Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Programming Languages and Compilers (3)
- Artificial Intelligence and Robotics (2)
- Business (2)
- Databases and Information Systems (2)
- Social and Behavioral Sciences (2)
-
- Systems Architecture (2)
- Theory and Algorithms (2)
- Communication (1)
- Communication Technology and New Media (1)
- Computer Engineering (1)
- Computer and Systems Architecture (1)
- Defense and Security Studies (1)
- Education (1)
- Engineering (1)
- Hardware Systems (1)
- Higher Education (1)
- Instructional Media Design (1)
- International Law (1)
- Internet Law (1)
- Law (1)
- Management Information Systems (1)
- Mass Communication (1)
- OS and Networks (1)
- Other Business (1)
- Other Computer Engineering (1)
- Other Computer Sciences (1)
- Other Sociology (1)
- Institution
- Keyword
-
- Cybersecurity (7)
- Security (3)
- Hacking (2)
- Technology (2)
- Adversarial Examples (1)
-
- Adversarial Training (1)
- Auditing (1)
- Blogging and influence (1)
- CIFAR-10 (1)
- Computer Security (1)
- Connectivity (1)
- Consular law (1)
- Crime (1)
- Cyber law (1)
- Cyberterrorism (1)
- Decentralized systems (1)
- Diplomatic law (1)
- Display (1)
- Espionage (1)
- Fake messages (1)
- General principles of law (1)
- Government documents (1)
- Healthcare (1)
- IT (1)
- Information security (1)
- Information storage and retrieval systems; Software; Hardware; (1)
- Information warfare (1)
- International law (1)
- Internet communication (1)
- Internet trolling and flaming (1)
- Publication
-
- Computer Science and Information Technology Grants Collections (5)
- Books & Book Chapters by Maurer Faculty (1)
- Bookshelf (1)
- College of Sciences Posters (1)
- Crime/Violence (1)
-
- Cybersecurity: Deep Learning Driven Cybersecurity Research in a Multidisciplinary Environment (1)
- Learning Showcase 2016: A Celebration of Discovery, Transformation and Success (1)
- Open Textbooks (1)
- Poster Presentations (1)
- School of Cybersecurity Posters (1)
- Summer Community of Scholars Posters (RCEU and HCR Combined Programs) (1)
- Undergraduate Research Celebration 2018 (1)
Articles 1 - 16 of 16
Full-Text Articles in Information Security
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Poster Presentations
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Unmasking Deception In Vanets: A Decentralized Approach To Verifying Truth In Motion, Susan Zehra, Syed R. Rizvi, Steven Olariu
Unmasking Deception In Vanets: A Decentralized Approach To Verifying Truth In Motion, Susan Zehra, Syed R. Rizvi, Steven Olariu
College of Sciences Posters
VANET, which stands for "Vehicular Ad Hoc Network," is a wireless network that allows vehicles to communicate with each other and with infrastructure, such as Roadside Units (RSUs), with the aim of enhancing road safety and improving the overall driving experience through real-time exchange of information and data. VANET has various applications, including traffic management, road safety alerts, and navigation. However, the security of VANET can be compromised if a malicious user alters the content of messages transmitted, which can harm both individual vehicles and the overall trust in VANET technology. Ensuring the correctness of messages is crucial for the …
Medical Devices And Cybersecurity, Hilary Finch
Medical Devices And Cybersecurity, Hilary Finch
School of Cybersecurity Posters
I begin by looking at the role of cybersecurity in the medical world. The healthcare industry adopted information technology quite quickly. While the advancement was obviously beneficial and necessary to keep up with an ever-growing demand, the healthcare industry did not place any kind of pointed focus on the security of their IT department, or the sensitive information housed therein.
When rapid advancements of technology outpaced the gradual advancement of hospital cybersecurity, security concerns became a difficult issue to control. There is a serious need for more advancements in hospital security. Each interconnected medical device has its own unique security …
Using Torchattacks To Improve The Robustness Of Models With Adversarial Training, William S. Matos Díaz
Using Torchattacks To Improve The Robustness Of Models With Adversarial Training, William S. Matos Díaz
Cybersecurity: Deep Learning Driven Cybersecurity Research in a Multidisciplinary Environment
Adversarial training has proven to be one of the most successful ways to defend models against adversarial examples. This process consists of training a model with an adversarial example to improve the robustness of the model. In this experiment, Torchattacks, a Pytorch library made for importing adversarial examples more easily, was used to determine which attack was the strongest. Later on, the strongest attack was used to train the model and make it more robust against adversarial examples. The datasets used to perform the experiments were MNIST and CIFAR-10. Both datasets were put to the test using PGD, FGSM, and …
Information Systems For Business And Beyond, David T. Bourgeois, James L. Smith, Shouhong Wang, Joseph Mortati
Information Systems For Business And Beyond, David T. Bourgeois, James L. Smith, Shouhong Wang, Joseph Mortati
Open Textbooks
This book is written as an introductory text, meant for those with little or no experience with computers or information systems. While sometimes the descriptions can get a bit technical, every effort has been made to convey the information essential to understanding a topic while not getting overly focused in detailed terminology.
The text is organized around thirteen chapters divided into three major parts, as follows:
• Part 1: What Is an Information System?
◦ Chapter 1: What Is an Information System? – This chapter provides an overview of information systems, including the history of how information systems got to …
Information Security Concepts And Administration (Ksu), Meng Han, Lei Li, Zhigang Li, Svetana Peltsverger, Ming Yang, Guangzhi Zheng
Information Security Concepts And Administration (Ksu), Meng Han, Lei Li, Zhigang Li, Svetana Peltsverger, Ming Yang, Guangzhi Zheng
Computer Science and Information Technology Grants Collections
This Grants Collection for Information Security Concepts and Administration was created under a Round Ten ALG Textbook Transformation Grant.
Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.
Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:
- Linked Syllabus
- Initial Proposal
- Final Report
Database Security And Auditing (Ksu), Lei Li, Rebecca H. Rutherfoord, Svetana Peltsverger, Richard Halstead-Nussloch, Jack Zheng, Zhigang Li
Database Security And Auditing (Ksu), Lei Li, Rebecca H. Rutherfoord, Svetana Peltsverger, Richard Halstead-Nussloch, Jack Zheng, Zhigang Li
Computer Science and Information Technology Grants Collections
This Grants Collection for Database Security and Auditing was created under a Round Eleven ALG Textbook Transformation Grant.
Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.
Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:
- Linked Syllabus
- Initial Proposal
- Final Report
Computer Security Documentation For A Non-Technical Audience, Salman Quraishi
Computer Security Documentation For A Non-Technical Audience, Salman Quraishi
Undergraduate Research Celebration 2018
This research project investigates the development of computer security documentation. Computer security includes the protection of hardware, software, and/or digital information from theft and/or damage, along with preventing disruption or misdirection of the services a computer may provide.The scope of the research was to develop a document detailing the basic fundamental concepts of computer security that individuals of all backgrounds can use without requiring prerequisite knowledge of computer security. The core concepts of the document encompass phishing, social engineering, password security, trusted/untrusted networks, viruses, malware, and antivirus software. Both technical and non-technical individuals can utilize the document to learn how …
Ethical Hacking: Network Security And Penetration Testing, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum
Ethical Hacking: Network Security And Penetration Testing, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum
Computer Science and Information Technology Grants Collections
This Grants Collection for Ethical Hacking: Network Security and Penetration Testing was created under a Round Eight ALG Textbook Transformation Grant.
Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.
Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:
- Linked Syllabus
- Initial Proposal
- Final Report
Wireless Security, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum
Wireless Security, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum
Computer Science and Information Technology Grants Collections
This Grants Collection for Wireless Security was created under a Round Eight ALG Textbook Transformation Grant.
Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.
Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:
- Linked Syllabus
- Initial Proposal
- Final Report
Ethical Hacking For Effective Defense, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca H. Rutherfoord, Svetana Peltsverger, Dawn Tatum
Ethical Hacking For Effective Defense, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca H. Rutherfoord, Svetana Peltsverger, Dawn Tatum
Computer Science and Information Technology Grants Collections
This Grants Collection for Ethical Hacking for Effective Defense was created under a Round Eight ALG Textbook Transformation Grant.
Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.
Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:
- Linked Syllabus
- Initial Proposal
- Final Report
Cyber Law And Espionage Law As Communicating Vessels, Asaf Lubin
Cyber Law And Espionage Law As Communicating Vessels, Asaf Lubin
Books & Book Chapters by Maurer Faculty
Professor Lubin's contribution is "Cyber Law and Espionage Law as Communicating Vessels," pp. 203-225.
Existing legal literature would have us assume that espionage operations and “below-the-threshold” cyber operations are doctrinally distinct. Whereas one is subject to the scant, amorphous, and under-developed legal framework of espionage law, the other is subject to an emerging, ever-evolving body of legal rules, known cumulatively as cyber law. This dichotomy, however, is erroneous and misleading. In practice, espionage and cyber law function as communicating vessels, and so are better conceived as two elements of a complex system, Information Warfare (IW). This paper therefore first draws …
Cybersecurity In An Age Of Cyberterrorism, University Of South Alabama
Cybersecurity In An Age Of Cyberterrorism, University Of South Alabama
Crime/Violence
Bibliography and photographs of a display of government documents from the University of South Alabama.
Source Credibility And Cybersecurity Behaviors Of Computer Users, Bracken Sallin
Source Credibility And Cybersecurity Behaviors Of Computer Users, Bracken Sallin
Summer Community of Scholars Posters (RCEU and HCR Combined Programs)
No abstract provided.
Design Implications Of Changing Student Demographics, Andy Igonor, Natalya Koehler
Design Implications Of Changing Student Demographics, Andy Igonor, Natalya Koehler
Learning Showcase 2016: A Celebration of Discovery, Transformation and Success
Many non-traditional higher education institutions have built their cyber security and computer science programs {CSCS) to cater to the needs of adult, working learners. Focusing on this demographic has implications for course and program design. Design approaches have therefore focused on strategies aimed at translating knowledge into learning nuggets specific to the adult learner, enabling day one job-readiness upon graduation. Recently, there has been increased focus on CSCS education at the high school level. The computer science for all initiative was announced recently by US President Obama, and there have been increased creativity on the part of higher education institutions …
[Introduction To] Identity And Leadership In Virtual Communities: Establishing Credibility And Influence, Dona J. Hickey, Joe Essid
[Introduction To] Identity And Leadership In Virtual Communities: Establishing Credibility And Influence, Dona J. Hickey, Joe Essid
Bookshelf
The presence and ubiquity of the internet continues to transform the way in which we identify ourselves and others both online and offline. The development of virtual communities permits users to create an online identity to interact with and influence one another in ways that vary greatly from face-to-face interaction.
Identity and Leadership in Virtual Communities: Establishing Credibility and Influence explores the notion of establishing an identity online, managing it like a brand, and using it with particular members of a community. Bringing together a range of voices exemplifying how participants in online communities influence one another, this book serves …