Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (91)
- Engineering (84)
- Law (71)
- Computer Law (67)
- Legal Studies (64)
-
- Computer Engineering (63)
- Forensic Science and Technology (63)
- Business (58)
- Electrical and Computer Engineering (49)
- Management Information Systems (47)
- Databases and Information Systems (35)
- Technology and Innovation (33)
- Public Affairs, Public Policy and Public Administration (31)
- Sociology (28)
- OS and Networks (27)
- Other Computer Sciences (26)
- Defense and Security Studies (18)
- Aviation (17)
- Aviation Safety and Security (17)
- Software Engineering (17)
- Medicine and Health Sciences (16)
- National Security Law (16)
- Social Control, Law, Crime, and Deviance (16)
- Communication (15)
- Marketing (12)
- Social Media (12)
- Business and Corporate Communications (11)
- Institution
-
- Embry-Riddle Aeronautical University (67)
- Singapore Management University (57)
- Kennesaw State University (42)
- Edith Cowan University (25)
- Selected Works (18)
-
- San Jose State University (12)
- Clark University (11)
- University of New Haven (10)
- Air Force Institute of Technology (8)
- Nova Southeastern University (8)
- University for Business and Technology in Kosovo (8)
- City University of New York (CUNY) (5)
- University of Kentucky (5)
- Franklin University (4)
- Boise State University (3)
- Rose-Hulman Institute of Technology (3)
- University of Nebraska - Lincoln (3)
- California Polytechnic State University, San Luis Obispo (2)
- Dakota State University (2)
- Eastern Michigan University (2)
- Florida Institute of Technology (2)
- La Salle University (2)
- Michigan Technological University (2)
- Pace University (2)
- Southern Illinois University Carbondale (2)
- St. Cloud State University (2)
- United Arab Emirates University (2)
- University of Arkansas, Fayetteville (2)
- University of Nebraska at Omaha (2)
- University of New Orleans (2)
- Keyword
-
- Security (24)
- Digital forensics (14)
- Privacy (13)
- Computer forensics (9)
- Cybersecurity (8)
-
- Information security (8)
- Information systems (7)
- Android (6)
- Cloud computing (6)
- Computer security (6)
- Cyber security (6)
- Information technology (6)
- MPA (6)
- Cryptography (5)
- MSIT (5)
- ABE (4)
- Authentication (4)
- Cyber forensics (4)
- Digital Forensics (4)
- Mobile (4)
- Revocation (4)
- Survey (4)
- Applied sciences (3)
- Big data (3)
- Cloud storage (3)
- Computer science (3)
- Crime (3)
- Cyber (3)
- Cyber Security (3)
- Cybercrime (3)
- Publication
-
- Research Collection School Of Computing and Information Systems (56)
- Journal of Digital Forensics, Security and Law (43)
- KSU Proceedings on Cybersecurity Education, Research and Practice (30)
- Annual ADFSL Conference on Digital Forensics, Security and Law (21)
- Australian Information Security Management Conference (11)
-
- Master's Projects (11)
- School of Professional Studies (11)
- Electrical & Computer Engineering and Computer Science Faculty Publications (10)
- Australian Digital Forensics Conference (9)
- Gary C. Kessler (9)
- Theses and Dissertations (9)
- CCE Theses and Dissertations (8)
- UBT International Conference (8)
- Journal of Cybersecurity Education, Research and Practice (7)
- Theses and Dissertations--Computer Science (4)
- All Faculty and Staff Scholarship (3)
- Boise State University Theses and Dissertations (3)
- Faculty Publications (3)
- Leila A. Halawi (3)
- Publications (3)
- Saverio Perugini (3)
- Theses (3)
- Tracy Mitrano (3)
- ASA Multidisciplinary Research Symposium (2)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (2)
- Dissertations and Theses (2)
- Faculty Research & Publications (2)
- Graduate Theses and Dissertations (2)
- KSU Journey Honors College Capstones and Theses (2)
- Master of Science in Information Technology Theses (2)
- Publication Type
- File Type
Articles 331 - 338 of 338
Full-Text Articles in Information Security
U.S. Energy Sector Cybersecurity: Hands-Off Approach Or Effective Partnership?, T. M. Ballou, Joseph A. Allen, Kyle Francis
U.S. Energy Sector Cybersecurity: Hands-Off Approach Or Effective Partnership?, T. M. Ballou, Joseph A. Allen, Kyle Francis
Psychology Faculty Publications
Recent reporting has identified significant threats to the U.S. energy’s critical infrastructure from nation states and other groups through cyberspace. Efforts to improve the security and resilience of U.S. energy infrastructure relies upon voluntary partnerships between the U.S. Government and public and private energy infrastructure owners. This paper examines ideal Public-Private Partnership (PPP) characteristics and compares them to an actual PPP in the U.S. The results identify strengths of and challenges to efforts to secure U.S. energy infrastructure. The research was conducted through a combination of literature reviews and interviews with a sample of U.S-government and private-energy infrastructure representatives.
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Publications
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …
The Corporate Security Stratum Of Work: Identifying Levels Of Work In The Domain, Codee Roy Ludbey
The Corporate Security Stratum Of Work: Identifying Levels Of Work In The Domain, Codee Roy Ludbey
Theses : Honours
Corporate security is a practicing domain and developing academic discipline that provides for the protection of people, information and assets, as well as the self-protection of organisations. Fayol (1949) articulated such an activity within organisations to be a core business function of significant importance; embedding security operations within all aspects of organisational work. This embedded nature of security within organisations has led to difficulty in the literature delineating roles and responsibilities of security practitioners; consequently leading to a nebulous understanding of security as a whole. Therefore, an investigation of the corporate security stratum of work has been undertaken to address …
An Investigation Into Off-Link Ipv6 Host Enumeration Search Methods, Clinton Carpene
An Investigation Into Off-Link Ipv6 Host Enumeration Search Methods, Clinton Carpene
Theses: Doctorates and Masters
This research investigated search methods for enumerating networked devices on off-link 64 bit Internet Protocol version 6 (IPv6) subnetworks. IPv6 host enumeration is an emerging research area involving strategies to enable detection of networked devices on IPv6 networks. Host enumeration is an integral component in vulnerability assessments (VAs), and can be used to strengthen the security profile of a system. Recently, host enumeration has been applied to Internet-wide VAs in an effort to detect devices that are vulnerable to specific threats. These host enumeration exercises rely on the fact that the existing Internet Protocol version 4 (IPv4) can be exhaustively …
Controlled Access To Cloud Resources For Mitigating Economic Denial Of Sustainability (Edos) Attacks, Zubair A. Baig, Sadiq M. Sait, Farid Binbeshr
Controlled Access To Cloud Resources For Mitigating Economic Denial Of Sustainability (Edos) Attacks, Zubair A. Baig, Sadiq M. Sait, Farid Binbeshr
Research outputs 2014 to 2021
Cloud computing is a paradigm that provides scalable IT resources as a service over the Internet. Vulnerabilities in the cloud infrastructure have been readily exploited by the adversary class. Therefore, providing the desired level of assurance to all stakeholders through safeguarding data (sensitive or otherwise) which is stored in the cloud, is of utmost importance. In addition, protecting the cloud from adversarial attacks of diverse types and intents, cannot be understated. Economic Denial of Sustainability (EDoS) attack is considered as one of the concerns that has stalled many organizations from migrating their operations and/or data to the cloud. This is …
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions, Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions, Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo
Research Collection School Of Computing and Information Systems
We propose two new ciphertext policy attributebased encryption (CP-ABE) schemes where the access policy is defined by AND-gate with wildcard. In the first scheme, we present a new technique that uses only one group element to represent an attribute, while the existing ABE schemes of the same type need to use three different group elements to represent an attribute for the three possible values (namely, positive, negative, and wildcard). Our new technique leads to a new CP-ABE scheme with constant ciphertext size, which, however, cannot hide the access policy used for encryption. The main contribution of this paper is to …
Design Of An Intrusion Detection System (Ids) And An Intrusion Prevention System (Ips) For The Eiu Cybersecurity Laboratory, Adekunle Adeyemo
Design Of An Intrusion Detection System (Ids) And An Intrusion Prevention System (Ips) For The Eiu Cybersecurity Laboratory, Adekunle Adeyemo
Masters Theses
Cyber Security will always be a subject of discussion for a long time to come. Research has shown that there is massive growth of cyber-crime and the currently available number of Cyber Security experts to counter this is limited. Although there are multiple resources discussing Cyber Security, but access to training in practical applications is limited. As an institution, Eastern Illinois University (EIU) is set to start Masters of Science in Cyber Security in Fall 2017. Then the challenge is how EIU will expose students to the practical reality of Cyber Security where they can learn different detection, prevention and …
Privacy-Preserving And Verifiable Data Aggregation, Ngoc Hieu Tran, Robert H. Deng, Hwee Hwa Pang
Privacy-Preserving And Verifiable Data Aggregation, Ngoc Hieu Tran, Robert H. Deng, Hwee Hwa Pang
Research Collection School Of Computing and Information Systems
There are several recent research studies on privacy-preserving aggregation of time series data, where an aggregator computes an aggregation of multiple users' data without learning each individual's private input value. However, none of the existing schemes allows the aggregation result to be verified for integrity. In this paper, we present a new data aggregation scheme that protects user privacy as well as integrity of the aggregation. Towards this end, we first propose an aggregate signature scheme in a multi-user setting without using bilinear maps. We then extend the aggregate signature scheme into a solution for privacy-preserving and verifiable data aggregation. …