Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

PDF

Kennesaw State University

Conference

Articles 1 - 3 of 3

Full-Text Articles in Risk Analysis

Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan Nov 2023

Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan

Symposium of Student Scholars

"KWAD" or "KSU all-Weather Autonomous Drone" project was sponsored by Ultool, LLC to the KSU Research and Service Foundation to create a lightweight drone capable of capturing HD video during all-weather operations. The conditions of all-weather operation include rainfall of one inch per hour and wind speeds of up to twenty miles per hour. In addition, a global minimum structural safety factor of two is required to ensure the system's integrity in extreme weather conditions. Potential mission profiles include autonomous aerial delivery, topological mapping in high moisture areas, security surveillance, search and rescue operations, emergency transportation of medical supplies, and …


Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas Apr 2023

Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas

Symposium of Student Scholars

Ransomware is classified as one of the main types of malware and involves the design of exploitations of new vulnerabilities through a host. That allows for the intrusion of systems and encrypting of any information assets and data in order to demand a sum of payment normally through untraceable cryptocurrencies such as Monero for the decryption key. This rapid security threat has put governments and private enterprises on high alert and despite evolving technologies and more sophisticated encryption algorithms critical assets are being held for ransom and the results are detrimental, including the recent Colonial Pipeline ransomware attack in 2021 …


Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana Oct 2016

Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana

KSU Proceedings on Cybersecurity Education, Research and Practice

The economic impact of Mobile IP, the standard that allows IP sessions to be maintained even when switching between different cellular towers or networks, has been staggering in terms of both scale and acceleration (Doherty, 2016). As voice communications transition to all-digital, all-IP networks such as 4G, there will be an increase in risk due to vulnerabilities, malware, and hacks that exist for PC-based systems and applications (Harwood, 2011). According to Gostev (2006), in June, 2004, a well-known Spanish virus collector known as VirusBuster, emailed the first known mobile phone virus to Kaspersky Lab, Moscow. Targeting the Symbian OS, the …