Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2,223 Full-Text Articles 3,664 Authors 1,124,087 Downloads 149 Institutions

All Articles in Digital Communications and Networking

Faceted Search

2,223 full-text articles. Page 1 of 90.

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum 2023 University of South Florida

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott III 2023 Stephen F. Austin State University

Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii

Electronic Theses and Dissertations

This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.


Sensor Module Network For Monitoring Trace Gases In The International Space Station, Aaron Beck, Drake Provost, Christopher English, Kamrin Gustave 2023 Northern Illinois University

Sensor Module Network For Monitoring Trace Gases In The International Space Station, Aaron Beck, Drake Provost, Christopher English, Kamrin Gustave

Honors Capstones

The Jet Propulsion Laboratory (JPL) of the National Aeronautics and Space Administration (NASA) aims to develop a sensor network for the International Space Station (ISS) to ensure a comprehensive understanding of air quality within the station. The accumulation of carbon dioxide (CO­­­­­2) can lead to cognitive impairment, headaches, and potentially dangerous situations at high concentrations. Monitoring air content at the ISS is critical to maintaining a healthy environment for crew onboard. Exposure to harmful gases causes negative side effects that make crew sick, which may interfere with their responsibilities. CO2 is a gas that should be monitored …


Breast Tissue Tumor Detection Using Microstrip Patch Antenna With Defected Ground Structure, Nihal F. F. Areed, Hamdi Ahmed El Mikati, Laila T. Rakha 2023 Prof. at Electronics and Communications Engineering Department, Faculty of Engineering, Mansoura University-

Breast Tissue Tumor Detection Using Microstrip Patch Antenna With Defected Ground Structure, Nihal F. F. Areed, Hamdi Ahmed El Mikati, Laila T. Rakha

Mansoura Engineering Journal

This work proposes a slotted microstrip patch antenna with an inset feed and defective ground structure (DGS). The proposed antenna is built with Roger-RT/5880 (Ԑr=2.2) as the substrate material for X-band application with a resonant frequency of 10 GHz. The proposed design has been simulated using Finite Element Method (FEM) and the results of bandwidth and gain read about 700MHz and 8dB; respectively. The suggested design is compared with previously published equivalent designs in light of the most recent research. The comparison reveal that that the suggested design with tuned dimensions offers higher gain and wider bandwidth than what has …


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman 2023 University of South Florida

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer 2023 National Defense University, College of Information and Cyberspace

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane 2023 University of South Florida

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant 2023 University of Nebraska at Omaha

Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant

Theses/Capstones/Creative Projects

The Michigan Army National Guard DCOE is hoping to increase their understanding of the physical, electrical, protocol, and logical topography of internet service. In order to understand the infrastructure of the internet, information must be collected on its pieces. By studying, describing, and illustrating the infrastructure of the global internet we can develop hardening tactics, improve user training, and develop contingency plans in the case of an attack. The research is focused on where data lives, locating data centers in the region, identifying global infrastructure and who owns it, and potential for hardening. An interactive map has been created in …


Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim 2023 University of Arkansas, Fayetteville

Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim

Computer Science and Computer Engineering Undergraduate Honors Theses

In today’s world where any and all activity on the internet produces data, user data privacy and autonomy are not prioritized. Companies called data brokers are able to gather data elements of personal information numbering in the billions. This data can be anything from purchase history, credit card history, downloaded applications, and service subscriptions. This information can be analyzed and inferences can be drawn from analysis, categorizing people into groups that range in sensitivity — from hobbies to race and income classes. Not only do these data brokers constantly overlook data privacy, this mass amount of data makes them extremely …


The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob 2023 Liberty University

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob

Senior Honors Theses

Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …


Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros 2023 California State University, San Bernardino

Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros

Electronic Theses, Projects, and Dissertations

Cyberattacks are a major problem for public organizations across the nation, and unfortunately for them, the frequency of these attacks is constantly growing. This project used a case study approach to explore the types of cybersecurity public organization agencies face and how those crimes can be mitigated. The goal of this paper is to understand how public organization agencies have prepared for cyberattacks and discuss additional suggestions to improve their current systems with the current research available This research provides an analysis of current cyber security systems, new technologies that can be implemented, roadblocks public agencies face before and during …


Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer 2023 University of Tartu

Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer

School of Cybersecurity Faculty Publications

The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of …


Vanet Applications Under Loss Scenarios & Evolving Wireless Technology, Adil Alsuhaim 2023 Clemson University

Vanet Applications Under Loss Scenarios & Evolving Wireless Technology, Adil Alsuhaim

All Dissertations

In this work we study the impact of wireless network impairment on the performance of VANET applications such as Cooperative Adaptive Cruise Control (CACC), and other VANET applications that periodically broadcast messages. We also study the future of VANET application in light of the evolution of radio access technologies (RAT) that are used to exchange messages. Previous work in the literature proposed fallback strategies that utilizes on-board sensors to recover in case of wireless network impairment, those methods assume a fixed time headway value, and do not achieve string stability. In this work, we study the string stability of a …


Enhanced Mobile Networking Using Multi-Connectivity And Packet Duplication In Next-Generation Cellular Networks, Prabodh Mishra 2023 Clemson University

Enhanced Mobile Networking Using Multi-Connectivity And Packet Duplication In Next-Generation Cellular Networks, Prabodh Mishra

All Dissertations

Modern cellular communication systems need to handle an enormous number of users and large amounts of data, including both users as well as system-oriented data. 5G is the fifth-generation mobile network and a new global wireless standard that follows 4G/LTE networks. The uptake of 5G is expected to be faster than any previous cellular generation, with high expectations of its future impact on the global economy. The next-generation 5G networks are designed to be flexible enough to adapt to modern use cases and be highly modular such that operators would have the flexibility to provide selective features based on user …


Enabling High Throughput And Reliable Low Latency Communication Over Vehicular Mobility In Next-Generation Cellular Networks, Snigdhaswin Kar 2023 Clemson University

Enabling High Throughput And Reliable Low Latency Communication Over Vehicular Mobility In Next-Generation Cellular Networks, Snigdhaswin Kar

All Dissertations

The fifth-generation (5G) networks and beyond need paradigm shifts to realize the exponentially increasing demands of next-generation services for high throughputs, low latencies, and reliable communication under various mobility scenarios. However, these promising features have critical gaps that need to be filled before they can be fully implemented for mobile applications in complex environments like smart cities. Although the sub-6 GHz bands can provide reliable and larger coverage, they cannot provide high data rates with low latencies due to a scarcity of spectrum available in these bands. Millimeter wave (mmWave) communication is a key enabler for a significant increase in …


Critical Infrastructure Workforce Development Pods For Teaching Cybersecurity Using Netlab+, Gideon Sutterfield 2023 University of Arkansas, Fayetteville

Critical Infrastructure Workforce Development Pods For Teaching Cybersecurity Using Netlab+, Gideon Sutterfield

Computer Science and Computer Engineering Undergraduate Honors Theses

As digital automation for Industrial Control Systems has grown, so has its
vulnerability to cyberattacks. The world of industry has responded effectively to this, but the world of academia is still lagging as its emphasis is still almost entirely on information technology. Considering this, we created a workforce development pod that serves as a hands-on learning module for teaching students key cybersecurity ideas surrounding operational technology using the NETLAB+ platform. A pod serves as the virtual environment where the learning exercise takes place. This project’s implementation involved the creation of a segmented network within the pod where a student starts …


Methods And Algorithms For Monitoring And Prediction Of Various Fire Hazardous Situations, Mizaakbar Xakkulmirzayevich Hudayberdiyev, Oybek Zokirovich Koraboshev 2023 Tashkent University of Information Technologies Tashkent, Uzbekistan. E-mail: mirzaakbarhh@gmail.com;

Methods And Algorithms For Monitoring And Prediction Of Various Fire Hazardous Situations, Mizaakbar Xakkulmirzayevich Hudayberdiyev, Oybek Zokirovich Koraboshev

Chemical Technology, Control and Management

This article analyzes emergency situations arising from natural disasters (fires, explosions, earthquakes, floods, landslides, etc.) and man-made accidents. The event in which the values of fire risks in the area decrease uniformly and at the same time the amount of fire risks is minimal is considered optimal. Models, methods, and logistic regression algorithm have been used to predict fire hazard situations and identify potential fire safety measures.


Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild 2023 Kennesaw State University

Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild

Symposium of Student Scholars

The research project aims to find ways to detect malicious packets inside encrypted network traffic. In addition to this goal maintaining user privacy is a priority. As encryption has become less expensive to implement more and more network traffic is encrypted. Currently, 90% of all network traffic is encrypted, and this trend is expected to increase. The creators of malware areemploying various methods to ensure delivery of their malware, including encryption. One proposed method to combat this suggests implementing machine learning with various algorithms to analyze packet attributes to determine if they contain malware, without actually knowing what's inside …


Models Of Team Structure In Information Security Incident Investigation, Fayzullajon Botirov 2023 TUIT named after Muhammad al-Khwarazmi. Address: 108, Amir Temur st., Tashkent city, Republic of Uzbekistan. E-mail: botirov_fz@mail.ru, Phone:+998-97-751-16-97.

Models Of Team Structure In Information Security Incident Investigation, Fayzullajon Botirov

Chemical Technology, Control and Management

This article discusses the models of the group structure in the investigation of information security incidents, contradictions in the investigation of information security incidents, methods for assessing information security incidents at the enterprise, processes for assessing information security incidents based on its factors.


Detection Optimization Of Rare Attacks In Software-Defined Network Using Ensemble Learning, Ahmed M. El-Shamy, Nawal A. El-Fishawy, Gamal M. Attiya, Mokhtar Ahmed 2023 Canadian International College, Cairo, Egypt

Detection Optimization Of Rare Attacks In Software-Defined Network Using Ensemble Learning, Ahmed M. El-Shamy, Nawal A. El-Fishawy, Gamal M. Attiya, Mokhtar Ahmed

Mansoura Engineering Journal

Software-defined networking (SDN) is a highly flexible architecture that automates and facilitates network configuration and management. Intrusion detection systems (IDS) are becoming essential components in the network to detect malicious attacks and suspicious activities by continuously monitoring network traffic. Integration between SDN and machine learning (ML) techniques is extensively used to build an effective IDS against all potential cyber-attacks that aim at breaking the network security policy and stealing valuable data. Implementing an IDS based on SDN and ML has the advantage of managing traffic dynamically and fully autonomously to provide high protection against security threats. The main objective of …


Digital Commons powered by bepress