Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Cybersecurity (2)
- Special Operations Forces (2)
- Supply chains (2)
- And challenges (1)
- Biocybersecurity (1)
-
- Bioprocessing (1)
- Biosecurity (1)
- CPTED (1)
- Climate change (1)
- Climate science (1)
- Crime prevention (1)
- Criminal Networks (1)
- Cyber security (1)
- Cyberbiosecurity (1)
- Cybercrime (1)
- Doc2Vec (1)
- Global Greenhouse Gas emissions (1)
- Government regulations (1)
- Hacking (1)
- Health crisis (1)
- Implementation (1)
- International governance tools (1)
- Issues (1)
- Machine Learning (1)
- Maritime transportation (1)
- Navigation (1)
- Network environments (1)
- Non-traditional security threats (1)
- Randomized experiment (1)
- Real-time monitoring (1)
Articles 1 - 8 of 8
Full-Text Articles in Physical Sciences and Mathematics
The Role Of Public And Private Sectors: How To Promote National Cybersecurity Strategies And Critical Infrastructure Protection In Southeastern Europe, Larry Cruz
Independent Study Project (ISP) Collection
This paper seeks to address the important role of public and private interests in protecting critical infrastructure in Southeastern Europe, providing examples from Serbia. While the public sector does have a role in protecting critical infrastructure needs, it is the private sector which holds major oversight of the critical infrastructures of the region, therefore having an important role in maintaining their functionality and protection. The literature in this field argues for more collaboration and information sharing between the public and private sectors of the region, though the task is not as simple as it appears given the varying aspirations of …
Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri
Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri
Publications
As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable.
Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri
Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri
Publications
The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply chain in managing and mitigating risks, and the authors define C-SCRM as the process of identifying, assessing, and mitigating the risks associated with the distributed and interconnected nature of information and operational technology products and service supply chains. As Special Operations Forces increasingly rely on sophisticated hardware and software products, this quick, well-researched monograph provides a detailed accounting of C-SCRM associated laws, regulations, instructions, tools, and strategies meant to mitigate vulnerabilities and risks—and how we might best manage the evolving and ever-changing array of …
Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison
Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison
EBCS Articles
Many online chat applications live in a grey area between the legitimate web and the dark net. The Telegram network in particular can aid criminal activities. Telegram hosts “chats” which consist of varied conversations and advertisements. These chats take place among automated “bots” and human users. Classifying legitimate activity from illegitimate activity can aid law enforcement in finding criminals. Social network analysis of Telegram chats presents a difficult problem. Users can change their username or create new accounts. Users involved in criminal activity often do this to obscure their identity. This makes establishing the unique identity behind a given username …
Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum
Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum
EBCS Articles
Crime prevention through environmental design (CPTED) is a non-punitive method for reducing crime through the design of the built environment. The relevance of CPTED strategies however is less clear in the context of computing environments. Building upon prior research indicating that computing environments may change computer users’ behaviors, this study tests the effectiveness of CPTED based approaches in mitigating system trespassing events. Findings from this randomized controlled field trial demonstrate that specific CPTED strategies can mitigate hacking events by: reducing the number of concurrent activities on the target computer, attenuating the number of commands typed in the attacked computer, and …
Is Climate Change A Threat To International Peace And Security?, Mark P. Nevitt
Is Climate Change A Threat To International Peace And Security?, Mark P. Nevitt
Faculty Articles
This article argues that climate change’s destabilizing impacts require us to look at existing international governance tools at our disposal with fresh eyes. As such, Council climate action cannot and should not be dismissed out-of-hand. As conflicts rise, migration explodes, and nations are extinguished, how long can the Council remain on the climate sidelines? Hence, my call for a re-conceptualized “Council 3.0” to meet the climate security challenges this century.
This article proceeds as follows. In Part II, I describe and analyze the current state of climate science and the climate-security threats facing the world. This includes an analysis of …
Real-Time Monitoring As A Supplementary Security Component Of Vigilantism In Modern Network Environments, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan
Real-Time Monitoring As A Supplementary Security Component Of Vigilantism In Modern Network Environments, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan
Research outputs 2014 to 2021
© 2020, The Author(s). The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in today’s dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization’s network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but …
Biocybersecurity: A Converging Threat As An Auxiliary To War, Lucas Potter, Orlando Ayala, Xavier-Lewis Palmer
Biocybersecurity: A Converging Threat As An Auxiliary To War, Lucas Potter, Orlando Ayala, Xavier-Lewis Palmer
Engineering Technology Faculty Publications
Biodefense is the discipline of ensuring biosecurity with respect to select groups of organisms and limiting their spread. This field has increasingly been challenged by novel threats from nature that have been weaponized such as SARS, Anthrax, and similar pathogens, but has emerged victorious through collaboration of national and world health groups. However, it may come under additional stress in the 21st century as the field intersects with the cyberworld-- a world where governments have already been struggling to keep up with cyber attacks from small to state-level actors as cyberthreats have been relied on to level the playing field …