Systems (1)
- Research outputs 2022 to 2026 (1)
- Publication Type
Articles 1 - 30 of 35
Full-Text Articles in Computer Sciences
An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou
An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou
Doctoral Dissertations
With the proliferation of video content from surveillance cameras, social media, and live streaming services, the need for efficient video analytics has grown immensely. In recent years, machine learning based computer vision algorithms have shown great success in various video analytic tasks. Specifically, neural network models have dominated in visual tasks such as image and video classification, object recognition, object detection, and object tracking. However, compared with classic computer vision algorithms, machine learning based methods are usually much more compute-intensive. Powerful servers are required by many state-of-the-art machine learning models. With the development of cloud computing infrastructures, people are able …
Testsgd: Interpretable Testing Of Neural Networks Against Subtle Group Discrimination, Mengdi Zhang, Jun Sun, Jingyi Wang, Bing Sun
Testsgd: Interpretable Testing Of Neural Networks Against Subtle Group Discrimination, Mengdi Zhang, Jun Sun, Jingyi Wang, Bing Sun
Research Collection School Of Computing and Information Systems
Discrimination has been shown in many machine learning applications, which calls for sufficient fairness testing before their deployment in ethic-relevant domains. One widely concerning type of discrimination, testing against group discrimination, mostly hidden, is much less studied, compared with identifying individual discrimination. In this work, we propose TestSGD, an interpretable testing approach which systematically identifies and measures hidden (which we call ‘subtle’) group discrimination of a neural network characterized by conditions over combinations of the sensitive attributes. Specifically, given a neural network, TestSGD first automatically generates an interpretable rule set which categorizes the input space into two groups. Alongside, TestSGD …
Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak
Case Study: The Impact Of Emerging Technologies On Cybersecurity Education And Workforces, Austin Cusak
Journal of Cybersecurity Education, Research and Practice
A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a semi-structured interview with a panel of experts as well as small workgroups of professionals answering seven scenario-based questions. Data was thematically analyzed, with major findings emerging about the need to refocus cybersecurity STEM at the middle school level with problem-based learning, the disconnects between workforce operations and cybersecurity operators, the …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Data Poisoning: A New Threat To Artificial Intelligence, Nary Simms
Data Poisoning: A New Threat To Artificial Intelligence, Nary Simms
Mathematics and Computer Science Capstones
Artificial Intelligence (AI) adoption is rapidly being deployed in a number of fields, from banking and finance to healthcare, robotics, transportation, military, e-commerce and social networks. Grand View Research estimates that the global AI market was worth 93.5 billion in 2021 and that it will increase at a compound annual growth rate (CAGR) of 38.1% from 2022 to 2030. According to a 2020 MIT Sloan Management survey, 87% of multinational corporations believe that AI technology will provide a competitive edge. Artificial Intelligence relies heavily on datasets to train its models. The more data, the better it learns and predicts. However, …
Application Of Adversarial Attacks On Malware Detection Models, Vaishnavi Nagireddy
Application Of Adversarial Attacks On Malware Detection Models, Vaishnavi Nagireddy
Master's Projects
Malware detection is vital as it ensures that a computer is safe from any kind of malicious software that puts users at risk. Too many variants of these malicious software are being introduced everyday at increased speed. Thus, to guarantee security of computer systems, huge advancements in the field of malware detection are made and one such approach is to use machine learning for malware detection. Even though machine learning is very powerful, it is prone to adversarial attacks. In this project, we will try to apply adversarial attacks on malware detection models. To perform these attacks, fake samples that …
Machine Learning-Based Anomaly Detection In Cloud Virtual Machine Resource Usage, Tarun Mourya Satveli
Machine Learning-Based Anomaly Detection In Cloud Virtual Machine Resource Usage, Tarun Mourya Satveli
Master's Projects
Anomaly detection is an important activity in cloud computing systems because it aids in the identification of odd behaviours or actions that may result in software glitch, security breaches, and performance difficulties. Detecting aberrant resource utilization trends in virtual machines is a typical application of anomaly detection in cloud computing (VMs). Currently, the most serious cyber threat is distributed denial-of-service attacks. The afflicted server's resources and internet traffic resources, such as bandwidth and buffer size, are slowed down by restricting the server's capacity to give resources to legitimate customers.
To recognize attacks and common occurrences, machine learning techniques such as …
Classifying World War Ii Era Ciphers With Machine Learning, Brooke Dalton
Classifying World War Ii Era Ciphers With Machine Learning, Brooke Dalton
Master's Projects
We examine whether machine learning and deep learning techniques can classify World War II era ciphers when only ciphertext is provided. Among the ciphers considered are Enigma, M-209, Sigaba, Purple, and Typex. For our machine learning models, we test a variety of features including the raw ciphertext letter sequence, histograms, and n-grams. The classification is approached in two scenarios. The first scenario considers fixed plaintext encrypted with fixed keys and the second scenario considers random plaintext encrypted with fixed keys. The results show that histograms are the best feature and classic machine learning methods are more appropriate for this kind …
Explainable Ai For Android Malware Detection, Maithili Kulkarni
Explainable Ai For Android Malware Detection, Maithili Kulkarni
Master's Projects
Android malware detection based on machine learning (ML) is widely used by the mobile device security community. Machine learning models offer benefits in terms of detection accuracy and efficiency, but it is often difficult to understand how such models make decisions. As a result, popular malware detection strategies remain black box models, which may result in a lack of accountability and trust in the decisions made. The field of explainable artificial intelligence (XAI) attempts to shed light on such black box models. In this research, we apply XAI techniques to ML-based Android malware detection systems. We train classic ML models …
Supporting The Discovery, Reuse, And Validation Of Cybersecurity Requirements At The Early Stages Of The Software Development Lifecycle, Jessica Antonia Steinmann
Supporting The Discovery, Reuse, And Validation Of Cybersecurity Requirements At The Early Stages Of The Software Development Lifecycle, Jessica Antonia Steinmann
Doctoral Dissertations and Master's Theses
The focus of this research is to develop an approach that enhances the elicitation and specification of reusable cybersecurity requirements. Cybersecurity has become a global concern as cyber-attacks are projected to cost damages totaling more than $10.5 trillion dollars by 2025. Cybersecurity requirements are more challenging to elicit than other requirements because they are nonfunctional requirements that requires cybersecurity expertise and knowledge of the proposed system. The goal of this research is to generate cybersecurity requirements based on knowledge acquired from requirements elicitation and analysis activities, to provide cybersecurity specifications without requiring the specialized knowledge of a cybersecurity expert, and …
Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger
Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger
Computer Science and Computer Engineering Undergraduate Honors Theses
Over the past two decades, online discussion has skyrocketed in scope and scale. However, so has the amount of toxicity and offensive posts on social media and other discussion sites. Despite this rise in prevalence, the ability to automatically moderate online discussion platforms has seen minimal development. Recently, though, as the capabilities of artificial intelligence (AI) continue to improve, the potential of AI-based detection of harmful internet content has become a real possibility. In the past couple years, there has been a surge in performance on tasks in the field of natural language processing, mainly due to the development of …
A Machine Learning Approach For Reconnaissance Detection To Enhance Network Security, Rachel Bakaletz
A Machine Learning Approach For Reconnaissance Detection To Enhance Network Security, Rachel Bakaletz
Electronic Theses and Dissertations
Before cyber-crime can happen, attackers must research the targeted organization to collect vital information about the target and pave the way for the subsequent attack phases. This cyber-attack phase is called reconnaissance or enumeration. This malicious phase allows attackers to discover information about a target to be leveraged and used in an exploit. Information such as the version of the operating system and installed applications, open ports can be detected using various tools during the reconnaissance phase. By knowing such information cyber attackers can exploit vulnerabilities that are often unique to a specific version.
In this work, we develop an …
Graph Neural Networks For Malware Classification, Vrinda Malhotra
Graph Neural Networks For Malware Classification, Vrinda Malhotra
Master's Projects
Malware is a growing threat to the digital world. The first step to managing this threat is malware detection and classification. While traditional techniques rely on static or dynamic analysis of malware, the generation of these features requires expert knowledge. Function call graphs (FCGs) consist of program functions as their nodes and their interprocedural calls as their edges, providing a wealth of knowledge that can be utilized to classify malware without feature extraction that requires experts. This project treats malware classification as a graph classification problem, setting node features using the Local Degree Profile (LDP) model and using different graph …
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
Research outputs 2022 to 2026
Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …
Identifying Bots On Twitter With Benford’S Law, Sanmesh Bhosale
Identifying Bots On Twitter With Benford’S Law, Sanmesh Bhosale
Master's Projects
Over time Online Social Networks (OSNs) have grown exponentially in terms of active users and have now become an influential factor in the formation of public opinions. Due to this, the use of bots and botnets for spreading misinformation on OSNs has become a widespread concern. The biggest example of this was during the 2016 American Presidential Elections, where Russian bots on Twitter pumped out fake news to influence the election results.
Identifying bots and botnets on Twitter is not just based on visual analysis and can require complex statistical methods to score a profile based on multiple features and …
Analyzing And Detecting Android Malware And Deepfake, Md Shohel Rana
Analyzing And Detecting Android Malware And Deepfake, Md Shohel Rana
Dissertations
Rapid advances in artificial intelligence (AI), machine learning (ML), and deep learning (DL) over the past several decades have produced a variety of technologies and tools that, among numerous cybersecurity issues, have enticed cybercriminals and hackers to design malware for the Android operating systems and/or manipulate multimedia. For example, high-quality and realistic fake videos, images, or audios have been created to spread misinformation and propaganda, foment political discord and hate, or even harass and blackmail people; these manipulated, high-quality and realistic videos became known recently as Deepfake. There has been much work done in recent years on malware analysis and …
Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay
Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay
All Theses
The cybersecurity of power systems is jeopardized by the threat of spoofing and man-in-the-middle style attacks due to a lack of physical layer device authentication techniques for operational technology (OT) communication networks. OT networks cannot support the active probing cybersecurity methods that are popular in information technology (IT) networks. Furthermore, both active and passive scanning techniques are susceptible to medium access control (MAC) address spoofing when operating at Layer 2 of the Open Systems Interconnection (OSI) model. This thesis aims to analyze the role of deep learning in passively authenticating Ethernet devices by their communication signals. This method operates at …
Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison
Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison
EBCS Articles
Many online chat applications live in a grey area between the legitimate web and the dark net. The Telegram network in particular can aid criminal activities. Telegram hosts “chats” which consist of varied conversations and advertisements. These chats take place among automated “bots” and human users. Classifying legitimate activity from illegitimate activity can aid law enforcement in finding criminals. Social network analysis of Telegram chats presents a difficult problem. Users can change their username or create new accounts. Users involved in criminal activity often do this to obscure their identity. This makes establishing the unique identity behind a given username …
Using Torchattacks To Improve The Robustness Of Models With Adversarial Training, William S. Matos Díaz
Using Torchattacks To Improve The Robustness Of Models With Adversarial Training, William S. Matos Díaz
Cybersecurity: Deep Learning Driven Cybersecurity Research in a Multidisciplinary Environment
Adversarial training has proven to be one of the most successful ways to defend models against adversarial examples. This process consists of training a model with an adversarial example to improve the robustness of the model. In this experiment, Torchattacks, a Pytorch library made for importing adversarial examples more easily, was used to determine which attack was the strongest. Later on, the strongest attack was used to train the model and make it more robust against adversarial examples. The datasets used to perform the experiments were MNIST and CIFAR-10. Both datasets were put to the test using PGD, FGSM, and …
Data: The Good, The Bad And The Ethical, John D. Kelleher, Filipe Cabral Pinto, Luis M. Cortesao
Data: The Good, The Bad And The Ethical, John D. Kelleher, Filipe Cabral Pinto, Luis M. Cortesao
Articles
It is often the case with new technologies that it is very hard to predict their long-term impacts and as a result, although new technology may be beneficial in the short term, it can still cause problems in the longer term. This is what happened with oil by-products in different areas: the use of plastic as a disposable material did not take into account the hundreds of years necessary for its decomposition and its related long-term environmental damage. Data is said to be the new oil. The message to be conveyed is associated with its intrinsic value. But as in …
Defense By Deception Against Stealthy Attacks In Power Grids, Md Hasan Shahriar
Defense By Deception Against Stealthy Attacks In Power Grids, Md Hasan Shahriar
FIU Electronic Theses and Dissertations
Cyber-physical Systems (CPSs) and the Internet of Things (IoT) are converging towards a hybrid platform that is becoming ubiquitous in all modern infrastructures. The integration of the complex and heterogeneous systems creates enormous space for the adversaries to get into the network and inject cleverly crafted false data into measurements, misleading the control center to make erroneous decisions. Besides, the attacker can make a critical part of the system unavailable by compromising the sensor data availability. To obfuscate and mislead the attackers, we propose DDAF, a deceptive data acquisition framework for CPSs' hierarchical communication network. Each switch in the hierarchical …
Optimized Machine Learning Models Towards Intelligent Systems, Mohammadnoor Ahmad Mohammad Injadat
Optimized Machine Learning Models Towards Intelligent Systems, Mohammadnoor Ahmad Mohammad Injadat
Electronic Thesis and Dissertation Repository
The rapid growth of the Internet and related technologies has led to the collection of large amounts of data by individuals, organizations, and society in general [1]. However, this often leads to information overload which occurs when the amount of input (e.g. data) a human is trying to process exceeds their cognitive capacities [2]. Machine learning (ML) has been proposed as one potential methodology capable of extracting useful information from large sets of data [1]. This thesis focuses on two applications. The first is education, namely e-Learning environments. Within this field, this thesis proposes different optimized ML ensemble models to …
Network Traffic Based Botnet Detection Using Machine Learning, Anand Ravindra Vishwakarma
Network Traffic Based Botnet Detection Using Machine Learning, Anand Ravindra Vishwakarma
Master's Projects
The field of information and computer security is rapidly developing in today’s world as the number of security risks is continuously being explored every day. The moment a new software or a product is launched in the market, a new exploit or vulnerability is exposed and exploited by the attackers or malicious users for different motives. Many attacks are distributed in nature and carried out by botnets that cause widespread disruption of network activity by carrying out DDoS (Distributed Denial of Service) attacks, email spamming, click fraud, information and identity theft, virtual deceit and distributed resource usage for cryptocurrency mining. …
Knot Flow Classification And Its Applications In Vehicular Ad-Hoc Networks (Vanet), David Schmidt
Knot Flow Classification And Its Applications In Vehicular Ad-Hoc Networks (Vanet), David Schmidt
Electronic Theses and Dissertations
Intrusion detection systems (IDSs) play a crucial role in the identification and mitigation for attacks on host systems. Of these systems, vehicular ad hoc networks (VANETs) are difficult to protect due to the dynamic nature of their clients and their necessity for constant interaction with their respective cyber-physical systems. Currently, there is a need for a VANET-specific IDS that meets this criterion. To this end, a spline-based intrusion detection system has been pioneered as a solution. By combining clustering with spline-based general linear model classification, this knot flow classification method (KFC) allows for robust intrusion detection to occur. Due its …
Dynamic Fraud Detection Via Sequential Modeling, Panpan Zheng
Dynamic Fraud Detection Via Sequential Modeling, Panpan Zheng
Graduate Theses and Dissertations
The impacts of information revolution are omnipresent from life to work. The web services have signicantly changed our living styles in daily life, such as Facebook for communication and Wikipedia for knowledge acquirement. Besides, varieties of information systems, such as data management system and management information system, make us work more eciently. However, it is usually a double-edged sword. With the popularity of web services, relevant security issues are arising, such as fake news on Facebook and vandalism on Wikipedia, which denitely impose severe security threats to OSNs and their legitimate participants. Likewise, oce automation incurs another challenging security issue, …
Df 2.0: An Automated, Privacy Preserving, And Efficient Digital Forensic Framework That Leverages Machine Learning For Evidence Prediction And Privacy Evaluation, Robin Verma, Jayaprakash Govindaraj Dr, Saheb Chhabra, Gaurav Gupta
Df 2.0: An Automated, Privacy Preserving, And Efficient Digital Forensic Framework That Leverages Machine Learning For Evidence Prediction And Privacy Evaluation, Robin Verma, Jayaprakash Govindaraj Dr, Saheb Chhabra, Gaurav Gupta
Journal of Digital Forensics, Security and Law
The current state of digital forensic investigation is continuously challenged by the rapid technological changes, the increase in the use of digital devices (both the heterogeneity and the count), and the sheer volume of data that these devices could contain. Although data privacy protection is not a performance measure, however, preventing privacy violations during the digital forensic investigation, is also a big challenge. With a perception that the completeness of investigation and the data privacy preservation are incompatible with each other, the researchers have provided solutions to address the above-stated challenges that either focus on the effectiveness of the investigation …
Emulation Vs Instrumentation For Android Malware Detection, Anukriti Sinha
Emulation Vs Instrumentation For Android Malware Detection, Anukriti Sinha
Master's Projects
In resource constrained devices, malware detection is typically based on offline analysis using emulation. In previous work it has been claimed that such emulation fails for a significant percentage of Android malware because well-designed malware detects that the code is being emulated. An alternative to emulation is malware analysis based on code that is executing on an actual Android device. In this research, we collect features from a corpus of Android malware using both emulation and on-phone instrumentation. We train machine learning models based on emulated features and also train models based on features collected via instrumentation, and we compare …
Classifying Classic Ciphers Using Machine Learning, Nivedhitha Ramarathnam Krishna
Classifying Classic Ciphers Using Machine Learning, Nivedhitha Ramarathnam Krishna
Master's Projects
We consider the problem of identifying the classic cipher that was used to generate a given ciphertext message. We assume that the plaintext is English and we restrict our attention to ciphertext consisting only of alphabetic characters. Among the classic ciphers considered are the simple substitution, Vigenère cipher, playfair cipher, and column transposition cipher. The problem of classification is approached in two ways. The first method uses support vector machines (SVM) trained directly on ciphertext to classify the ciphers. In the second approach, we train hidden Markov models (HMM) on each ciphertext message, then use these trained HMMs as features …
Detection And Prevention Of Abuse In Online Social Networks, Sajedul Karim Talukder
Detection And Prevention Of Abuse In Online Social Networks, Sajedul Karim Talukder
FIU Electronic Theses and Dissertations
Adversaries leverage social networks to collect sensitive data about regular users and target them with abuse that includes fake news, cyberbullying, malware distribution, and propaganda. Such behavior is more effective when performed by the social network friends of victims. In two preliminary user studies we found that 71 out of 80 participants have at least 1 Facebook friend with whom (1) they never interact, either in Facebook or in real life, or whom they believe is (2) likely to abuse their posted photos or status updates, or (3) post offensive, false or malicious content. Such friend abuse is often considered …
Intelligent Malware Detection Using File-To-File Relations And Enhancing Its Security Against Adversarial Attacks, Lingwei Chen
Intelligent Malware Detection Using File-To-File Relations And Enhancing Its Security Against Adversarial Attacks, Lingwei Chen
Graduate Theses, Dissertations, and Problem Reports
With computing devices and the Internet being indispensable in people's everyday life, malware has posed serious threats to their security, making its detection of utmost concern. To protect legitimate users from the evolving malware attacks, machine learning-based systems have been successfully deployed and offer unparalleled flexibility in automatic malware detection. In most of these systems, resting on the analysis of different content-based features either statically or dynamically extracted from the file samples, various kinds of classifiers are constructed to detect malware. However, besides content-based features, file-to-file relations, such as file co-existence, can provide valuable information in malware detection and make …