Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (4)
- Brigham Young University (2)
- China Simulation Federation (2)
- Clemson University (2)
- Old Dominion University (2)
-
- Selected Works (2)
- Singapore Management University (2)
- University of Arkansas, Fayetteville (2)
- California Polytechnic State University, San Luis Obispo (1)
- Embry-Riddle Aeronautical University (1)
- James Madison University (1)
- Kennesaw State University (1)
- San Jose State University (1)
- University of Nebraska - Lincoln (1)
- University of Texas at El Paso (1)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (4)
- Graduate Theses and Dissertations (2)
- Journal of System Simulation (2)
- Research Collection School Of Computing and Information Systems (2)
- Theses and Dissertations (2)
-
- All Dissertations (1)
- All Theses (1)
- Engineering Management & Systems Engineering Faculty Publications (1)
- Faculty Publications (1)
- Industrial and Manufacturing Engineering (1)
- Journal of Cybersecurity Education, Research and Practice (1)
- Masters Theses, 2010-2019 (1)
- Morris Chang (1)
- Open Access Theses & Dissertations (1)
- Pr. Mamoudou H. DICKO, PhD (1)
- Publications (1)
- School of Computing: Faculty Publications (1)
- VMASC Publications (1)
- Publication Type
Articles 1 - 25 of 25
Full-Text Articles in Engineering
Secure State Estimation Of Distribution Network Based On Kalman Filter Decomposition, Xinghua Liu, Siwen Dong, Jiaqiang Tian
Secure State Estimation Of Distribution Network Based On Kalman Filter Decomposition, Xinghua Liu, Siwen Dong, Jiaqiang Tian
Journal of System Simulation
A new state estimation algorithm is proposed to improve the accuracy to obtain the optimal state estimation of distribution network against FDI attack. In the case of phasor measurement units being attacked and the measurement results being altered,the optimal Kalman estimate can be decomposed into a weighted sum of local state estimates. Focusing on the insecurity of the weighted sum method,a convex optimization based on local estimation is proposed to replace the method and combine the local estimation into a secure state estimation. The simulation results show that the proposed estimator is consistent with the Kalman …
Strengthening Urban Resilience: Understanding The Interdependencies Of Outer Space And Strategic Planning For Sustainable Smart Environments, Ulpia-Elena Botezatu, Olga Bucovetchi, Adrian V. Gheorghe, Radu D. Stanciu
Strengthening Urban Resilience: Understanding The Interdependencies Of Outer Space And Strategic Planning For Sustainable Smart Environments, Ulpia-Elena Botezatu, Olga Bucovetchi, Adrian V. Gheorghe, Radu D. Stanciu
Engineering Management & Systems Engineering Faculty Publications
The conventional approach to urban planning has predominantly focused on horizontal dimensions, disregarding the potential risks originating from outer space. This paper aims to initiate a discourse on the vertical dimension of cities, which is influenced by outer space, as an essential element of strategic urban planning. Through an examination of a highly disruptive incident in outer space involving a collision between the Iridium 33 and Cosmos 2251 satellites, this article elucidates the intricate interdependencies between urban areas and outer space infrastructure and services. Leveraging the principles of critical infrastructure protection, which bridge the urban and outer space domains, and …
Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D
Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D
School of Computing: Faculty Publications
Abstract - Is it true that some of the inhabitants of the world’s today are still hesitant in using computers? Research has shown that today many people are still against the use of computers. Computer technology management can be said to be obliterated by security problems. Research shows that some people in society feel reluctant or afraid to use computers because of errors and exposure of their privacy and their sophistication, which sometimes are caused by computer hackers and malfunction of the computers. The dilemma of not utilizing computer technology at all or, to its utmost, by certain people in …
Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz
Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz
VMASC Publications
Lashing and de-lashing operations of containers cargo on board containerships are considered as quite strenuous activities in which operators are required to work continuously over a 6 or 8 hours shift with very limited break. This is mostly because containerships need to leave the port as soon as possible and containers loading and unloading operations must be executed with very high productivity (stay moored in a port is a totally unproductive time for a ship and a loss-making business for a shipping company). Operators performing lashing and de-lashing operations are subjected to intense ergonomic stress and uncomfortable working postures. To …
Two Image Watermarkingmethodsbased On Compressive Sensing, Yidi Miao, Lü Ju, Xiumei Li
Two Image Watermarkingmethodsbased On Compressive Sensing, Yidi Miao, Lü Ju, Xiumei Li
Journal of System Simulation
Abstract: As an emerging sample theory, compressive sensing attracts wide attention because it breaks through the Nyquist sampling theorem. , Two different methods of watermark embedding and extraction are presented by measuring the carrier image and watermark image respectively based on compressive sensing. Moreover, the attack tests, such as the Gaussian noise, pepper and salt noise, filtering, compression, and cropping, are implemented to watermarked images. Experiment results show that although the two different methods for image watermarking have different processing procedure, both can guarantee the robustness and security of embedded digital watermark.
Uas Pilots Code – Annotated Version 1.0, Michael S. Baum, Kristine Kiernan, Ryan J. Wallace Ed.D., Donald W. Steinman
Uas Pilots Code – Annotated Version 1.0, Michael S. Baum, Kristine Kiernan, Ryan J. Wallace Ed.D., Donald W. Steinman
Publications
The UAS PILOTS CODE (UASPC) offers recommendations to advance flight safety, ground safety, airmanship, and professionalism.6 It presents a vision of excellence for UAS pilots and operators, and includes general guidance for all types of UAS. The UASPC offers broad guidance—a set of values—to help a pilot interpret and apply standards and regulations, and to confront real world challenges to avoid incidents and accidents. It is designed to help UAS pilots develop standard operating procedures (SOPs), effective risk management,7 safety management systems (SMS), and to encourage UAS pilots to consider themselves aviators and participants in the broader aviation community.
Airport Security Investment Model, Joshua Daniel Bolton
Airport Security Investment Model, Joshua Daniel Bolton
Graduate Theses and Dissertations
In an increasingly mobile and diverse world, it is difficult to quantify the risk, or danger, associated with traveling. Airports have suffered greatly for being unable to define potential risks and protect against them. Intelligent adversary risk is a complicated high-level issue for many airports. Airports are targeted because of the large amount of people in a confined space and the social, economic, and psychological impact of terrorist attacks on the American people. In the months following September 11th, 2001, the airline industry in the United States lost $1.1 billion in revenue. The American people stayed grounded, for fear of …
Simulation Modeling Approach For Evaluating A Solution Designed To Alleviate The Congestion Of Passenger Flow At The Composure Area Of Security Checkpoints, Maria Luisa Janer Rubio
Simulation Modeling Approach For Evaluating A Solution Designed To Alleviate The Congestion Of Passenger Flow At The Composure Area Of Security Checkpoints, Maria Luisa Janer Rubio
Graduate Theses and Dissertations
In a previous study, we found that replacing the exit roller of a security checkpoint lane for a continuously circulating conveyor could potentially increase the throughput of passengers by over 28% while maintaining the TSA security-waiting time limit (Janer and Rossetti 2016). This study intends to expand this previous effort by investigating the impact of this circulating conveyor on the secondary screening related processes. Leone and Liu (2011) found that imposing a limit on the x-ray screening time, and diverting any item exceeding this limit to secondary screening, could decrease the waiting time by 43%. Our objective is to verify …
Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen
Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen
Journal of Cybersecurity Education, Research and Practice
Industrial Control Systems (ICS), which are pervasive in our nation’s critical infrastructures, are becoming increasingly at risk and vulnerable to internal and external threats. It is imperative that the future workforce be educated and trained on the security of such systems. However, it is equally important that careful and deliberate considerations must be exercised in designing and implementing the educational and training activities that pertain to ICS. To that end, we designed and implemented pedagogical materials and tools to facilitate the teaching and learning processes in the area of ICS security. In this paper, we describe those resources, the professional …
Capturing Cognitive Fingerprints From Keystroke Dynamics, J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Amed E. Kamal, Sun-Yuan Kung
Capturing Cognitive Fingerprints From Keystroke Dynamics, J. Morris Chang, Chi-Chen Fang, Kuan-Hsing Ho, Norene Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen B. Gilbert, Amed E. Kamal, Sun-Yuan Kung
Morris Chang
Conventional authentication systems identify a user only at the entry point. Keystroke dynamics can continuously authenticate users by their typing rhythms without extra devices. This article presents a new feature called cognitive typing rhythm (CTR) to continuously verify the identities of computer users. Two machine techniques, SVM and KRR, have been developed for the system. The best results from experiments conducted with 1,977 users show a false-rejection rate of 0.7 percent and a false-acceptance rate of 5.5 percent. CTR therefore constitutes a cognitive fingerprint for continuous. Its effectiveness has been verified through a large-scale dataset. This article is part of …
Measuring The Robustness Of Forensic Tools' Ability To Detect Data Hiding Techniques, Samuel Isaiah Moses
Measuring The Robustness Of Forensic Tools' Ability To Detect Data Hiding Techniques, Samuel Isaiah Moses
Theses and Dissertations
The goal of this research is to create a methodology that measures the robustness and effectiveness of forensic tools' ability to detect data hiding. First, an extensive search for any existing guidelines testing against data hiding was performed. After finding none, existing guidelines and frameworks in cybersecurity and cyber forensics were reviewed. Next, I created the methodology in this thesis. This methodology includes a set of steps that a user should take to evaluate a forensic tool. The methodology has been designed to be flexible and scalable so as new anti-forensic data hiding methods are discovered and developed, they can …
A Security Evaluation Methodology For Container Images, Brendan Michael Abbott
A Security Evaluation Methodology For Container Images, Brendan Michael Abbott
Theses and Dissertations
The goal of this research is to create a methodology that evaluates the security posture of container images and helps improve container security. This was done by first searching for any guidelines or standards that focus on container images and security. After finding none, I decided to create an evaluative methodology. The methodology is composed of actions that users should take to evaluate the security of a container image. The methodology was created through in-depth research on container images and the build instructions used to create them and is referred to as the Security Evaluation Methodology for Container Images. The …
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
Journal of International Technology and Information Management
The explosive growth and rapid proliferation of smartphones and other mobile
devices that access data over communication networks has necessitated advocating
and implementing security constraints for the purpose of abetting safe computing.
Remote data access using mobile devices is particularly popular among students at
institutions of higher education. To ensure safe harbor for constituents, it is
imperative for colleges and universities to establish, disseminate, and enforce
mobile device security artifacts, where artifacts is defined as policies, procedures,
guidelines or other documented or undocumented protocols. The purpose of this
study is to explore the existence of, specific content of, and the …
Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava
Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava
Masters Theses, 2010-2019
With the rapid technological advancements of sensors, Wireless Sensor Networks (WSNs) have become the main technology for the Internet of Things (IoT). We investigated the security of WSNs in an environmental monitoring system with the goal to improve the overall security. We implemented a Secure Temperature Monitoring System (STMS), which served as our investigational environment. Our results revealed a security flaw found in the bootstrap loader (BSL) password used to protect firmware in the MSP430 MCU chips. We demonstrated how the BSL password could be brute forced in a matter of days. Furthermore, we illustrate how an attacker can reverse …
A Human-Centered Credit-Banking System For Convenient, Fair And Secure Carpooling Among Members Of An Association, H.-S. Jacob Tsao, Magdalini Eirinaki
A Human-Centered Credit-Banking System For Convenient, Fair And Secure Carpooling Among Members Of An Association, H.-S. Jacob Tsao, Magdalini Eirinaki
Faculty Publications
This paper proposes an unconventional carpool-matching system concept that is different from existing systems with four innovative operational features: (F1) The proposed matching system will be used by members of an association and sponsored by the association, e.g., the employees of a company, members of a homeowner association, employees of a shopping center. This expands the scope beyond commute trips. Such associations can also voluntarily form alliances to increase the number of possible carpool partners and geographical reach. (F2) Service provided by a driver or received by a rider incurs credit or debt to a bank centrally and fairly managed …
Analysis And Improvement Of The Security Building At Pg&E Diablo Canyon Nuclear Power Plant, Alyssa Carter, Natalie Christa, Phuong Anh Pham Dinh
Analysis And Improvement Of The Security Building At Pg&E Diablo Canyon Nuclear Power Plant, Alyssa Carter, Natalie Christa, Phuong Anh Pham Dinh
Industrial and Manufacturing Engineering
A new Security building was recently designed and built at the Pacific Gas and Electric (PG&E) Diablo Canyon Power Plant (DCPP).This building’s staff and equipment are responsible for performing routine inspections on all personnel entering the facility in order to prevent security-related incidents from occurring at the nuclear power plant. Similar to airport security procedures, the DCPP security building routine inspections include the use of x-ray machines, metal detectors, and explosive detectors.
The Power Plant periodically experiences pre-planned, preventive maintenance outages, that last 4-6 weeks. During an outage, a power plant reactor is shut down for maintenance, repair, and re-fueling. …
Integrating Visual Mnemonics And Input Feedback With Passphrases To Improve The Usability And Security Of Digital Authentication, Kevin Juang
All Dissertations
The need for both usable and secure authentication is more pronounced than ever before. Security researchers and professionals will need to have a deep understanding of human factors to address these issues. Due to their ubiquity, recoverability, and low barrier of entry, passwords remain the most common means of digital authentication. However, fundamental human nature dictates that it is exceedingly difficult for people to generate secure passwords on their own. System-generated random passwords can be secure but are often unusable, which is why most passwords are still created by humans. We developed a simple system for automatically generating mnemonic phrases …
Streets: Game-Theoretic Traffic Patrolling With Exploration And Exploitation, Matthew Brown, Sandhya Saisubramanian, Pradeep Varakantham, Milind Tambe
Streets: Game-Theoretic Traffic Patrolling With Exploration And Exploitation, Matthew Brown, Sandhya Saisubramanian, Pradeep Varakantham, Milind Tambe
Research Collection School Of Computing and Information Systems
To dissuade reckless driving and mitigate accidents, cities deploy resources to patrol roads. In this paper, we present STREETS, an application developed for the city of Singapore, which models the problem of computing randomized traffic patrol strategies as a defenderattacker Stackelberg game. Previous work on Stackelberg security games has focused extensively on counterterrorism settings. STREETS moves beyond counterterrorism and represents the first use of Stackelberg games for traffic patrolling, in the process providing a novel algorithm for solving such games that addresses three major challenges in modeling and scale-up. First, there exists a high degree of unpredictability in travel times …
A System-Generated Password And Mnemonic Approach To Optimize The Security And Usability Of Text-Based Passwords, Sanjaykumar Ranganayakulu
A System-Generated Password And Mnemonic Approach To Optimize The Security And Usability Of Text-Based Passwords, Sanjaykumar Ranganayakulu
All Theses
In this study a novel password generation policy called the system-generated password and mnemonic was designed and implemented. The intent of this policy was to optimize both the security and usability of text-based passwords. After implementing the policy we evaluated its usability and compared it with three other existing policies: user-generated password, system-generated password and user-generated mnemonic for a system-generated password. In order to have a fair comparison among the policies we maintained a constant level of security of 30±2 entropy as dictated by NIST level 2 standards.
The study involved 64 participants, equally divided into four groups, 16 in …
Implementation Of Evolutionary Algorithms On The Power Industry And Aviation Security, Anuar Jesus Aguirre
Implementation Of Evolutionary Algorithms On The Power Industry And Aviation Security, Anuar Jesus Aguirre
Open Access Theses & Dissertations
The main objective of the power electric power grid is to supply reliable electricity to all the customers. Customers could be industrial, commercial, household, transportation and others. The power grid is a complex and large, and it formed by the conjunction of the generation, transmission and distribution system. The present research is focused in power distribution system. A new component replacement analysis method to solve component replacement problems for complex electricity distribution systems using Genetic Algorithms is developed. In the present model a Taylor series expansion is used to approximate the associated opportunity cost for each component in the system. …
Event Study Method For Validating Agent-Based Trading Simulations, Shih-Fen Cheng
Event Study Method For Validating Agent-Based Trading Simulations, Shih-Fen Cheng
Research Collection School Of Computing and Information Systems
In this paper, we introduce how one can validate an event-centric trading simulation platform that is built with multi-agent technology. The issue of validation is extremely important for agent-based simulations, but unfortunately, so far there is no one universal method that would work in all domains. The primary contribution of this paper is a novel combination of event-centric simulation design and event study approach for market dynamics generation and validation. In our event-centric design, the simulation is progressed by announcing news events that affect market prices. Upon receiving these events, event-aware software agents would adjust their views on the market …
More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr
More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr
Journal of International Technology and Information Management
Passwords are often the first line of defense against hackers trying to logon to a user’s account. Due to this, the password that a user selects for protection of their account is critical. These passwords must be “good” passwords that are not easily cracked. However, how does the network administrator enforce this? A simple change to the login process can make the passwords chosen by users much more secure. A description of this simple process is given in this paper. The normal login process is described. A description of the how hackers attempt to crack passwords is given. The simple …
Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan
Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan
Journal of International Technology and Information Management
This paper asked professionals in the legal system to evaluate the current state and effectiveness of laws to identify and deter computer crime. Responses were evaluated with a formal structural equation model. The results generally show that legal professionals believe potential jurors have minimal knowledge of computer crime issues. More importantly, they also believe that judges have little knowledge or experience. A similar lack of knowledge by defense attorneys indicates that it could be difficult for a person accused of computer related infractions to find adequate representation. On the other hand, more experienced participants do not believe computer laws present …
The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht
The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht
Journal of International Technology and Information Management
Today’s numerous Quantitative Analysis (QA) tools have been successfully utilized to solve business problems in diverse applications. However, the application of QA tools in solving information security problems has been sparse. Devising the means and ways to use QA tools in resolving industry-wide security problems has the potential to yield enormous global economic benefit. The purpose of this paper is to explore the use of QA tools as a means of improving the processes involved in the Information Security Systems Development Lifecycle (SecSDL). Information security professionals use the SecSDL as a guide for formulating a comprehensive information security program. The …
Food Based Approaches For A Healthy Nutrition In Africa, Mamoudou Hama Dicko
Food Based Approaches For A Healthy Nutrition In Africa, Mamoudou Hama Dicko
Pr. Mamoudou H. DICKO, PhD
The latest estimates of the FAO demonstrate the problems of the fight against hunger. These problems are manifested by the ever-increasing number of chronically undernourished people worldwide. Their numbers during the 1999-2001 period were estimated at about 840 million of which 798 million live in developing countries. Sub-Saharan Africa alone represented 198 million of those. In this part of Africa the prevalence of undernourishment ranges from 5-34%, causing growth retardation and insufficient weight gain among one third of the children under five years of age and resulting in a mortality of 5-15% among these children. Malnutrition resulting from undernourishment is …