Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering

Security

Articles 1 - 25 of 25

Full-Text Articles in Engineering

Secure State Estimation Of Distribution Network Based On Kalman Filter Decomposition, Xinghua Liu, Siwen Dong, Jiaqiang Tian Jun 2023

Secure State Estimation Of Distribution Network Based On Kalman Filter Decomposition, Xinghua Liu, Siwen Dong, Jiaqiang Tian

Journal of System Simulation

A new state estimation algorithm is proposed to improve the accuracy to obtain the optimal state estimation of distribution network against FDI attack. In the case of phasor measurement units being attacked and the measurement results being altered,the optimal Kalman estimate can be decomposed into a weighted sum of local state estimates. Focusing on the insecurity of the weighted sum method,a convex optimization based on local estimation is proposed to replace the method and combine the local estimation into a secure state estimation. The simulation results show that the proposed estimator is consistent with the Kalman …


Strengthening Urban Resilience: Understanding The Interdependencies Of Outer Space And Strategic Planning For Sustainable Smart Environments, Ulpia-Elena Botezatu, Olga Bucovetchi, Adrian V. Gheorghe, Radu D. Stanciu Jan 2023

Strengthening Urban Resilience: Understanding The Interdependencies Of Outer Space And Strategic Planning For Sustainable Smart Environments, Ulpia-Elena Botezatu, Olga Bucovetchi, Adrian V. Gheorghe, Radu D. Stanciu

Engineering Management & Systems Engineering Faculty Publications

The conventional approach to urban planning has predominantly focused on horizontal dimensions, disregarding the potential risks originating from outer space. This paper aims to initiate a discourse on the vertical dimension of cities, which is influenced by outer space, as an essential element of strategic urban planning. Through an examination of a highly disruptive incident in outer space involving a collision between the Iridium 33 and Cosmos 2251 satellites, this article elucidates the intricate interdependencies between urban areas and outer space infrastructure and services. Leveraging the principles of critical infrastructure protection, which bridge the urban and outer space domains, and …


Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D Apr 2022

Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D

School of Computing: Faculty Publications

Abstract - Is it true that some of the inhabitants of the world’s today are still hesitant in using computers? Research has shown that today many people are still against the use of computers. Computer technology management can be said to be obliterated by security problems. Research shows that some people in society feel reluctant or afraid to use computers because of errors and exposure of their privacy and their sophistication, which sometimes are caused by computer hackers and malfunction of the computers. The dilemma of not utilizing computer technology at all or, to its utmost, by certain people in …


Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz Jan 2022

Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz

VMASC Publications

Lashing and de-lashing operations of containers cargo on board containerships are considered as quite strenuous activities in which operators are required to work continuously over a 6 or 8 hours shift with very limited break. This is mostly because containerships need to leave the port as soon as possible and containers loading and unloading operations must be executed with very high productivity (stay moored in a port is a totally unproductive time for a ship and a loss-making business for a shipping company). Operators performing lashing and de-lashing operations are subjected to intense ergonomic stress and uncomfortable working postures. To …


Two Image Watermarkingmethodsbased On Compressive Sensing, Yidi Miao, Lü Ju, Xiumei Li Jun 2020

Two Image Watermarkingmethodsbased On Compressive Sensing, Yidi Miao, Lü Ju, Xiumei Li

Journal of System Simulation

Abstract: As an emerging sample theory, compressive sensing attracts wide attention because it breaks through the Nyquist sampling theorem. , Two different methods of watermark embedding and extraction are presented by measuring the carrier image and watermark image respectively based on compressive sensing. Moreover, the attack tests, such as the Gaussian noise, pepper and salt noise, filtering, compression, and cropping, are implemented to watermarked images. Experiment results show that although the two different methods for image watermarking have different processing procedure, both can guarantee the robustness and security of embedded digital watermark.


Uas Pilots Code – Annotated Version 1.0, Michael S. Baum, Kristine Kiernan, Ryan J. Wallace Ed.D., Donald W. Steinman Jan 2018

Uas Pilots Code – Annotated Version 1.0, Michael S. Baum, Kristine Kiernan, Ryan J. Wallace Ed.D., Donald W. Steinman

Publications

The UAS PILOTS CODE (UASPC) offers recommendations to advance flight safety, ground safety, airmanship, and professionalism.6 It presents a vision of excellence for UAS pilots and operators, and includes general guidance for all types of UAS. The UASPC offers broad guidance—a set of values—to help a pilot interpret and apply standards and regulations, and to confront real world challenges to avoid incidents and accidents. It is designed to help UAS pilots develop standard operating procedures (SOPs), effective risk management,7 safety management systems (SMS), and to encourage UAS pilots to consider themselves aviators and participants in the broader aviation community.


Airport Security Investment Model, Joshua Daniel Bolton Dec 2017

Airport Security Investment Model, Joshua Daniel Bolton

Graduate Theses and Dissertations

In an increasingly mobile and diverse world, it is difficult to quantify the risk, or danger, associated with traveling. Airports have suffered greatly for being unable to define potential risks and protect against them. Intelligent adversary risk is a complicated high-level issue for many airports. Airports are targeted because of the large amount of people in a confined space and the social, economic, and psychological impact of terrorist attacks on the American people. In the months following September 11th, 2001, the airline industry in the United States lost $1.1 billion in revenue. The American people stayed grounded, for fear of …


Simulation Modeling Approach For Evaluating A Solution Designed To Alleviate The Congestion Of Passenger Flow At The Composure Area Of Security Checkpoints, Maria Luisa Janer Rubio Aug 2017

Simulation Modeling Approach For Evaluating A Solution Designed To Alleviate The Congestion Of Passenger Flow At The Composure Area Of Security Checkpoints, Maria Luisa Janer Rubio

Graduate Theses and Dissertations

In a previous study, we found that replacing the exit roller of a security checkpoint lane for a continuously circulating conveyor could potentially increase the throughput of passengers by over 28% while maintaining the TSA security-waiting time limit (Janer and Rossetti 2016). This study intends to expand this previous effort by investigating the impact of this circulating conveyor on the secondary screening related processes. Leone and Liu (2011) found that imposing a limit on the x-ray screening time, and diverting any item exceeding this limit to secondary screening, could decrease the waiting time by 43%. Our objective is to verify …


Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen Jun 2017

Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen

Journal of Cybersecurity Education, Research and Practice

Industrial Control Systems (ICS), which are pervasive in our nation’s critical infrastructures, are becoming increasingly at risk and vulnerable to internal and external threats. It is imperative that the future workforce be educated and trained on the security of such systems. However, it is equally important that careful and deliberate considerations must be exercised in designing and implementing the educational and training activities that pertain to ICS. To that end, we designed and implemented pedagogical materials and tools to facilitate the teaching and learning processes in the area of ICS security. In this paper, we describe those resources, the professional …


Capturing Cognitive Fingerprints From Keystroke Dynamics, J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Amed E. Kamal, Sun-Yuan Kung Jun 2017

Capturing Cognitive Fingerprints From Keystroke Dynamics, J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Amed E. Kamal, Sun-Yuan Kung

Morris Chang

Conventional authentication systems identify a user only at the entry point. Keystroke dynamics can continuously authenticate users by their typing rhythms without extra devices. This article presents a new feature called cognitive typing rhythm (CTR) to continuously verify the identities of computer users. Two machine techniques, SVM and KRR, have been developed for the system. The best results from experiments conducted with 1,977 users show a false-rejection rate of 0.7 percent and a false-acceptance rate of 5.5 percent. CTR therefore constitutes a cognitive fingerprint for continuous. Its effectiveness has been verified through a large-scale dataset. This article is part of …


Measuring The Robustness Of Forensic Tools' Ability To Detect Data Hiding Techniques, Samuel Isaiah Moses Jun 2017

Measuring The Robustness Of Forensic Tools' Ability To Detect Data Hiding Techniques, Samuel Isaiah Moses

Theses and Dissertations

The goal of this research is to create a methodology that measures the robustness and effectiveness of forensic tools' ability to detect data hiding. First, an extensive search for any existing guidelines testing against data hiding was performed. After finding none, existing guidelines and frameworks in cybersecurity and cyber forensics were reviewed. Next, I created the methodology in this thesis. This methodology includes a set of steps that a user should take to evaluate a forensic tool. The methodology has been designed to be flexible and scalable so as new anti-forensic data hiding methods are discovered and developed, they can …


A Security Evaluation Methodology For Container Images, Brendan Michael Abbott Mar 2017

A Security Evaluation Methodology For Container Images, Brendan Michael Abbott

Theses and Dissertations

The goal of this research is to create a methodology that evaluates the security posture of container images and helps improve container security. This was done by first searching for any guidelines or standards that focus on container images and security. After finding none, I decided to create an evaluative methodology. The methodology is composed of actions that users should take to evaluate the security of a container image. The methodology was created through in-depth research on container images and the build instructions used to create them and is referred to as the Security Evaluation Methodology for Container Images. The …


An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris Oct 2016

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris

Journal of International Technology and Information Management

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the …


Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava May 2016

Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava

Masters Theses, 2010-2019

With the rapid technological advancements of sensors, Wireless Sensor Networks (WSNs) have become the main technology for the Internet of Things (IoT). We investigated the security of WSNs in an environmental monitoring system with the goal to improve the overall security. We implemented a Secure Temperature Monitoring System (STMS), which served as our investigational environment. Our results revealed a security flaw found in the bootstrap loader (BSL) password used to protect firmware in the MSP430 MCU chips. We demonstrated how the BSL password could be brute forced in a matter of days. Furthermore, we illustrate how an attacker can reverse …


A Human-Centered Credit-Banking System For Convenient, Fair And Secure Carpooling Among Members Of An Association, H.-S. Jacob Tsao, Magdalini Eirinaki Jan 2015

A Human-Centered Credit-Banking System For Convenient, Fair And Secure Carpooling Among Members Of An Association, H.-S. Jacob Tsao, Magdalini Eirinaki

Faculty Publications

This paper proposes an unconventional carpool-matching system concept that is different from existing systems with four innovative operational features: (F1) The proposed matching system will be used by members of an association and sponsored by the association, e.g., the employees of a company, members of a homeowner association, employees of a shopping center. This expands the scope beyond commute trips. Such associations can also voluntarily form alliances to increase the number of possible carpool partners and geographical reach. (F2) Service provided by a driver or received by a rider incurs credit or debt to a bank centrally and fairly managed …


Analysis And Improvement Of The Security Building At Pg&E Diablo Canyon Nuclear Power Plant, Alyssa Carter, Natalie Christa, Phuong Anh Pham Dinh Dec 2014

Analysis And Improvement Of The Security Building At Pg&E Diablo Canyon Nuclear Power Plant, Alyssa Carter, Natalie Christa, Phuong Anh Pham Dinh

Industrial and Manufacturing Engineering

A new Security building was recently designed and built at the Pacific Gas and Electric (PG&E) Diablo Canyon Power Plant (DCPP).This building’s staff and equipment are responsible for performing routine inspections on all personnel entering the facility in order to prevent security-related incidents from occurring at the nuclear power plant. Similar to airport security procedures, the DCPP security building routine inspections include the use of x-ray machines, metal detectors, and explosive detectors.

The Power Plant periodically experiences pre-planned, preventive maintenance outages, that last 4-6 weeks. During an outage, a power plant reactor is shut down for maintenance, repair, and re-fueling. …


Integrating Visual Mnemonics And Input Feedback With Passphrases To Improve The Usability And Security Of Digital Authentication, Kevin Juang Aug 2014

Integrating Visual Mnemonics And Input Feedback With Passphrases To Improve The Usability And Security Of Digital Authentication, Kevin Juang

All Dissertations

The need for both usable and secure authentication is more pronounced than ever before. Security researchers and professionals will need to have a deep understanding of human factors to address these issues. Due to their ubiquity, recoverability, and low barrier of entry, passwords remain the most common means of digital authentication. However, fundamental human nature dictates that it is exceedingly difficult for people to generate secure passwords on their own. System-generated random passwords can be secure but are often unusable, which is why most passwords are still created by humans. We developed a simple system for automatically generating mnemonic phrases …


Streets: Game-Theoretic Traffic Patrolling With Exploration And Exploitation, Matthew Brown, Sandhya Saisubramanian, Pradeep Varakantham, Milind Tambe Jul 2014

Streets: Game-Theoretic Traffic Patrolling With Exploration And Exploitation, Matthew Brown, Sandhya Saisubramanian, Pradeep Varakantham, Milind Tambe

Research Collection School Of Computing and Information Systems

To dissuade reckless driving and mitigate accidents, cities deploy resources to patrol roads. In this paper, we present STREETS, an application developed for the city of Singapore, which models the problem of computing randomized traffic patrol strategies as a defenderattacker Stackelberg game. Previous work on Stackelberg security games has focused extensively on counterterrorism settings. STREETS moves beyond counterterrorism and represents the first use of Stackelberg games for traffic patrolling, in the process providing a novel algorithm for solving such games that addresses three major challenges in modeling and scale-up. First, there exists a high degree of unpredictability in travel times …


A System-Generated Password And Mnemonic Approach To Optimize The Security And Usability Of Text-Based Passwords, Sanjaykumar Ranganayakulu May 2012

A System-Generated Password And Mnemonic Approach To Optimize The Security And Usability Of Text-Based Passwords, Sanjaykumar Ranganayakulu

All Theses

In this study a novel password generation policy called the system-generated password and mnemonic was designed and implemented. The intent of this policy was to optimize both the security and usability of text-based passwords. After implementing the policy we evaluated its usability and compared it with three other existing policies: user-generated password, system-generated password and user-generated mnemonic for a system-generated password. In order to have a fair comparison among the policies we maintained a constant level of security of 30±2 entropy as dictated by NIST level 2 standards.
The study involved 64 participants, equally divided into four groups, 16 in …


Implementation Of Evolutionary Algorithms On The Power Industry And Aviation Security, Anuar Jesus Aguirre Jan 2012

Implementation Of Evolutionary Algorithms On The Power Industry And Aviation Security, Anuar Jesus Aguirre

Open Access Theses & Dissertations

The main objective of the power electric power grid is to supply reliable electricity to all the customers. Customers could be industrial, commercial, household, transportation and others. The power grid is a complex and large, and it formed by the conjunction of the generation, transmission and distribution system. The present research is focused in power distribution system. A new component replacement analysis method to solve component replacement problems for complex electricity distribution systems using Genetic Algorithms is developed. In the present model a Taylor series expansion is used to approximate the associated opportunity cost for each component in the system. …


Event Study Method For Validating Agent-Based Trading Simulations, Shih-Fen Cheng Sep 2010

Event Study Method For Validating Agent-Based Trading Simulations, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

In this paper, we introduce how one can validate an event-centric trading simulation platform that is built with multi-agent technology. The issue of validation is extremely important for agent-based simulations, but unfortunately, so far there is no one universal method that would work in all domains. The primary contribution of this paper is a novel combination of event-centric simulation design and event study approach for market dynamics generation and validation. In our event-centric design, the simulation is progressed by announcing news events that affect market prices. Upon receiving these events, event-aware software agents would adjust their views on the market …


More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr Jan 2007

More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr

Journal of International Technology and Information Management

Passwords are often the first line of defense against hackers trying to logon to a user’s account. Due to this, the password that a user selects for protection of their account is critical. These passwords must be “good” passwords that are not easily cracked. However, how does the network administrator enforce this? A simple change to the login process can make the passwords chosen by users much more secure. A description of this simple process is given in this paper. The normal login process is described. A description of the how hackers attempt to crack passwords is given. The simple …


Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan Jan 2007

Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan

Journal of International Technology and Information Management

This paper asked professionals in the legal system to evaluate the current state and effectiveness of laws to identify and deter computer crime. Responses were evaluated with a formal structural equation model. The results generally show that legal professionals believe potential jurors have minimal knowledge of computer crime issues. More importantly, they also believe that judges have little knowledge or experience. A similar lack of knowledge by defense attorneys indicates that it could be difficult for a person accused of computer related infractions to find adequate representation. On the other hand, more experienced participants do not believe computer laws present …


The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht Jan 2007

The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht

Journal of International Technology and Information Management

Today’s numerous Quantitative Analysis (QA) tools have been successfully utilized to solve business problems in diverse applications. However, the application of QA tools in solving information security problems has been sparse. Devising the means and ways to use QA tools in resolving industry-wide security problems has the potential to yield enormous global economic benefit. The purpose of this paper is to explore the use of QA tools as a means of improving the processes involved in the Information Security Systems Development Lifecycle (SecSDL). Information security professionals use the SecSDL as a guide for formulating a comprehensive information security program. The …


Food Based Approaches For A Healthy Nutrition In Africa, Mamoudou Hama Dicko May 2004

Food Based Approaches For A Healthy Nutrition In Africa, Mamoudou Hama Dicko

Pr. Mamoudou H. DICKO, PhD

The latest estimates of the FAO demonstrate the problems of the fight against hunger. These problems are manifested by the ever-increasing number of chronically undernourished people worldwide. Their numbers during the 1999-2001 period were estimated at about 840 million of which 798 million live in developing countries. Sub-Saharan Africa alone represented 198 million of those. In this part of Africa the prevalence of undernourishment ranges from 5-34%, causing growth retardation and insufficient weight gain among one third of the children under five years of age and resulting in a mortality of 5-15% among these children. Malnutrition resulting from undernourishment is …