Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Risk Analysis

Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan Nov 2023

Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan

Symposium of Student Scholars

"KWAD" or "KSU all-Weather Autonomous Drone" project was sponsored by Ultool, LLC to the KSU Research and Service Foundation to create a lightweight drone capable of capturing HD video during all-weather operations. The conditions of all-weather operation include rainfall of one inch per hour and wind speeds of up to twenty miles per hour. In addition, a global minimum structural safety factor of two is required to ensure the system's integrity in extreme weather conditions. Potential mission profiles include autonomous aerial delivery, topological mapping in high moisture areas, security surveillance, search and rescue operations, emergency transportation of medical supplies, and …


Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas Apr 2023

Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas

Symposium of Student Scholars

Ransomware is classified as one of the main types of malware and involves the design of exploitations of new vulnerabilities through a host. That allows for the intrusion of systems and encrypting of any information assets and data in order to demand a sum of payment normally through untraceable cryptocurrencies such as Monero for the decryption key. This rapid security threat has put governments and private enterprises on high alert and despite evolving technologies and more sophisticated encryption algorithms critical assets are being held for ransom and the results are detrimental, including the recent Colonial Pipeline ransomware attack in 2021 …


Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study, Abdikadar Ali, Danielle Thaxton, Ankur Chattopadhyay Dec 2021

Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study, Abdikadar Ali, Danielle Thaxton, Ankur Chattopadhyay

Posters-at-the-Capitol

The last couple of years have seen a strong movement supporting the need of having intelligent consumer products align with specific design guidelines for trustworthy artificial intelligence (AI). This global movement has led to multiple institutional recommendations for ethically aligned trustworthy design of the AI driven technologies, like consumer robots and autonomous vehicles. There has been prior research towards finding security and privacy related vulnerabilities within various types of social robots. However, none of these previous works has studied the implications of these vulnerabilities in terms of the robot design aligning with trustworthy AI. In an attempt to address this …


Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana Oct 2016

Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana

KSU Proceedings on Cybersecurity Education, Research and Practice

The economic impact of Mobile IP, the standard that allows IP sessions to be maintained even when switching between different cellular towers or networks, has been staggering in terms of both scale and acceleration (Doherty, 2016). As voice communications transition to all-digital, all-IP networks such as 4G, there will be an increase in risk due to vulnerabilities, malware, and hacks that exist for PC-based systems and applications (Harwood, 2011). According to Gostev (2006), in June, 2004, a well-known Spanish virus collector known as VirusBuster, emailed the first known mobile phone virus to Kaspersky Lab, Moscow. Targeting the Symbian OS, the …