Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (7)
- Physical Sciences and Mathematics (7)
- Computer Engineering (5)
- Information Security (5)
- Aerospace Engineering (4)
-
- Space Vehicles (4)
- Artificial Intelligence and Robotics (3)
- Computer Law (2)
- Data Storage Systems (2)
- Digital Communications and Networking (2)
- Electrical and Computer Engineering (2)
- Internet Law (2)
- Law (2)
- Political Science (2)
- Public Affairs, Public Policy and Public Administration (2)
- Science and Technology Law (2)
- Science and Technology Studies (2)
- Social and Behavioral Sciences (2)
- Theory and Algorithms (2)
- American Politics (1)
- Communication (1)
- Communication Technology and New Media (1)
- Communications Law (1)
- Computer and Systems Architecture (1)
- Databases and Information Systems (1)
- Defense and Security Studies (1)
- Electrical and Electronics (1)
- Emergency and Disaster Management (1)
- Infrastructure (1)
- Institution
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Engineering
Implementing And Testing A Novel Chaotic Cryptosystem, Samuel Jackson, Scott Kerlin, Jeremy Straub
Implementing And Testing A Novel Chaotic Cryptosystem, Samuel Jackson, Scott Kerlin, Jeremy Straub
Jeremy Straub
Cryptography in the domain of small satellites is a relatively new area of research. Compared to typical desktop computers, small satellites have limited bandwidth, processing power, and battery power. Many of the current encryption schemes were developed for desktop computers and servers, and as such may be unsuitable for small satellites. In addition, most cryptographic research in the domain of small satellites focuses on hardware solutions, which can be problematic given the limited space requirements of small satellites.
This paper investigates potential software solutions that could be used to encrypt and decrypt data on small satellites and other devices with …
Testing A Novel Cryptosystem For Use In Securing Small Satellite Communications, Samuel Jackson, Scott Kerlin, Jeremy Straub
Testing A Novel Cryptosystem For Use In Securing Small Satellite Communications, Samuel Jackson, Scott Kerlin, Jeremy Straub
Jeremy Straub
Cryptography in the domain of Small Satellites is a topic of growing importance. While large satellites are likely to have the hardware requirements to run common cryptographic algorithms, small satellites are extremely limited in both hardware capabilities, which limits the speed and security of cryptosystems implemented in software, and available physical space, which limits the ability to include cryptosystems implemented in hardware. However, small satellites are growing in popularity, and as such securing communications becomes a necessity for some. The Department of Defense is exploring the possibility of using CubeSats, a type of small satellite, in their operations, as are …
Improving Satellite Security Through Incremental Anomaly Detection On Large, Static Datasets, Connor Hamlet, Matthew Russell, Jeremy Straub, Scott Kerlin
Improving Satellite Security Through Incremental Anomaly Detection On Large, Static Datasets, Connor Hamlet, Matthew Russell, Jeremy Straub, Scott Kerlin
Jeremy Straub
Anomaly detection is a widely used technique to detect system intrusions. Anomaly detection in Intrusion Detection and Prevent Systems (IDPS) works by establishing a baseline of normal behavior and classifying points that are at a farther distance away as outliers. The result is an “anomaly score”, or how much a point is an outlier. Recent work has been performed which has examined use of anomaly detection in data streams [1]. We propose a new incremental anomaly detection algorithm which is up to 57,000x faster than the non-incremental version while slightly sacrificing the accuracy of results. We conclude that our method …
Scada System Security: Accounting For Operator Error And Malicious Intent, Ryan Kilbride, Jeremy Straub, Eunjin Kim
Scada System Security: Accounting For Operator Error And Malicious Intent, Ryan Kilbride, Jeremy Straub, Eunjin Kim
Jeremy Straub
Supervisory control and data acquisition (SCADA) systems are becoming more and more com-monplace in many industries today. Industries are making better use of software and large scale control systems to run efficiently, without the need for large amounts of oversight. Security is a particularly large issue with such systems, however. A human must still be involved to ensure smooth operation in the event of catastrophic system error, or unusual circumstanc-es. Human involvement presents problems: operators could make mistakes, configure the system to operate sub-optimally or take malicious actions. This imple-mentation of SCADA security aims to combat these problems.
Pattern Recognition And Expert Systems For Microwave Wireless Power Transmission Failure Prevention, Cameron Kerbaugh, Allen Mcdermott, Jeremy Straub, Eunjin Kim
Pattern Recognition And Expert Systems For Microwave Wireless Power Transmission Failure Prevention, Cameron Kerbaugh, Allen Mcdermott, Jeremy Straub, Eunjin Kim
Jeremy Straub
Wireless power transfer (WPT) can be used to deliver space-generated power to ground stations through the use of microwave beams. WPT satellite power delivery systems have two major failure states: misdi-recting a beam and failing to send power to a station. This project has implemented an expert system to perform pattern recognition in an effort to prevent failures by analyzing the system state and predicting potential failures before they happen in support of space-based testing [1] and deployment [2].
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally
Information Science Faculty Publications
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …
Cybersecurity In The Information Age
Cybersecurity In The Information Age
DePaul Magazine
According to the Identify Theft Resource Center, more than 750 breaches occurred in 2014, exposing more than 83 million records. Breaches occur because people have discovered that there’s money to be made from stealing corporate and customer information. Faced with this reality, consumers and companies may wonder if it’s possible to protect their personal and financial data. DePaul's College of Computing and Digital Media is training the next generation of cybersecurity experts to thwart cybersecurity attacks. In addition, DePaul faculty and alumni in data security offer advice to consumers on securing their financial and personal information.
Cybersecurity Vulnerabilities In The Smart Grid & Thermodynamical Properties Database Software, Abderrahmen Chouat, Shiyoon Joo, Jacob Holcombe
Cybersecurity Vulnerabilities In The Smart Grid & Thermodynamical Properties Database Software, Abderrahmen Chouat, Shiyoon Joo, Jacob Holcombe
Capstone Design Expo Posters
Project Scope: Smart grid stability and issues/ challenges associated with coupling nuclear and renewable energy source will be researched. The changes we can expect in grid technology so the robustness and resilience could be further improved will be addressed. This projects will entail literature surveys and may involve running some simulation software and comparisons. Another aspect of the project will be focus on nuclear plant as part of the future smart grid stability challenge. Specifically, this part of the project will entail CFD modeling of zig-zag Printed Circuit compact heat exchanger and modeling it in MATLAB and seeing the difference …
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
All Faculty Scholarship
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …