Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Engineering

Reducing Bias In Cyberbullying Detection With Advanced Llms And Transformer Models, Dahana Moz Ruiz, Annaliese Watson, Anjana Manikandan, Zachary Gordon Apr 2024

Reducing Bias In Cyberbullying Detection With Advanced Llms And Transformer Models, Dahana Moz Ruiz, Annaliese Watson, Anjana Manikandan, Zachary Gordon

Center for Cybersecurity

This paper delved into a comprehensive exploration of the inherent biases present in Large Language Models (LLMs) and various Transformer models, with a focus on their role in identifying and addressing instances of cyberbullying. The objective was to refine and enhance the accuracy and fairness of these models by mitigating the biases deeply ingrained in their structures. This was crucial because language models could inadvertently perpetuate and amplify existing biases present in the data they were trained on.


Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino Feb 2024

Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino

Center for Cybersecurity

In brief:

  • Humanitarian agencies responding to conflict face massive challenges in distributing aid. Cyberattacks add to that burden.
  • This short overview, tailored for non-technical leaders, demystifies the process and equips clouds security experts to proactively champion cloud security at non-profits, and non-governmental organizations.

Proactive Cybersecurity is a Humanitarian Imperative | CSA (cloudsecurityalliance.org)


Alice In Cyberspace 2024, Stanley Mierzwa Jan 2024

Alice In Cyberspace 2024, Stanley Mierzwa

Center for Cybersecurity

‘Alice in Cyberspace’ Conference Nurtures Women’s Interest, Representation in Cybersecurity


Practical Approaches And Guidance To Small Business Organization Cyber Risk And Threat Assessments, Stanley Mierzwa, Aneta Klepacka Jul 2023

Practical Approaches And Guidance To Small Business Organization Cyber Risk And Threat Assessments, Stanley Mierzwa, Aneta Klepacka

Center for Cybersecurity

Cyber-attacks and breaches can occur in any organization type, and the areas of small businesses are not exempt from this nefarious activity. This research note and rapid review provide various cybersecurity tools, guidelines, and frameworks that a small business can consider when embarking on the action to assess its cybersecurity hygiene and defensive stance. The content was pulled together in response to the need for an easy-to-digest approach that a small business utilizes to gain valuable confidence to undertake a self-assessment or third-party review of an organization’s cybersecurity plans. Regarding cybersecurity concerns, doing nothing is not an option, and taking …


Research Days Poster: Cyberbullying Detection Utilizing Artificial Intelligence And Machine Learning, Annaliese Watson, Aysha Gardner, Dahana Moz Ruiz Apr 2023

Research Days Poster: Cyberbullying Detection Utilizing Artificial Intelligence And Machine Learning, Annaliese Watson, Aysha Gardner, Dahana Moz Ruiz

Center for Cybersecurity

Technology is a tool that can be used to gain knowledge and for advancements in areas like medicine, machinery, and everyday tasks. It can be used to connect with friends, work from home, and to improve quality of life. But some social media users can use it to hurt others. Cyberbullying is a major issue that has been steadily growing over the past few years. Cyberbullying has also steadily increased the rates of stress, anxiety, depression, violent behavior, low self-esteem and may cause suicide. Cyberbullying is an ongoing problem for social media users, and it is urgent that a solution …


Research Days Poster: A Study On Ransomware And Possible Mitigations, Robin Singh, Jing-Chiou Liou Apr 2023

Research Days Poster: A Study On Ransomware And Possible Mitigations, Robin Singh, Jing-Chiou Liou

Center for Cybersecurity

Ransomware is a quite violent attack that has been persistent throughout the industry for so many years. This malware doesn’t only affect the regular computer users but it has been targeting the big organizations and businesses also. Ransomware (ransom software) is a subset of malware designed to restrict access to a system or data until a requested ransom amount from the attacker is satisfied [2].In this poster, we will go over our findings on ransomware spreads, its actions, exploited vulnerabilities and few mitigation to reduce the impact of infection.


Run Toward The Incident: Collaboration Between Academia And Law Enforcement For Cybersecurity, Center For Cybersecurity, Stanley Mierzwa Apr 2023

Run Toward The Incident: Collaboration Between Academia And Law Enforcement For Cybersecurity, Center For Cybersecurity, Stanley Mierzwa

Center for Cybersecurity

Collaboration and partnership between academia and law enforcement can bring about positive contributions for future research and activities in cybersecurity.


A Study Of Issues And Mitigations On Ddos And Medical Iot Devices, Jing-Chiou Liou, Robin Singh Apr 2023

A Study Of Issues And Mitigations On Ddos And Medical Iot Devices, Jing-Chiou Liou, Robin Singh

Center for Cybersecurity

The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient's data for their treatment. .


Research Days Poster: Security Operation Center, Jaineel A. Shah, Jing-Chiou Liou Apr 2023

Research Days Poster: Security Operation Center, Jaineel A. Shah, Jing-Chiou Liou

Center for Cybersecurity

A Security Operations Center (SOC) is an organizational framework for cybersecurity, staffed by cybersecurity professionals who monitor an organization's security, analyze potential or current breaches, and respond accordingly. The SOC's goal is to diagnose, evaluate, and respond to cybersecurity events using technology solutions and established procedures. SOCs mainly operate 24/7, with security analysts monitoring environmental data for emerging threats and responding as needed. The SOC manages and enhances an organization's overall security posture.


Research Days Poster: An Analysis Of Sql Injection Techniques, Uko Ebreso, Pankati Patel, Jing-Chiou Liou Apr 2023

Research Days Poster: An Analysis Of Sql Injection Techniques, Uko Ebreso, Pankati Patel, Jing-Chiou Liou

Center for Cybersecurity

Storing information in a database allows web applications to operate with users who have their information stored online. ● The retrieval of information from the database is done using Structured Query Language (SQL) - a language used by the database that allows for data manipulation. ● SQL Injection (SQLIi) is an attack on a susceptible system using SQl which results in a loss of confidentiality, authentication, authorization and integrity of the software/system.


Kean University Students Preparing For Cybersecurity Certification Exams In Free Summer Program, Stanley Mierzwa Jul 2022

Kean University Students Preparing For Cybersecurity Certification Exams In Free Summer Program, Stanley Mierzwa

Center for Cybersecurity

Fifteen Kean University students and recent graduates this summer are studying for cybersecurity certifications in a virtual pilot program offered free of charge through the University’s Center for Cybersecurity.


Ransomware Incident Preparations With Ethical Considerations And Command System Framework Proposal, Stanley Mierzwa, James Drylie, Dennis Bogdan Apr 2022

Ransomware Incident Preparations With Ethical Considerations And Command System Framework Proposal, Stanley Mierzwa, James Drylie, Dennis Bogdan

Center for Cybersecurity

Concerns with cyber-attacks in the form of ransomware are on the mind of many executives and leadership staff in all industries. Inaction is not an option, and approaching the topic with real, honest, and hard discussions will be valuable ahead of such a possible devastating experience. This research note aims to bring thoughtfulness to the topics of ethics in the role of cybersecurity when dealing with ransomware events. Additionally, a proposed set of non-technical recovery preparation tasks are outlined to help organizations bring about cohesiveness and planning for dealing with the real potential of a ransomware event. Constraints from many …


An Overview Of The Potential For Blockchain Technology To Improve Cybersecurity, Stanley Mierzwa Apr 2022

An Overview Of The Potential For Blockchain Technology To Improve Cybersecurity, Stanley Mierzwa

Center for Cybersecurity

The purpose of this short research commentary is to provide a focused, semi-deep dive into the effort the industry places on cybersecurity defense and operations and the potential to integrate blockchain technology. As cybersecurity threats and incidents continue to rise, better procedures and strategies to protect our organizations’ data and systems are crucial to sustaining viable operations. Given that blockchain technology can potentially disrupt other industries (Moore, 2020), it is imperative to examine how it may improve our cybersecurity.


Cybersecurity Best Practices For The Manufacturing Industry, David Ortiz, Stanley Mierzwa Apr 2022

Cybersecurity Best Practices For The Manufacturing Industry, David Ortiz, Stanley Mierzwa

Center for Cybersecurity

The manufacturing and industrial sectors have evolved with the introduction of technologies over the past many decades. Progress in improving processes, techniques, output, quality, and efficiencies have been gained with new emerging technologies, resulting in positive and fortuitous changes for organizations. With the rapid movement towards a modern-day manufacturing environment, new and connected technologies that employ greater cyber-connectedness continue to grow, but at the same time, introduce cybersecurity risks.


Creation Of A Customized College Student Cybersecurity Awareness Online Learning Solution, Stanley Mierzwa, Iassen Christov, Bruno Lima Jul 2021

Creation Of A Customized College Student Cybersecurity Awareness Online Learning Solution, Stanley Mierzwa, Iassen Christov, Bruno Lima

Center for Cybersecurity

Many businesses, agencies, for-profit and non-profit organizations have implemented cybersecurity awareness training programs for their staff.


Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Bok Gyo Jeong, Claire Yun Nov 2020

Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Bok Gyo Jeong, Claire Yun

Center for Cybersecurity

This paper discusses and proposes the inclusion of a cyber or security risk assessment section during the course of public health initiatives involving the use of information and communication computer technology. Over the last decade, many public health research efforts have included information technologies such as Mobile Health (mHealth), Electronic Health (eHealth), Telehealth, and Digital Health to assist with unmet global development health needs. This paper provides a background on the lack of documentation on cybersecurity risks or vulnerability assessments in global public health areas. This study suggests existing frameworks and policies be adopted for public health. We also propose …


Need Based Evaluation Of Cloud Services In The Wake Of Covid-19, Samir Souidi, Stanley Mierzwa Aug 2020

Need Based Evaluation Of Cloud Services In The Wake Of Covid-19, Samir Souidi, Stanley Mierzwa

Center for Cybersecurity

For many organizations, particularly those that may be considered legacy, or older existing enterprises, the recent COVID-19 pandemic may be pushing them to further progress into the realm of cloud services. With the global population asked to quarantine or shelter-in-place during the pandemic spread of 2020, many businesses that were able to function with their workforce remotely had no choice but to do so. Having information systems available with true remote access capabilities was a must. For those organizations who had already moved to a cloud-based model, they found themselves in a far better situation than those firms who still …


Greater Cybersecurity Threat Predictions With A Primer In Machine Learning, Samir Souidi, Stanley Mierzwa Jan 2020

Greater Cybersecurity Threat Predictions With A Primer In Machine Learning, Samir Souidi, Stanley Mierzwa

Center for Cybersecurity

Why is it that Big Data services such as Netflix can predict, with reasonable accuracy, the movies and programs that I may be interested in when I connect to their service? When I access Amazon.com Online Shopping, I get a good glimpse of items I purchased in the past, and at what timeframe, and also a prediction if it is time to repurchase it? Machine Learning (ML) and Artificial Intelligence (AI) probably hold the key to the reasons these predictions are performed so well. So, why can’t we predict, at least at a small-scale level, when and what type of …


On The Potential, Feasibility, And Effectiveness Of Chat Bots In Public Health Research Going Forward, Stanley Mierzwa, Samir Souidi, Tammy Allen Sep 2019

On The Potential, Feasibility, And Effectiveness Of Chat Bots In Public Health Research Going Forward, Stanley Mierzwa, Samir Souidi, Tammy Allen

Center for Cybersecurity

This paper will discuss whether bots, particularly chat bots, can be useful in public health research and health or pharmacy systems operations. Bots have been discussed for many years; particularly when coupled with artificial intelligence, they offer the opportunity of automating mundane or error-ridden processes and tasks by replacing human involvement. This paper will discuss areas where there are greater advances in the use of bots, as well as areas that may benefit from the use of bots, and will offer practical ways to get started with bot technology. Several popular bot applications and bot development tools along with practical …