Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (2)
- Aeronautical Vehicles (1)
- Aerospace Engineering (1)
- Applied Mechanics (1)
- Computational Engineering (1)
-
- Computer-Aided Engineering and Design (1)
- Electrical and Computer Engineering (1)
- Ergonomics (1)
- Hardware Systems (1)
- Industrial Engineering (1)
- Industrial Technology (1)
- Manufacturing (1)
- Mechanical Engineering (1)
- Navigation, Guidance, Control and Dynamics (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Other Computer Engineering (1)
- Propulsion and Power (1)
- Structures and Materials (1)
- Systems Engineering (1)
- Systems Engineering and Multidisciplinary Design Optimization (1)
- Systems and Communications (1)
Articles 1 - 3 of 3
Full-Text Articles in Risk Analysis
Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan
Kwad - Ksu All Weather Autonomous Drone, Nick Farinacci, Sebastian Gomez, Stewart Baker, Ed Sheridan
Symposium of Student Scholars
"KWAD" or "KSU all-Weather Autonomous Drone" project was sponsored by Ultool, LLC to the KSU Research and Service Foundation to create a lightweight drone capable of capturing HD video during all-weather operations. The conditions of all-weather operation include rainfall of one inch per hour and wind speeds of up to twenty miles per hour. In addition, a global minimum structural safety factor of two is required to ensure the system's integrity in extreme weather conditions. Potential mission profiles include autonomous aerial delivery, topological mapping in high moisture areas, security surveillance, search and rescue operations, emergency transportation of medical supplies, and …
Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas
Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas
Symposium of Student Scholars
Ransomware is classified as one of the main types of malware and involves the design of exploitations of new vulnerabilities through a host. That allows for the intrusion of systems and encrypting of any information assets and data in order to demand a sum of payment normally through untraceable cryptocurrencies such as Monero for the decryption key. This rapid security threat has put governments and private enterprises on high alert and despite evolving technologies and more sophisticated encryption algorithms critical assets are being held for ransom and the results are detrimental, including the recent Colonial Pipeline ransomware attack in 2021 …
Security And Privacy Analysis Of Wearable Health Device, Abm Kamrul Islam Riad
Security And Privacy Analysis Of Wearable Health Device, Abm Kamrul Islam Riad
Symposium of Student Scholars
Wearable technology allows for consumers to record their healthcare data for either personal or clinical use via portable devices. As advancements in this technology continue to rise, the use of these devices has become more widespread. In this paper, we examine the significant security and privacy features of three health tracker devices: Fitbit, Jawbone and Google Glass. We also analyze the devices' strength and how the devices communicate via its Bluetooth pairing process with mobile devices. We explore possible malicious attacks through Bluetooth networking. The outcomes of this analysis illustrate how these devices allow third parties to access sensitive information, …