Open Access. Powered by Scholars. Published by Universities.®

Information Security Commons

Open Access. Powered by Scholars. Published by Universities.®

4,149 Full-Text Articles 5,731 Authors 3,061,789 Downloads 174 Institutions

All Articles in Information Security

Faceted Search

4,149 full-text articles. Page 84 of 176.

Canine For Disabled Kids Awareness Campaign Research And Implementation Plan, Jiamin Gu, Kendall Harcourt, Chang Liu, Kiamu Liu, Jemmie Tejada 2018 Clark University

Canine For Disabled Kids Awareness Campaign Research And Implementation Plan, Jiamin Gu, Kendall Harcourt, Chang Liu, Kiamu Liu, Jemmie Tejada

School of Professional Studies

According to the Americans with Disabilities Act (ADA) service animals are: “dogs that are individually trained to do work or perform tasks for people with disabilities” ( ADA, 2015). On the other hand, emotional support animals are: “dogs that provide comfort and support in forms of affection and companionship for an individual suffering from various mental and emotional conditions.” In addition, an emotional support animal is not required to perform any specific tasks for a disability like service dogs are (Ibid).

The ADA limits the number of questions that can be asked to protect the privacy of utilizers. In fact, …


Adult Learners: A Targeted Marketing Approach, Sarah Baldelli, Camilo Botero, Camille Ferreol, Caleb Horton, Xinyue Ma, Stefan Sprinkmoller 2018 Clark University

Adult Learners: A Targeted Marketing Approach, Sarah Baldelli, Camilo Botero, Camille Ferreol, Caleb Horton, Xinyue Ma, Stefan Sprinkmoller

School of Professional Studies

The development of the Adult Learner Capstone Project started with a focus and need to learn more about affinity groups in the Worcester area in order to reach the potential adult learner demographic. Although some partnerships already existed, the Director of Marketing and Communications for Graduate Admissions, Tara Probeck, yearned to explore the potential partnerships and alternative uses of professional organizations to market to the current working professionals. From this idea, our capstone project was introduced in hopes of establishing a comprehensive and exhaustive list of potential organizational partnerships, specific for the School of Professional Studies.


Inbound Marketing, Hasini Assiriyage, Isabelle Zoeckler, Emmanuel Aghado, Kefu Bu, Xiouyu Jiang, Rajesh Kamble, Yan Wang 2018 Clark University

Inbound Marketing, Hasini Assiriyage, Isabelle Zoeckler, Emmanuel Aghado, Kefu Bu, Xiouyu Jiang, Rajesh Kamble, Yan Wang

School of Professional Studies

This study looks into inbound marketing practice through the process of secondary research. This insight on best practices and market examples have been employed in order to identify the benefits of Inbound Marketing for the School of Professional Studies at Clark University. Through the research, this team has consolidated a number of recommendations for the SPS marketing strategies moving forward. A focus has been placed on identifying solutions, which were effective and financially feasible. The primary solutions are internally sourced; with a future long term recommendation of seeking advice from a third party firm to automate the process.


A Social Media Plan For The Changemakers’ Playground, Meng Cong, Ciara Kilian, Xinling Wang, Sumanth Wilson, Chenyu Yan 2018 Clark University

A Social Media Plan For The Changemakers’ Playground, Meng Cong, Ciara Kilian, Xinling Wang, Sumanth Wilson, Chenyu Yan

School of Professional Studies

The purpose of this project was to create a social media plan for the Changemakers’ Playground campaign. The Changemakers’ Playground is a website thought up by our client, Sarah Lange, whereby ordinary individuals doing extraordinary things in their community can be celebrated for the work they are doing. Each person featured on the website, also known as a Changemaker, was interviewed by Sarah and that interview was split into three videos to be posted on the Changemakers’ Playground website throughout the week they are being featured. In short, our task was to create the Facebook, Twitter, and Instagram content to …


Clear The Air: Moving Towards A More Supportive, Welcoming, Tobacco-Free Clark University, Edward Aroko, Simon Elliot, Jackson Espe, Donovan Smith, Michael Spanos 2018 Clark University

Clear The Air: Moving Towards A More Supportive, Welcoming, Tobacco-Free Clark University, Edward Aroko, Simon Elliot, Jackson Espe, Donovan Smith, Michael Spanos

School of Professional Studies

The deleterious health effects of the consumption of tobacco products, especially for youth, have been documented thoroughly and are nearly universally recognized. Numerous federal, state, and local regulations, coupled with health education and tobacco cessation initiatives have been launched to address these effects. Although these pushes have done much to reduce the rates of preventable health conditions and death due to the usage of tobacco, there remains much work to be done at the local level to discourage and disrupt patterns of substance use and abuse. The mission of Clark Clear the Air is to propose various and creative ways …


Efficient And Expressive Keyword Search Over Encrypted Data In The Cloud, Hui CUI, Zhiguo WAN, DENG, Robert H., Guilin WANG, Yingjiu LI 2018 Singapore Management University

Efficient And Expressive Keyword Search Over Encrypted Data In The Cloud, Hui Cui, Zhiguo Wan, Deng, Robert H., Guilin Wang, Yingjiu Li

Research Collection School Of Computing and Information Systems

Searchable encryption allows a cloud server to conduct keyword search over encrypted data on behalf of the data users without learning the underlying plaintexts. However, most existing searchable encryption schemes only support single or conjunctive keyword search, while a few other schemes that are able to perform expressive keyword search are computationally inefficient since they are built from bilinear pairings over the composite-order groups. In this paper, we propose an expressive public-key searchable encryption scheme in the prime-order groups, which allows keyword search policies (i.e., predicates, access structures) to be expressed in conjunctive, disjunctive or any monotonic Boolean formulas and …


Doas: Efficient Data Owner Authorized Search Over Encrypted Cloud Data, Yibin MIAO, Jianfeng MA, Ximeng LIU, Zhiquan LIU, Junwei ZHANG, Fushan WEI 2018 Singapore Management University

Doas: Efficient Data Owner Authorized Search Over Encrypted Cloud Data, Yibin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Junwei Zhang, Fushan Wei

Research Collection School Of Computing and Information Systems

Data outsourcing service can shift the local data storage and maintenance to cloud service provider (CSP) to ease the burden from data owner, but it brings the data security threats as CSP is always considered to honest-but-curious. Therefore, searchable encryption (SE) technique which allows cloud clients (including data owner and data user) to securely search over ciphertext through keywords and selectively retrieve files of interest is of prime importance. However, in practice, data user’s access permission always dynamically varies with data owner’s preferences. Moreover, existing SE schemes which are based on attribute-based encryption (ABE) incur heavy computational burden through attribution …


Expressive Query Over Outsourced Encrypted Data, Yang YANG, Ximeng LIU, Robert H. DENG 2018 Fuzhou University

Expressive Query Over Outsourced Encrypted Data, Yang Yang, Ximeng Liu, Robert H. Deng

Research Collection School Of Computing and Information Systems

Data security and privacy concerns in cloud storage services compel data owners to encrypt their sensitive data before outsourcing. Standard encryption systems, however, hinder users from issuing search queries on encrypted data. Though various systems for search over encrypted data have been proposed in the literature, existing systems use different encrypted index structures to conduct search on different search query patterns and hence are not compatible with each other. In this paper, we propose a query over encrypted data system which supports expressive search query patterns, such as single/conjunctive keyword query, range query, boolean query and mixed boolean query, all …


Exploring Relationship Between Indistinguishability-Based And Unpredictability-Based Rfid Privacy Models, Anjia YANG, Yunhui ZHUANG, Jian WENG, Gerhard HANCKE, Duncan S. WONG, Guomin YANG 2018 Singapore Management University

Exploring Relationship Between Indistinguishability-Based And Unpredictability-Based Rfid Privacy Models, Anjia Yang, Yunhui Zhuang, Jian Weng, Gerhard Hancke, Duncan S. Wong, Guomin Yang

Research Collection School Of Computing and Information Systems

A comprehensive privacy model plays a vital role in the design of privacy-preserving RFID authentication protocols. Among various existing RFID privacy models, indistinguishability-based (ind-privacy) and unpredictability-based (unp-privacy) privacy models are the two main categories. Unp*-privacy, a variant of unp-privacy has been claimed to be stronger than ind-privacy. In this paper, we focus on studying RFID privacy models and have three-fold contributions. We start with revisiting unp*-privacy model and figure out a limitation of it by giving a new practical traceability attack which can be proved secure under unp*-privacy model. To capture this kind of attack, we improve unp*-privacy model to …


A Home Security System Based On Smartphone Sensors, Michael Mahler 2018 University of Arkansas, Fayetteville

A Home Security System Based On Smartphone Sensors, Michael Mahler

Graduate Theses and Dissertations

Several new smartphones are released every year. Many people upgrade to new phones, and their old phones are not put to any further use. In this paper, we explore the feasibility of using such retired smartphones and their on-board sensors to build a home security system. We observe that door-related events such as opening and closing have unique vibration signatures when compared to many types of environmental vibrational noise. These events can be captured by the accelerometer of a smartphone when the phone is mounted on a wall near a door. The rotation of a door can also be captured …


Learning From Mutants: Using Code Mutation To Learn And Monitor Invariants Of A Cyber-Physical System, Yuqi CHEN, Christopher M. POSKITT, Jun SUN 2018 Singapore Management University

Learning From Mutants: Using Code Mutation To Learn And Monitor Invariants Of A Cyber-Physical System, Yuqi Chen, Christopher M. Poskitt, Jun Sun

Research Collection School Of Computing and Information Systems

Cyber-physical systems (CPS) consist of sensors, actuators, and controllers all communicating over a network; if any subset becomes compromised, an attacker could cause significant damage. With access to data logs and a model of the CPS, the physical effects of an attack could potentially be detected before any damage is done. Manually building a model that is accurate enough in practice, however, is extremely difficult. In this paper, we propose a novel approach for constructing models of CPS automatically, by applying supervised machine learning to data traces obtained after systematically seeding their software components with faults ("mutants"). We demonstrate the …


Low Latency Intrusion Detection In Smart Grids, Israel Zairi Akingeneye 2018 University of Arkansas, Fayetteville

Low Latency Intrusion Detection In Smart Grids, Israel Zairi Akingeneye

Graduate Theses and Dissertations

The transformation of traditional power grids into smart grids has seen more new technologies such as communication networks and smart meters (sensors) being integrated into the physical infrastructure of the power grids. However, these technologies pose new vulnerabilities to the cybersecurity of power grids as malicious attacks can be launched by adversaries to attack the smart meters and modify the measurement data collected by these meters. If not timely detected and removed, these attacks may lead to inaccurate system state estimation, which is critical to the system operators for control decisions such as economic dispatch and other related functions.

This …


Secure Multiparty Protocol For Differentially-Private Data Release, Anthony Harris 2018 Boise State University

Secure Multiparty Protocol For Differentially-Private Data Release, Anthony Harris

Boise State University Theses and Dissertations

In the era where big data is the new norm, a higher emphasis has been placed on models which guarantees the release and exchange of data. The need for privacy-preserving data arose as more sophisticated data-mining techniques led to breaches of sensitive information. In this thesis, we present a secure multiparty protocol for the purpose of integrating multiple datasets simultaneously such that the contents of each dataset is not revealed to any of the data owners, and the contents of the integrated data do not compromise individual’s privacy. We utilize privacy by simulation to prove that the protocol is privacy-preserving, …


File Fragment Classification Using Neural Networks With Lossless Representations, Luke Hiester 2018 East Tennessee State University

File Fragment Classification Using Neural Networks With Lossless Representations, Luke Hiester

Undergraduate Honors Theses

This study explores the use of neural networks as universal models for classifying file fragments. This approach differs from previous work in its lossless feature representation, with fragments’ bits as direct input, and its use of feedforward, recurrent, and convolutional networks as classifiers, whereas previous work has only tested feedforward networks. Due to the study’s exploratory nature, the models were not directly evaluated in a practical setting; rather, easily reproducible experiments were performed to attempt to answer the initial question of whether this approach is worthwhile to pursue further, especially due to its high computational cost. The experiments tested classification …


An Analysis Of International Agreements Over Cybersecurity, Lucas Ashbaugh 2018 University of Maine

An Analysis Of International Agreements Over Cybersecurity, Lucas Ashbaugh

Electronic Theses and Dissertations

Research into the international agreements that increase cooperation over cybersecurity challenges is severely lacking. This is a necessary next step for bridging diplomatic challenges over cybersecurity. This work aspires to be push the bounds of research into these agreements and offer a tool that future researchers can rely on. For this research I created, and made publicly available, the International Cybersecurity Cooperation Dataset (ICCD), which contains over 350 international cybersecurity agreements and pertinent metadata. Each agreement is marked per which subtopics within cybersecurity related agreements it covers. These typologies are:

  • Discussion and Dialogue

  • Research

  • Confidence Building Measures

  • Incident Response

  • Crime …


Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels 2018 Southern Methodist University

Comparative Study Of Deep Learning Models For Network Intrusion Detection, Brian Lee, Sandhya Amaresh, Clifford Green, Daniel Engels

SMU Data Science Review

In this paper, we present a comparative evaluation of deep learning approaches to network intrusion detection. A Network Intrusion Detection System (NIDS) is a critical component of every Internet connected system due to likely attacks from both external and internal sources. A NIDS is used to detect network born attacks such as Denial of Service (DoS) attacks, malware replication, and intruders that are operating within the system. Multiple deep learning approaches have been proposed for intrusion detection systems. We evaluate three models, a vanilla deep neural net (DNN), self-taught learning (STL) approach, and Recurrent Neural Network (RNN) based Long Short …


Blockchain In Payment Card Systems, Darlene Godfrey-Welch, Remy Lagrois, Jared Law, Russell Scott Anderwald, Daniel W. Engels 2018 Southern Methodist University

Blockchain In Payment Card Systems, Darlene Godfrey-Welch, Remy Lagrois, Jared Law, Russell Scott Anderwald, Daniel W. Engels

SMU Data Science Review

Payment cards (e.g., credit and debit cards) are the most frequent form of payment in use today. A payment card transaction entails many verification information exchanges between the cardholder, merchant, issuing bank, a merchant bank, and third-party payment card processors. Today, a record of the payment transaction often records to multiple ledgers. Merchant’s incur fees for both accepting and processing payment cards. The payment card industry is in dire need of technology which removes the need for third-party verification and records transaction details to a single tamper-resistant digital ledger. The private blockchain is that technology. Private blockchain provides a linked …


Malware For Macintosh, Nathan C. Shinabarger, Josiah E. Bills, Richard W. Lively, Noah S. Shinabarger 2018 Cedarville University

Malware For Macintosh, Nathan C. Shinabarger, Josiah E. Bills, Richard W. Lively, Noah S. Shinabarger

The Research and Scholarship Symposium (2013-2019)

Technology is a cornerstone of modern society. Unfortunately, it seems that every new piece of technology is accompanied by five computer-security breaches elsewhere. Most people associate hacks with Windows computers. This is a problem because Apple computers, and other non-Windows systems, are also extremely vulnerable to attacks and risk being compromised. Dolos is a piece of malware we developed intended to exploit the macOS Sierra operating system. It provides a framework for running exploits and comes built in with certain control and data exfiltration capabilities. Dolos also helps destroy the misconception of "the impenetrable Macintosh computer" by showing that Apple …


Computer Security Documentation For A Non-Technical Audience, Salman Quraishi 2018 Winona State University

Computer Security Documentation For A Non-Technical Audience, Salman Quraishi

Undergraduate Research Celebration 2018

This research project investigates the development of computer security documentation. Computer security includes the protection of hardware, software, and/or digital information from theft and/or damage, along with preventing disruption or misdirection of the services a computer may provide.The scope of the research was to develop a document detailing the basic fundamental concepts of computer security that individuals of all backgrounds can use without requiring prerequisite knowledge of computer security. The core concepts of the document encompass phishing, social engineering, password security, trusted/untrusted networks, viruses, malware, and antivirus software. Both technical and non-technical individuals can utilize the document to learn how …


Quantum Attacks On Modern Cryptography And Post-Quantum Cryptosystems, Zachary Marron 2018 Liberty University

Quantum Attacks On Modern Cryptography And Post-Quantum Cryptosystems, Zachary Marron

Senior Honors Theses

Cryptography is a critical technology in the modern computing industry, but the security of many cryptosystems relies on the difficulty of mathematical problems such as integer factorization and discrete logarithms. Large quantum computers can solve these problems efficiently, enabling the effective cryptanalysis of many common cryptosystems using such algorithms as Shor’s and Grover’s. If data integrity and security are to be preserved in the future, the algorithms that are vulnerable to quantum cryptanalytic techniques must be phased out in favor of quantum-proof cryptosystems. While quantum computer technology is still developing and is not yet capable of breaking commercial encryption, these …


Digital Commons powered by bepress