Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 40

Full-Text Articles in Physical Sciences and Mathematics

A Federated Deep Autoencoder For Detecting Iot Cyber Attacks, Christopher M. Regan Dec 2020

A Federated Deep Autoencoder For Detecting Iot Cyber Attacks, Christopher M. Regan

Master of Science in Computer Science Theses

Internet of Things (IoT) devices are mass-produced and rapidly released to the public in a rough state. IoT devices are produced by various companies satisfying various goals, such as monitoring the environment, senor trigger cameras, on-demand electrical switches. These IoT devices are produced by companies to meet a market demand quickly, producing a rough software solution that customers or other enterprises willingly buy with the expectation they will have software updates after production. These IoT devices are often heterogeneous in nature, only to receive updates at infrequently intervals, and can remain out of sight on a home or office network …


A Preliminary Analysis Of How A Software Organization’S Maturity And Size Affect Its Intellectual Property Portfolio, Daniel Gifford Dec 2020

A Preliminary Analysis Of How A Software Organization’S Maturity And Size Affect Its Intellectual Property Portfolio, Daniel Gifford

Master of Science in Software Engineering Theses

Intellectual property, commonly known as IP, is complex. The four main types of software IP, which is what this thesis will focus on, are patents, trade secrets, trademarks, and copyright. Patents, trade secrets, and copyrights were all studied by this thesis. Software IP is unique in that it can by copyrighted. Different IP owners, which can be businesses of different types, individuals, and universities, often have different strategies as to how to use their IP portfolio. This thesis studies differences in IP usage between these entities specifically in the field of software. Large and small software companies were analyzed specifically. …


An Analysis Of The Effectiveness Of Cuban Cyberactivism, Neta Kanny Nov 2020

An Analysis Of The Effectiveness Of Cuban Cyberactivism, Neta Kanny

Journal of Global Initiatives: Policy, Pedagogy, Perspective

This article applies power-law degree distribution and network theory as a conceptual framework for assessing the effectiveness of Cuban cyberactivism based on an analysis of previous scholarly work on the topic. While Cuban cyberactivism indicates the potential for a more accessible, just, and transparent media environment, the movement continues to face serious obstacles due to extensive controls put in place by the Communist Party of Cuba.


Contingency Planning Amidst A Pandemic, Natalie C. Belford Oct 2020

Contingency Planning Amidst A Pandemic, Natalie C. Belford

KSU Proceedings on Cybersecurity Education, Research and Practice

Proper prior planning prevents pitifully poor performance: The purpose of this research is to address mitigation approaches - disaster recovery, contingency planning, and continuity planning - and their benefits as they relate to university operations during a worldwide pandemic predicated by the Novel Coronavirus (COVID-19). The most relevant approach pertaining to the University’s needs and its response to the Coronavirus pandemic will be determined and evaluated in detail.


Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin Oct 2020

Developing An Ai-Powered Chatbot To Support The Administration Of Middle And High School Cybersecurity Camps, Jonathan He, Chunsheng Xin

KSU Proceedings on Cybersecurity Education, Research and Practice

Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails, phone calls, as well as the human burden for answering the same or similar questions again and again based on questions we received from previous camps. This paper introduces our practical experience to implement an AI-powered chatbot for middle and high school cybersecurity camps …


A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad Oct 2020

A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad

KSU Proceedings on Cybersecurity Education, Research and Practice

Serious games can challenge users in competitive and entertaining ways. Educators have used serious games to increase student engagement in cybersecurity education. Serious games have been developed to teach students various cybersecurity topics such as safe online behavior, threats and attacks, malware, and more. They have been used in cybersecurity training and education at different levels. Serious games have targeted different audiences such as K-12 students, undergraduate and graduate students in academic institutions, and professionals in the cybersecurity workforce. In this paper, we provide a survey of serious games used in cybersecurity education and training. We categorize these games into …


Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman Oct 2020

Factors That Influence Hipaa Secure Compliance In Small And Medium-Size Health Care Facilities, Wlad Pierre-Francois, Indira Guzman

KSU Proceedings on Cybersecurity Education, Research and Practice

This study extends the body of literature concerning security compliance by investigating the antecedents of HIPPA security compliance. A conceptual model, specifying a set of hypothesized relationships between management support, security awareness, security culture; security behavior, and risk of sanctions to address their effect on HIPAA security compliance is presented. This model was developed based on the review of the literature, Protection Motivation Theory, and General Deterrence Theory. Specifically, the aim of the study is to examine the mediating role of risk of sanctions on HIPAA security compliance.


Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus Oct 2020

Towards An Assessment Of Pause Periods On User Habituation In Mitigation Of Phishing Attacks, Amy Antonucci, Yair Levy, Martha Snyder, Laurie Dringus

KSU Proceedings on Cybersecurity Education, Research and Practice

Social engineering is the technique in which the attacker sends messages to build a relationship with the victim and convinces the victim to take some actions that lead to significant damages and losses. Industry and law enforcement reports indicate that social engineering incidents costs organizations billions of dollars. Phishing is the most pervasive social engineering attack. While email filtering and warning messages have been implemented for over three decades, organizations are constantly falling for phishing attacks. Prior research indicated that attackers use phishing emails to create an urgency and fear response in their victims causing them to use quick heuristics, …


Towards An Assessment Of Judgment Errors In Social Engineering Attacks Due To Environment And Device Type, Tommy Pollock, Yair Levy, Wei Li, Ajoy Kumar Oct 2020

Towards An Assessment Of Judgment Errors In Social Engineering Attacks Due To Environment And Device Type, Tommy Pollock, Yair Levy, Wei Li, Ajoy Kumar

KSU Proceedings on Cybersecurity Education, Research and Practice

Phishing continues to be a significant invasive threat to computer and mobile device users. Cybercriminals continuously develop new phishing schemes using email, and malicious search engine links to gather personal information of unsuspecting users. This information is used for financial gains through identity theft schemes or draining financial accounts of victims. Users are often distracted and fail to fully process the phishing attacks then unknowingly fall victim to the scam until much later. Users operating mobile phones and computers are likely to make judgment errors when making decisions in distracting environments due to cognitive overload. Distracted users can fail to …


Cybersecurity Strategy Against Cyber Attacks Towards Smart Grids With Pvs, Fangyu Li, Maria Valero, Liang Zhao, Yousef Mahmoud Oct 2020

Cybersecurity Strategy Against Cyber Attacks Towards Smart Grids With Pvs, Fangyu Li, Maria Valero, Liang Zhao, Yousef Mahmoud

KSU Proceedings on Cybersecurity Education, Research and Practice

Cyber attacks threaten the security of distribution power grids, such as smart grids. The emerging renewable energy sources such as photovoltaics (PVs) with power electronics controllers introduce new potential vulnerabilities. Based on the electric waveform data measured by waveform sensors in the smart grids, we propose a novel cyber attack detection and identification approach. Firstly, we analyze the cyber attack impacts (including cyber attacks on the solar inverter causing unusual harmonics) on electric waveforms in distribution power grids. Then, we propose a novel deep learning based mechanism including attack detection and attack diagnosis. By leveraging the electric waveform sensor data …


Web Developer Summer Intern At Keller Williams Realty- Cs 7995, Revatee Vaidya, Project Advisor: Dawn Tatum Jul 2020

Web Developer Summer Intern At Keller Williams Realty- Cs 7995, Revatee Vaidya, Project Advisor: Dawn Tatum

C-Day Computing Showcase

The purpose of this poster is to outline the duties of a Summer intern at Keller Williams Realty in Atlanta, Georgia as a Web Developer Intern. At Keller Williams, my aim was to develop and design websites for Blue Apple Real Estate School and Blue Apple Homes using WordPress and Learn Dash. The poster discusses my summer training, projects I was involved in, Technologies I used and my future goals.


Global Product And Technology Intern, Adp- Cs 7995, Keerthi Manchukonda, Project Advisor: Dawn Tatum Jul 2020

Global Product And Technology Intern, Adp- Cs 7995, Keerthi Manchukonda, Project Advisor: Dawn Tatum

C-Day Computing Showcase

I'm working on API for the PDF service generation of the Canadian Tax forms(Federal and Provinces) in specific. But it can be used for all countries and states.


Global & Product Technology Intern Adp- Cs 7995, Neha Gosavi, Project Advisor: Dawn Tatum Jul 2020

Global & Product Technology Intern Adp- Cs 7995, Neha Gosavi, Project Advisor: Dawn Tatum

C-Day Computing Showcase

I am Neha Gosavi. I am graduate student in Computer Science and currently doing summer internship as Global Product & Technology Intern at ADP. As intern I am part of SRE team(Site Reliability Engineer ).SRE team comprised of engineers taken from a diverse set of disciplines. This cross functional team was designed to support one of the key product offered by the company. I was involved with AWS cloud migration Poject and docker application, Splunk dashboard.


Second Language Education Website And App Design, Songqiao Yu, Project Advisor: Mohammed Aledhari Jul 2020

Second Language Education Website And App Design, Songqiao Yu, Project Advisor: Mohammed Aledhari

C-Day Computing Showcase

During the pandemic, schools are closed and it brought a great chance for JoJo Learning to expand and explore the new method of customer acquisition. With a combination method of educational robot and E-book, JoJo is providing his customers with a compound solution for summer second language learning for kids and toddlers. As part of the team, my main responsibility is to prototype and publish new UIUX design and using data analysis as a method to find the key channels of the business.


Facial Recognition And Object Detection-Based Smart Cashier System- Cs 4732, Timmy Duong, Project Advisor: Mohammed Aledhari Jul 2020

Facial Recognition And Object Detection-Based Smart Cashier System- Cs 4732, Timmy Duong, Project Advisor: Mohammed Aledhari

C-Day Computing Showcase

The topic of smart based cashier system. Professor Dr. Aledhari is the project advisor for CS4732 Machine Vision.


Improving Policy Making With Informed Covid-19 Case Prediction-Cs 4267, John Hurd, Project Advisor: Mohammed Aledhari Jul 2020

Improving Policy Making With Informed Covid-19 Case Prediction-Cs 4267, John Hurd, Project Advisor: Mohammed Aledhari

C-Day Computing Showcase

Covid-19 has necessitated many changes in the way life in the United States of America is lived. These include things such as new operational hours for retail and other service locations, mandatory and encouraged social distancing protocols on a state and federal level, and major changes to the way educational services are delivered in K-12 and higher education in both public and private contexts. The goal of this project is to produce a mathematical model with the express purpose of directly aiding pandemic response policy decision making by comparing predicted impacts of various logistical decisions and social distancing guidelines.


Using Artificial Intelligence To Prescribe Medicine- Cs 4732, Xander Bush, Louis Livingston, Project Advisor: Mohammed Aledhari Jul 2020

Using Artificial Intelligence To Prescribe Medicine- Cs 4732, Xander Bush, Louis Livingston, Project Advisor: Mohammed Aledhari

C-Day Computing Showcase

With the current advancements being made in the Machine Learning field, utilizing Artificial Intelligence and Deep Learning techniques to analyze complex information such as genome information has become possible. By creating and building up a database of such data as well as compatible medicines, we suspect it is possible to prescribe personalized medicines to treat patients with a high percentage of success while also being able to take into account various other health conditions and pre-dispositions. This possibility depends heavily on the ability of the Neural Network or various other Machine Learning structure to correctly interpret the information from a …


Service Industry Sentience- Cs 4267, Charles Peery, Project Advisor: Mohammed Aledhari Jul 2020

Service Industry Sentience- Cs 4267, Charles Peery, Project Advisor: Mohammed Aledhari

C-Day Computing Showcase

Since Amazon GO opened its' doors to employees in late 2016, businesses have been watching closely to see if a store without checkout can succeed in the current market.

While self-checkout stations have been in use since 1986, businesses are looking for ways to enhance the convenience of shoppers. From online ordering, contactless payments, and same day pickup, to drone delivery, leaving packages inside your home, and now checkout free stores.

In this presentation I explore the possibility of using YOLO and OpenCV to produce a checkout system based on object recognition which makes a system that is cheaper and …


Tracking High-Speed Chase Vehicles With Machine Learning​- Cs 4732, Louis Livingston, Dylan Sirna, Project Advisor: Mohammed Aledhari Jul 2020

Tracking High-Speed Chase Vehicles With Machine Learning​- Cs 4732, Louis Livingston, Dylan Sirna, Project Advisor: Mohammed Aledhari

C-Day Computing Showcase

From law enforcement officers, to fleeing suspects, to the general public, lengthy police pursuits poses a risk to all involved. With modern advances in machine vision, pursuits caught on camera can be analyzed with machine learning techniques. These techniques can then be used to produce datasets for future researchers to use in machine learning algorithms. This paper explores ways to produce those datasets using OpenCV, a machine vision library for Python, as well as GOTURN, a object tracker for OpenCV.


Wellstar Health Systems Internship- Cse 4983, Joyce Anderson, Project Advisor: Dawn Tatum Jul 2020

Wellstar Health Systems Internship- Cse 4983, Joyce Anderson, Project Advisor: Dawn Tatum

C-Day Computing Showcase

I interned at Wellstar Health Systems in there IT department. Staring from months 1 - 6 I rotated throughout the the IT Service Desk, Field Services, IT Service Management, IT Security, and IT Applications departments. Towards months 7 - 12 I worked in the IT Service management depart in the Knowledge based composing and editing knowledge articles for WellStar employees that had ITIL access to view and for instruction on how to work WellStar applications.


It Deployment And Fulfillment Co-Op- Cs 4983, Sam Wilson, Project Advisor: Dawn Tatum Jul 2020

It Deployment And Fulfillment Co-Op- Cs 4983, Sam Wilson, Project Advisor: Dawn Tatum

C-Day Computing Showcase

No abstract provided.


Global Product And Technology Intern- Cs 7995, Krushita Patel, Project Advisor: Dawn Tatum Jul 2020

Global Product And Technology Intern- Cs 7995, Krushita Patel, Project Advisor: Dawn Tatum

C-Day Computing Showcase

My project is about the experience that I have had and I have been currently having working as an intern at ADP working full time. I have also included my work description and what I am looking forward to for my rest of internship.


Global Product And Technology Intern, Adp- Cs 7995, Deeksha Koya, Project Advisor: Dawn Tatum Jul 2020

Global Product And Technology Intern, Adp- Cs 7995, Deeksha Koya, Project Advisor: Dawn Tatum

C-Day Computing Showcase

Migrating the legacy surveys to on platform Salesforce Surveys.


Deep Learning For Identifying Lung Diseases, Lin Wang Jul 2020

Deep Learning For Identifying Lung Diseases, Lin Wang

Master of Science in Computer Science Theses

Growing health problems, such as lung diseases, especially for children and the elderly, require better diagnostic methods, such as computer-based solutions, and it is crucial to detect and treat these problems early. The purpose of this article is to design and implement a new computer vision-based algorithm based on lung disease diagnosis, which has better performance in lung disease recognition than previous models to reduce lung-related health problems and costs . In addition, we have improved the accuracy of the five lung diseases detection, which helps doctors and doctors use computers to solve this problem at an early stage.


Deep Learning For Identifying Breast Cancer, Yihong Li Jul 2020

Deep Learning For Identifying Breast Cancer, Yihong Li

Master of Science in Computer Science Theses

Medical images are playing an increasingly important role in the prevention and diagnosis of diseases. Medical images often contain massive amounts of data. Professional interpretation usually requires a long time of professional study and experience accumulation by doctors. Therefore, the use of super storage and computing power in deep learning as a basis can effectively process a large amount of medical data. Breast cancer brings great harm to female patients, and early diagnosis is the most effective prevention and treatment method, so this project will create a new optimized breast cancer auxiliary diagnosis model based on ResNet. Analyze and process, …


An Assessment Of Global Research Activities On Children And Adolescent Online Security, Adeola O. Opesade Dr, Omolayo A. Adesina Ms. Jun 2020

An Assessment Of Global Research Activities On Children And Adolescent Online Security, Adeola O. Opesade Dr, Omolayo A. Adesina Ms.

Journal of Cybersecurity Education, Research and Practice

The use of the Internet among children and adolescents is now a norm in many parts of the world. As the Internet offers a wide range of benefits to these ones, so does it expose them to possible various risks and harm. Researchers in different countries across the world have engaged in the production of relevant research-based knowledge in order to make the virtual world a safe place for the younger ones. However, while studies have been carried out on the subject of Internet risk among children and adolescents, there is a dearth of information on the assessment of research …


Evaluating And Securing Text-Based Java Code Through Static Code Analysis, Jeong Yang, Young Lee, Amanda Fernandez, Joshua Sanchez Jun 2020

Evaluating And Securing Text-Based Java Code Through Static Code Analysis, Jeong Yang, Young Lee, Amanda Fernandez, Joshua Sanchez

Journal of Cybersecurity Education, Research and Practice

As the cyber security landscape dynamically evolves and security professionals work to keep apace, modern-day educators face the issue of equipping a new generation for this dynamic landscape. With cyber-attacks and vulnerabilities substantially increased over the past years in frequency and severity, it is important to design and build secure software applications from the group up. Therefore, defensive secure coding techniques covering security concepts must be taught from beginning computer science programming courses to exercise building secure applications. Using static analysis, this study thoroughly analyzed Java source code in two textbooks used at a collegiate level, with the goal of …


Malaware Defensive: A Game To Train Users To Combat Malware, Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi Jun 2020

Malaware Defensive: A Game To Train Users To Combat Malware, Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi

Journal of Cybersecurity Education, Research and Practice

Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in a computer system. Malware disrupts the normal behavior of a computer system. The lack of appropriate user training has been one of the main reasons behind the exposure of computer systems to threats, from social engineering to viruses, trojans, and ransomware. Basic knowledge about common behavioral characteristics of malware could help users identify potentially …


Graphical Representation Of Text Semantics, Karl Kevin Tiba Fossoh May 2020

Graphical Representation Of Text Semantics, Karl Kevin Tiba Fossoh

Master of Science in Computer Science Theses

A text is a set of words conveying a particular semantic based on their order, representation and structure. Those elements can be associated through a different set of interpretations, based on frequency and proportionality. The problem with context is that numbers do not help understand the semantics and fall short to convey the message of the text. The graphical representation of text semantics focuses on the conversion of text to images. Contrarily to word clouds that simply produce frequency mapping of words within the text and topic models that essentially give context to word frequencies and proportionalities, images keep intact …


Superb: Superior Behavior-Based Anomaly Detection Defining Authorized Users' Traffic Patterns, Daniel Karasek May 2020

Superb: Superior Behavior-Based Anomaly Detection Defining Authorized Users' Traffic Patterns, Daniel Karasek

Master of Science in Computer Science Theses

Network anomalies are correlated to activities that deviate from regular behavior patterns in a network, and they are undetectable until their actions are defined as malicious. Current work in network anomaly detection includes network-based and host-based intrusion detection systems. However, network anomaly detection schemes can suffer from high false detection rates due to the base rate fallacy. When the detection rate is less than the false positive rate, which is found in network anomaly detection schemes working with live data, a high false detection rate can occur. To overcome such a drawback, this paper proposes a superior behavior-based anomaly detection …