Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

30,136 Full-Text Articles 29,968 Authors 7,711,165 Downloads 288 Institutions

All Articles in Computer Sciences

Faceted Search

30,136 full-text articles. Page 2 of 860.

Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne 2018 NC A&T State Unversity

Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne

KSU Proceedings on Cybersecurity Education, Research and Practice

In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two ...


Car Hacking: Can It Be That Simple?, Bryson Payne 2018 University of North Georgia

Car Hacking: Can It Be That Simple?, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoT) has expanded the reach of technology at work, at home, and even on the road. As Internet-connected and self-driving cars become more commonplace on our highways, the cybersecurity of these “data centers on wheels” is of greater concern than ever. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety. This article describes the integration of a module on car hacking into a semester-long ethical hacking cybersecurity course, including full ...


Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy 2018 Nova Southeastern University

Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

Many small businesses struggle to improve their cybersecurity posture despite the risk to their business. Small businesses lacking adequate protection from cyber threats, or a business continuity strategy to recover from disruptions, have a very high risk of loss due to a cyberattack. These cyberattacks, either deliberate or unintentional, can become costly when a small business is not prepared. This developmental research is focused on the relationship between two constructs that are associated with readiness and resilience of small businesses based on their cybersecurity planning, implementation, as well as response activities. A Cybersecurity Preparedness-Risk Taxonomy (CyPRisT) is proposed using the ...


Work Overload And Insiders’ Risk Taking Behaviors As Threats To Cybersecurity, Forough Nasirpouri Shadbad, David Biros Dr. 2018 Oklahoma State University - Main Campus

Work Overload And Insiders’ Risk Taking Behaviors As Threats To Cybersecurity, Forough Nasirpouri Shadbad, David Biros Dr.

KSU Proceedings on Cybersecurity Education, Research and Practice

Increasing the number of security breaches caused by humans, scholars are interested in exploring contributed factors of information security threats. There are several studies regarding security violations by malicious insiders and intentional behaviors; however, studies which focus on important factors and antecedents of human’s unintentional misbehaviors are rare. To this end, we aim to investigate human traits which lead to unintentional information security misbehaviors. Particularly, we study individual’s risk-taking behavior by applying Dual System Theory (DST). We have developed a theoretical model to find how individuals’ risk-taking behavior relates to online information security misbehaviors. Our hypothesized model consists ...


Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan 2018 North Carolina A&T State University

Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

According to the Verizon’s Data Breach Investigations Report, Local Area Network (LAN) access is the top vector for insider threats and misuses. It is critical for students to learn these vulnerabilities, understand the mechanisms of exploits, and know the countermeasures. The department of Computer Science at North Carolina A&T State University designed two different educational tools that help students learn ARP Spoofing Attacks, which is the most popular attack on LAN. The first tool, called Hacker’s Graphical User Interface (HGUI), is a visualization tool that demonstrates ARP Spoofing Attack with real time animation. The second tool is ...


Bipartite Quantum Interactions: Entangling And Information Processing Abilities, Siddhartha Das 2018 Louisiana State University and Agricultural and Mechanical College

Bipartite Quantum Interactions: Entangling And Information Processing Abilities, Siddhartha Das

LSU Doctoral Dissertations

The aim of this thesis is to advance the theory behind quantum information processing tasks, by deriving fundamental limits on bipartite quantum interactions and dynamics. A bipartite quantum interaction corresponds to an underlying Hamiltonian that governs the physical transformation of a two-body open quantum system. Under such an interaction, the physical transformation of a bipartite quantum system is considered in the presence of a bath, which may be inaccessible to an observer. The goal is to determine entangling abilities of such arbitrary bipartite quantum interactions. Doing so provides fundamental limitations on information processing tasks, including entanglement distillation and secret key ...


Liboblivious: A C++ Library For Oblivious Data Structures And Algorithms, Scott D. Constable, Steve Chapin 2018 Syracuse University

Liboblivious: A C++ Library For Oblivious Data Structures And Algorithms, Scott D. Constable, Steve Chapin

Electrical Engineering and Computer Science Technical Reports

Infrastructure as a service (IaaS) is an enormously beneficial model for centralized data computation and storage. Yet, existing network-layer and hardware-layer security protections do not address a broad category of vulnerabilities known as side-channel attacks. Over the past several years, numerous techniques have been proposed at all layers of the software/hardware stack to prevent the inadvertent leakage of sensitive data. This report discusses a new technique which integrates seamlessly with C++ programs. We introduce a library, libOblivious, which provides thin wrappers around existing C++ standard template library classes, endowing them with the property of memory-trace obliviousness.


Enhancement Of Media Splicing Detection: A General Framework, Songpon TEERAKANOK, Tetsutaro UEHARA 2018 Graduate School of Information Science and Engineering, Ritsumeikan University

Enhancement Of Media Splicing Detection: A General Framework, Songpon Teerakanok, Tetsutaro Uehara

Journal of Digital Forensics, Security and Law

Digital media (i.e., image, audio) has played an influential role in today information system. The increasing of popularity in digital media has brought forth many technological advancements. The advancements, however, also gives birth to a number of forgeries and attacks against this type of information. With the availability of easy-to-use media manipulating tools available online, the authenticity of today digital media cannot be guaranteed. In this paper, a new general framework for enhancing today media splicing detection has been proposed. By combining results from two traditional approaches, the enhanced detection results show improvement in term of clarity in which ...


Fingerprinting Jpegs With Optimised Huffman Tables, Sean McKeown, Gordon Russell, Petra Leimich 2018 Edinburgh Napier University

Fingerprinting Jpegs With Optimised Huffman Tables, Sean Mckeown, Gordon Russell, Petra Leimich

Journal of Digital Forensics, Security and Law

A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algorithms such as SHA256, for each image on a given medium, and comparing individual digests with a database of known contraband. However, the large capacities of modern storage media and time pressures placed on forensics examiners necessitates the development of more efficient processing methods. This work describes a technique for fingerprinting JPEGs with optimised Huffman tables which requires only the image header to be present on the media. Such fingerprints are shown to be robust across ...


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, hayden wimmer, Lei Chen, Carl Rebman 2018 Georgia Southern University

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are ...


A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. McCoy 2018 University of Central Oklahoma

A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy

Journal of Digital Forensics, Security and Law

As technology improves and economies become more globalized, the concept of currency has evolved. Bitcoin, a cryptographic digital currency, has been embraced as a secure and convenient type of money. Due to its security and privacy for the user, Bitcoin is a good tool for conducting criminal trades. The Financial Crimes Enforcement Network (FinCEN) has regulations in place to make identification information of Bitcoin purchasers accessible to law enforcement, but enforcing these rules with cash-for-Bitcoin traders is difficult. This study surveyed cash-for-Bitcoin vendors in Oklahoma, Texas, Arkansas, Missouri, Kansas, Colorado, and New Mexico to determine personal demographic information, knowledge of ...


Applied Cognitive Computing And Artificial Intelligence: How Machines Learn To “Read” The Law, Vern R. Walker 2018 Maurice A. Deane School of Law at Hofstra University

Applied Cognitive Computing And Artificial Intelligence: How Machines Learn To “Read” The Law, Vern R. Walker

Legal Tech Boot Camp

No abstract provided.


Introducing The Fractional Differentiation For Clinical Data-Justified Prostate Cancer Modelling Under Iad Therapy, Ozlem Ozturk Mizrak 2018 Illinois State University

Introducing The Fractional Differentiation For Clinical Data-Justified Prostate Cancer Modelling Under Iad Therapy, Ozlem Ozturk Mizrak

Annual Symposium on Biomathematics and Ecology: Education and Research

No abstract provided.


Issues In Reproducible Simulation Research, Ben G. Fitzpatrick 2018 Loyola Marymount University

Issues In Reproducible Simulation Research, Ben G. Fitzpatrick

Annual Symposium on Biomathematics and Ecology: Education and Research

No abstract provided.


Mathematical Modeling And Simulation With Deep Learning Methods Of Cancer Growth For Patient-Specific Therapy, Vishal Kobla, Joshua P. Smith, Pranav Unni, Padmanabhan Seshaiyer 2018 Academies of Loudoun

Mathematical Modeling And Simulation With Deep Learning Methods Of Cancer Growth For Patient-Specific Therapy, Vishal Kobla, Joshua P. Smith, Pranav Unni, Padmanabhan Seshaiyer

Annual Symposium on Biomathematics and Ecology: Education and Research

No abstract provided.


The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2016, Ven Basco 2018 University of Central Florida

The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2016, Ven Basco

Buenaventura "Ven" Basco

No abstract provided.


The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2017, Buenaventura "Ven" Basco 2018 University of Central Florida

The Subject Librarian Newsletter, Engineering And Computer Science, Spring 2017, Buenaventura "Ven" Basco

Buenaventura "Ven" Basco

No abstract provided.


The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2015, Ven Basco 2018 University of Central Florida

The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2015, Ven Basco

Buenaventura "Ven" Basco

No abstract provided.


The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2016, Buenaventura "Ven" Basco 2018 University of Central Florida

The Subject Librarian Newsletter, Engineering And Computer Science, Fall 2016, Buenaventura "Ven" Basco

Buenaventura "Ven" Basco

No abstract provided.


Two Neural Network Based Decentralized Controller Designs For Large Scale Power Systems, Wenxin Liu, Jagannathan Sarangapani, Ganesh K. Venayagamoorthy, Donald C. Wunsch, Mariesa Crow, David A. Cartes 2018 Missouri University of Science and Technology

Two Neural Network Based Decentralized Controller Designs For Large Scale Power Systems, Wenxin Liu, Jagannathan Sarangapani, Ganesh K. Venayagamoorthy, Donald C. Wunsch, Mariesa Crow, David A. Cartes

Donald C. Wunsch

This paper presents two neural network (NN) based decentralized controller designs for large scale power systems' generators, one is for the excitation control and the other is for the steam valve control. Though the control signals are calculated using local signals only, the transient and overall system stabilities can be guaranteed. NNs are used to approximate the unknown and/or imprecise dynamics of the local power system and the interconnection terms, thus the requirements for exact system parameters are released. Simulation studies with a three machine power system demonstrate the effectiveness of the proposed controller designs.


Digital Commons powered by bepress