Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Engineering

Utilizing Culturally Responsive Strategies To Inspire African American Female Participation In Cybersecurity, Deanna Bailey, Michel Kornegay, Ladawn Partlow, Charnee Bowens, Karen Gareis, Kevin Kornegay Jan 2024

Utilizing Culturally Responsive Strategies To Inspire African American Female Participation In Cybersecurity, Deanna Bailey, Michel Kornegay, Ladawn Partlow, Charnee Bowens, Karen Gareis, Kevin Kornegay

Journal of Pre-College Engineering Education Research (J-PEER)

The number of African American females participating in cyber fields is significantly low. Science, technology, engineering, and mathematics (STEM) education requires a new approach to student engagement to increase African American female participation in cybersecurity. The most common approach to engaging more African American females in STEM is to provide students access to professional images or role models active in STEM; however, more is needed. More race-centered strategies beyond role modeling are necessary to attract and retain African American females in STEM. Research studies show that integrating personal experiences and making cultural connections can help improve student participation in STEM …


An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis Jan 2023

An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

Deep Neural Networks (DNNs) are being adopted as components in software systems. Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the-art architectures grow more complex. Following the path of traditional software engineering, machine learning engineers have begun to reuse large-scale pre-trained models (PTMs) and fine-tune these models for downstream tasks. Prior works have studied reuse practices for traditional software packages to guide software engineers towards better package maintenance and dependency management. We lack a similar foundation of knowledge to guide behaviors in pre-trained model ecosystems.

In this work, we present the first empirical investigation of PTM reuse. …


Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam Jan 2020

Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam

Faculty Publications

In the sustainability IoT, the cybersecurity risks to things, sensors, and monitoring systems are distinct from the conventional networking systems in many aspects. The interaction of sustainability IoT with the physical world phenomena (e.g., weather, climate, water, and oceans) is mostly not found in the modern information technology systems. Accordingly, actuation, the ability of these devices to make changes in real world based on sensing and monitoring, requires special consideration in terms of privacy and security. Moreover, the energy efficiency, safety, power, performance requirements of these device distinguish them from conventional computers systems. In this chapter, the cybersecurity approaches towards …


Drones On The Rise: Societal Misperceptions Of Small Unmanned Aircraft Systems, Renee Keilman Aug 2019

Drones On The Rise: Societal Misperceptions Of Small Unmanned Aircraft Systems, Renee Keilman

The Journal of Purdue Undergraduate Research

Throughout the past decade, small unmanned aircraft systems (sUAS) have been on the rise in both the civilian and military sectors. It is forecasted that in the near future they will create thousands of jobs and billions in tax revenue due to their ability to execute difficult and hazardous tasks safely, efficiently, and cost-effectively. However, one current issue with the proliferation of the technology is a shortage of skilled employees due to a lack of education and common negative public misperceptions associated with them.

To investigate this, responses from a mixed-methods survey will be analyzed. Within the survey, questions such …


Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro Jan 2018

Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro

Journal of Human Performance in Extreme Environments

In this paper, we discuss the process we are using in the design and implementation of a tool to improve the situation awareness of cyberattacks in the power grid. We provide details of the steps we have taken to date and describe the steps that still need to be accomplished. The focus of this work is to provide situation awareness of the power grid to staff from different, non-overlapping roles in an electrical transmission organization in order to facilitate an understanding of a possible occurrence of a cyberattack. Our approach follows a user-centered design process and includes determining the types …


Analysis Of Cyberattacks On Unmanned Aerial Systems, Andrew Morris Shull Jan 2013

Analysis Of Cyberattacks On Unmanned Aerial Systems, Andrew Morris Shull

Open Access Theses

With the increasing power and convenience offered by the use of embedded systems in control applications, such systems will undoubtedly continue to be developed and deployed. Recently, however, a focus on data-centric systems and developing network-enabled control systems has emerged, allowing for greater performance, safety, and resource allocation in systems such as smart power grids and unmanned military aircraft. However, this increase in connectivity also introduces vulnerabilities into these systems, potentially providing access to malicious parties seeking to disrupt the operation of those systems or to cause damage. Given the high potential cost of a failure in these systems in …