Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

The Role Of Public And Private Sectors: How To Promote National Cybersecurity Strategies And Critical Infrastructure Protection In Southeastern Europe, Larry Cruz Oct 2021

The Role Of Public And Private Sectors: How To Promote National Cybersecurity Strategies And Critical Infrastructure Protection In Southeastern Europe, Larry Cruz

Independent Study Project (ISP) Collection

This paper seeks to address the important role of public and private interests in protecting critical infrastructure in Southeastern Europe, providing examples from Serbia. While the public sector does have a role in protecting critical infrastructure needs, it is the private sector which holds major oversight of the critical infrastructures of the region, therefore having an important role in maintaining their functionality and protection. The literature in this field argues for more collaboration and information sharing between the public and private sectors of the region, though the task is not as simple as it appears given the varying aspirations of …


The Affect Of Globalization On Terrorism, Philip R. Passante Aug 2021

The Affect Of Globalization On Terrorism, Philip R. Passante

Master's Theses

This thesis proposal will dive into the concept of terrorism and how it is an act of force and has proven to be detrimental to the modern world. In addition, this thesis will analyze the concept of terrorism as well as the rationale behind it. It is important to understand and study this as terrorism is a complex entity made up of different themes. The concentration of this thesis will highlight how globalization has affected the phenomena of terrorism in the past, present, and ultimately the future. Globalization and terrorism have a relationship that many scholars and researchers have noticed. …


A Quantitative Argument For Autonomous Aerial Defense Overembedded Missile Systems To Thwart Cruise Threats, Andrew R. Davis Jun 2021

A Quantitative Argument For Autonomous Aerial Defense Overembedded Missile Systems To Thwart Cruise Threats, Andrew R. Davis

Theses and Dissertations

Given the high cost of missile defense systems, their ability to be overwhelmed, and rising tensions between the U.S. and adversaries in the Indo-Pacific region, a new modeled is proposed to investigate a new approach to missile defense. The Autonomous Aerial Defense Against Missiles (AADAM) system leverages reusable, small-scale UAVs to propose a cheaper, more effective system in defending against cruise missile threats. The aim of this system is to provide and additional layer in current missile defense strategies at lower-cost. This modeled system is found to outperform a modeled Patriot system in close-range interception of designated assets, with no …


Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri May 2021

Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri

Publications

As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable.


Water Elites’ Perceptions Of Water Security In The Middle East And North Africa Region, Ghaleb Akari May 2021

Water Elites’ Perceptions Of Water Security In The Middle East And North Africa Region, Ghaleb Akari

Dissertations

The Middle East and North African region continues to face significant water security challenges. The purpose of this dissertation is to gain a deeper understanding of water elites’ perceptions of water security in the MENA region. It is not meant to generalize the findings. Instead, the intention for the research is to identify, explain, and analyze by national elites' contrasting perceptions in Jordan, Iraq, Egypt, and Tunisia.

The study examines water elites’ perceptions in four areas: current knowledge level of water security, water resource management, water service delivery, and water-related risk mitigation. These elites’ perceptions of water security will help …


Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri Apr 2021

Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri

Publications

The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply chain in managing and mitigating risks, and the authors define C-SCRM as the process of identifying, assessing, and mitigating the risks associated with the distributed and interconnected nature of information and operational technology products and service supply chains. As Special Operations Forces increasingly rely on sophisticated hardware and software products, this quick, well-researched monograph provides a detailed accounting of C-SCRM associated laws, regulations, instructions, tools, and strategies meant to mitigate vulnerabilities and risks—and how we might best manage the evolving and ever-changing array of …


Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison Feb 2021

Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison

EBCS Articles

Many online chat applications live in a grey area between the legitimate web and the dark net. The Telegram network in particular can aid criminal activities. Telegram hosts “chats” which consist of varied conversations and advertisements. These chats take place among automated “bots” and human users. Classifying legitimate activity from illegitimate activity can aid law enforcement in finding criminals. Social network analysis of Telegram chats presents a difficult problem. Users can change their username or create new accounts. Users involved in criminal activity often do this to obscure their identity. This makes establishing the unique identity behind a given username …


Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum Jan 2021

Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum

EBCS Articles

Crime prevention through environmental design (CPTED) is a non-punitive method for reducing crime through the design of the built environment. The relevance of CPTED strategies however is less clear in the context of computing environments. Building upon prior research indicating that computing environments may change computer users’ behaviors, this study tests the effectiveness of CPTED based approaches in mitigating system trespassing events. Findings from this randomized controlled field trial demonstrate that specific CPTED strategies can mitigate hacking events by: reducing the number of concurrent activities on the target computer, attenuating the number of commands typed in the attacked computer, and …


Is Climate Change A Threat To International Peace And Security?, Mark P. Nevitt Jan 2021

Is Climate Change A Threat To International Peace And Security?, Mark P. Nevitt

Faculty Articles

This article argues that climate change’s destabilizing impacts require us to look at existing international governance tools at our disposal with fresh eyes. As such, Council climate action cannot and should not be dismissed out-of-hand. As conflicts rise, migration explodes, and nations are extinguished, how long can the Council remain on the climate sidelines? Hence, my call for a re-conceptualized “Council 3.0” to meet the climate security challenges this century.

This article proceeds as follows. In Part II, I describe and analyze the current state of climate science and the climate-security threats facing the world. This includes an analysis of …


Real-Time Monitoring As A Supplementary Security Component Of Vigilantism In Modern Network Environments, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan Jan 2021

Real-Time Monitoring As A Supplementary Security Component Of Vigilantism In Modern Network Environments, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan

Research outputs 2014 to 2021

© 2020, The Author(s). The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in today’s dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization’s network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but …


Biocybersecurity: A Converging Threat As An Auxiliary To War, Lucas Potter, Orlando Ayala, Xavier-Lewis Palmer Jan 2021

Biocybersecurity: A Converging Threat As An Auxiliary To War, Lucas Potter, Orlando Ayala, Xavier-Lewis Palmer

Engineering Technology Faculty Publications

Biodefense is the discipline of ensuring biosecurity with respect to select groups of organisms and limiting their spread. This field has increasingly been challenged by novel threats from nature that have been weaponized such as SARS, Anthrax, and similar pathogens, but has emerged victorious through collaboration of national and world health groups. However, it may come under additional stress in the 21st century as the field intersects with the cyberworld-- a world where governments have already been struggling to keep up with cyber attacks from small to state-level actors as cyberthreats have been relied on to level the playing field …