Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 36

Full-Text Articles in Physical Sciences and Mathematics

Federated Learning And Applications In Cybersecurity, Ani Sreekumar Dec 2022

Federated Learning And Applications In Cybersecurity, Ani Sreekumar

Cybersecurity Undergraduate Research Showcase

Machine learning is a subfield of artificial intelligence that focuses on making predictions about some outcome based on information from a dataset. In cybersecurity, machine learning is often used to improve intrusion detection systems and identify trends in data that could indicate an oncoming cyber attack. Data privacy is an extremely important aspect of cybersecurity, and there are many industries that have more demanding laws to ensure the security of user data. Due to these regulations, machine learning algorithms can not be widely utilized in these industries to improve outcomes and accuracy of predictions. However, federated learning is a recent …


Is Cybersecurity Training Practical Or Not?, Bhawnish Sharma Dec 2022

Is Cybersecurity Training Practical Or Not?, Bhawnish Sharma

Cybersecurity Undergraduate Research Showcase

With technology growing, there has been an increase in cybercrime. Because of this, private and public sectors face global problems, i.e., phishing, security breaches, and identity theft. With cybersecurity software available on the internet, anyone can access it. As technology advances, cybersecurity experts must answer the tough question of, “is cybersecurity training practical or not”?


A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood Dec 2022

A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood

Cybersecurity Undergraduate Research Showcase

While autonomous vehicles accounted for about 31.4 million vehicles on the road in 2019 (Placek). They have continued to flood the market and have a projected growth to 58 million in just 8 years from now (Placek) As well as a market cap in the billions of dollars. Even the comparatively new AV company Tesla has over 3 times the market cap value of the leading non AV brand Toyota (Market Cap) who are also working toward AVs as well, like their level 2 teammate driver assistance. Following Moore’s Law, as technology continues to improve, their social impact and ethical …


Investigating Privacy Policies Using Policylint Tool, Tricia Camaya Dec 2022

Investigating Privacy Policies Using Policylint Tool, Tricia Camaya

Cybersecurity Undergraduate Research Showcase

Organizations essentially inform clients about data collection and sharing practices through privacy policies. Recent research has proposed tools to help users better comprehend these lengthy and intricate legal documents that summarize collection and sharing. However, these instruments have a significant flaw. They overlook the possibility of contradictions within a particular policy. This paper introduces PolicyLint, a tool for analyzing privacy policies that simultaneously considers negation and varying semantic levels of data objects and entities. PolicyLint accomplishes this by using sentence-level natural language processing to automatically create ontologies from a large corpus of privacy policies and capturing both positive and negative …


Ethical Concerns In Self-Driving Cars, Victoria Shand Dec 2022

Ethical Concerns In Self-Driving Cars, Victoria Shand

Cybersecurity Undergraduate Research Showcase

Automobiles have been in existence since 1672 and only went up from there. Self-driving cars are a fantastic piece of technology; they can self-park, laser ranger finder, and near vision; they can map the road in advance, understand road signs, and, in some cases, handle certain variables on the road.

When talking about any form of technology, the possibilities are endless technology is a continuously evolving idea. When discussing self-driving cars, they have some fantastic and encouraging benefits and ideas. Some ideas would be that vehicles could communicate with each other, we could eliminate the need for traffic lights, and …


A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan Dec 2022

A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan

Cybersecurity Undergraduate Research Showcase

Since the 1980’s and creation of the World Wide Web, Internet utilization is a common and arguably, necessary, part of daily life. The internet is young and still relatively new, but as of 2016, 3.4 billion people were online, and that number has since grown [1]. This is a significant number, but as such a common part of daily life, how elements of the internet or its infrastructure work is complex. The world would very likely be thrown into dark ages if DNS or any other significant aspect of the internet's infrastructure were to succumb to an attack. The Colonial …


The Importance Of Social Engineering, Jalaya Allen Nov 2022

The Importance Of Social Engineering, Jalaya Allen

Cybersecurity Undergraduate Research Showcase

Most people are afraid of being attacked when walking to their car, relaxing at home, or doing normal things like shopping. Though the unlikeliest of attacks have become one of the most dangerous. Just imagine someone having the ability to watch your every move online and virtually. They can find your credit card information, passwords, social security number and so much more. Then with that information, they can steal your identity and sell it on the black market as well as threaten you for money. Attacks like these use something called Social Engineering to trick the user into giving up …


The Impact Of Ethical Hacking Within Small Businesses, Nygia Tribbey Oct 2022

The Impact Of Ethical Hacking Within Small Businesses, Nygia Tribbey

Cybersecurity Undergraduate Research Showcase

The Internet has brought about a new way for businesses to reach their customers. With the help of social media, websites, and email marketing, small businesses have gained a lot of new customers. However, these new online customers have also opened up their businesses to a whole new world of cyber crime. Cyber crime is the illegal use of computers and networks to cause damage or steal information. This type of crime affects small businesses as well as large corporations. Small businesses often find themselves at a disadvantage because they don't have the resources to hire an ethical hacker or …


Deep Learning: The Many Approaches Of Intrusion Detection System Can Be Implemented And Improved Upon, Trinity Taylor Apr 2022

Deep Learning: The Many Approaches Of Intrusion Detection System Can Be Implemented And Improved Upon, Trinity Taylor

Cybersecurity Undergraduate Research Showcase

For my research topic I decided to look at Deep learning. Deep learning can be used in many ways for example in web searching. Deep learning can also can improve new businesses and products. Deep learning could lead to amazing discoveries. Deep learning is making a neural network learn something. In my research I talk about Intrusion detection system, traditional approach for intrusion detection, existing intrusion detection, machine learning and deep learning based intrusion detection system, and future work.


Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu Apr 2022

Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu

Modeling, Simulation and Visualization Student Capstone Conference

The Data-Enabled Advanced Training Program for Cybersecurity Research and Education (DeapSECURE) was introduced in 2018 as a non-degree training consisting of six modules covering a broad range of cyberinfrastructure techniques, including high performance computing, big data, machine learning and advanced cryptography, aimed at reducing the gap between current cybersecurity curricula and requirements needed for advanced research and industrial projects. By its third year, DeapSECURE, like many other educational endeavors, experienced abrupt changes brought by the COVID-19 pandemic. The training had to be retooled to adapt to fully online delivery. Hands-on activities were reformatted to accommodate self-paced learning. In this paper, …


Applications Of Parallel Discrete Event Simulation, Erik J. Jensen Apr 2022

Applications Of Parallel Discrete Event Simulation, Erik J. Jensen

Modeling, Simulation and Visualization Student Capstone Conference

This work presents three applications of parallel discrete event simulation (PDES), which describe the motivation for and the benefits of using PDES, the kinds of synchronization algorithms that are used, and scaling behavior with these different synchronization algorithms.


A Technological Skills Gap: What Can We Do About It?, Will Moore Apr 2022

A Technological Skills Gap: What Can We Do About It?, Will Moore

Cybersecurity Undergraduate Research Showcase

In the last thirty years, education has transformed faster than ever before. As a society we have developed new classroom technologies that allow for better communication and access to more information than ever before. However, at the same time, education seems rockier than ever before. Several major companies, including Tesla, Apple, Google and Netflix, no longer require a college degree for employment, and many companies, such as Amazon, Google, and Microsoft, have begun programs to train their own employees in skills and create their own certification programs to help employees learn necessary skills (Akhtar, O’Donnell). Why do these major corporations …


Cova Cci Undergrad Cyber Research, Nana Jeffrey Apr 2022

Cova Cci Undergrad Cyber Research, Nana Jeffrey

Cybersecurity Undergraduate Research Showcase

Is your digital assistant your worst enemy? Modern technology has impacted our lives in a positive way making tasks that were once time consuming become more convenient. For example a few years ago writing down your grocery list with a paper and pen was a norm, now with technology we have access to IoT devices such as smart fridges that can inform us on what items are low in stock, send a message to our digital assistants such as iOS Siri and Amazon's Alexa to remind us to buy those groceries. Although these digital assistants have helped make our daily …


How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson Apr 2022

How Online Platforms Are Used By Child Predators And What Are The Effective Preventive Measures?, Kayla Macpherson

Cybersecurity Undergraduate Research Showcase

As technology has evolved greatly in the twenty-first century alone, younger generations have had an opportunity to grow up with devices at their fingertips none have ever before. This accessibility has strengthened their ability of quick use, skill, and a strong feeling of comfort with using and having access to technology. There seems to be more children with access to the internet than there are without, but there is also an ongoing issue behind the screens.


Application Of U.S. Sanction Laws And Ransomware Payments, Trinity Woodbury Apr 2022

Application Of U.S. Sanction Laws And Ransomware Payments, Trinity Woodbury

Cybersecurity Undergraduate Research Showcase

Ransomware is a major threat that widely affects individuals and organizations, including businesses. Ransomware victims face the situation of potentially paying ransom payments to threat actors, some of whom might be foreign-based criminals. Ransomware affects victims from all sectors and industries.


Diabetic Foot Exam System, Stephanie Trusty Mar 2022

Diabetic Foot Exam System, Stephanie Trusty

Undergraduate Research Symposium

The diabetic foot exam system aims to perform certain aspects of the dermatological and musculoskeletal assessments that are typical to a 3-minute diabetic foot exam. Utilizing the RaspberryPi computer and camera module, the system seeks to capture a series of images of the patient’s foot. It then evaluates these images for calluses, blisters, and three types of deformities: claw toe deformities, hammertoe deformities, and bunions. This evaluation is performed using a trained TensorFlow image classification model, which categorizes the image as a callus, blister, or deformity. The system was tested using six different images: four callus images, a hammertoe deformity …


Covid-19 Classroom Occupancy Detection System, Stephanie Trusty Mar 2022

Covid-19 Classroom Occupancy Detection System, Stephanie Trusty

Undergraduate Research Symposium

The classroom occupancy detection system aims to limit the spread of COVID-19 and support mitigation efforts advised by national and international health organizations by enforcing social distancing in classroom environments. Utilizing the RaspberryPi computer and its compatible camera module, the system accomplishes this by capturing an overhead image of a classroom and assessing the image for violations. Here, violations are defined as the presence of adjacent occupied seats. As such, for an acceptable state to be detected, there must be at least one vacant seat between all students seated in the classroom. The system communicates the classroom’s state with two …


Objective Measure Of Working Memory Capacity Using Eye Movements, James Owens, Gavindya Jayawardena, Yasasi Abeysinghe, Vikas G. Ashok, Sampath Jayarathna Mar 2022

Objective Measure Of Working Memory Capacity Using Eye Movements, James Owens, Gavindya Jayawardena, Yasasi Abeysinghe, Vikas G. Ashok, Sampath Jayarathna

Undergraduate Research Symposium

Human-autonomy teaming (HAT) has become an important area of research due to the autonomous systems being developed for different applications, such as remotely controlled aircraft. Many remotely controlled vehicles will be controlled by automated systems, with a human monitor that may be monitoring multiple vehicles simultaneously. The attention and working memory capacity of operators of remote-controlled vehicles must be maintained at appropriate levels during operation. However, there is currently no direct method of determining working memory capacity, which is important because it is a measure for how memory is being stored for a short term and interacting with long term …


Two-Stage Transfer Learning For Facial Expression Classification In Children, Gregory Hubbard, Megan Witherow, Khan Iftekharuddin Mar 2022

Two-Stage Transfer Learning For Facial Expression Classification In Children, Gregory Hubbard, Megan Witherow, Khan Iftekharuddin

Undergraduate Research Symposium

Studying facial expressions can provide insight into the development of social skills in children and provide support to individuals with developmental disorders. In afflicted individuals, such as children with Autism Spectrum Disorder (ASD), atypical interpretations of facial expressions are well-documented. In computer vision, many popular and state-of-the-art deep learning architectures (VGG16, EfficientNet, ResNet, etc.) are readily available with pre-trained weights for general object recognition. Transfer learning utilizes these pre-trained models to improve generalization on a new task. In this project, transfer learning is implemented to leverage the pretrained model (general object recognition) on facial expression classification. Though this method, the …


Cyber Whistleblowers: The Black Sheep Of Whistleblowing?, Andrew Wisniewski Jr. Jan 2022

Cyber Whistleblowers: The Black Sheep Of Whistleblowing?, Andrew Wisniewski Jr.

Cybersecurity Undergraduate Research Showcase

From the Introduction:

Contrary to popular belief, this paper argues that cyber whistleblowing can contribute to a greater cyber security posture. However, this requires the development of clearer legal obligations and protections for cyber whistleblowers. This paper will explore the psychology behind whistleblowing, the effectiveness of whistleblowing in a cybersecurity context, how to create a safer and more transparent environment for whistleblowers and companies, and how current laws contribute to cyber whistleblowing.


Ransombuster Iot: A Intrusion Detection And Dataset Creation Tool For Ransomware Attacks Within Iot Networks, Jackson M. Walker Jan 2022

Ransombuster Iot: A Intrusion Detection And Dataset Creation Tool For Ransomware Attacks Within Iot Networks, Jackson M. Walker

Cybersecurity Undergraduate Research Showcase

The proposed research follows the design-science guidelines(Hevner, 2004). This paper uses these design-science methods for developing the guidelines for the implementation of the proposed architecture, understanding previous research contributions, and evaluating of research. This paper proposes a network artifact for studying ransomware IoT intrusion detection techniques and offers a proposed network architecture to serve as a framework for creating a publicly available dataset for IoT research on ransomware.


Cyber Threat On The High Seas. A Growing Threat To Infrastructure, James Cummins Jan 2022

Cyber Threat On The High Seas. A Growing Threat To Infrastructure, James Cummins

Cybersecurity Undergraduate Research Showcase

In a growing digital and cloud-connected world, all aspects of our lives are becoming interconnected. All these interconnections breed a possibility for ever-increasing cybersecurity threats. The oceans are not impervious to these attacks. In this research paper, we address the following questions.

What threats do commercial ships face today?

What actions are necessary to mitigate these threats?


Mitigation Of Algorithmic Bias To Improve Ai Fairness, Kathy Wang Jan 2022

Mitigation Of Algorithmic Bias To Improve Ai Fairness, Kathy Wang

Cybersecurity Undergraduate Research Showcase

As artificial intelligence continues to evolve rapidly with emerging innovations, mass-scale digitization could be disrupted due to unfair algorithms with historically biased data. With the rising concerns of algorithmic bias, detecting biases is essential in mitigating and implementing an algorithm that promotes inclusive representation. The spread of ubiquitous artificial intelligence means that improving modeling robustness is at its most crucial point. This paper examines the omnipotence of artificial intelligence and its resulting bias, examples of AI bias in different groups, and a potential framework and mitigation strategies to improve AI fairness and remove AI bias from modeling techniques.


Cybersecurity In Fintech Companies, Efstratios Zouros Jan 2022

Cybersecurity In Fintech Companies, Efstratios Zouros

Cybersecurity Undergraduate Research Showcase

Have you recently accessed your bank account online? Have you accessed any financial instrument through your computer or your mobile device? If you are reading this, chances are you have. Every time you utilize those services, you ultimately put your trust in the financial institutions that offer them. You trust that they can securely keep your private information, while also keeping your savings safe. Ultimately, there is a certain dependability and trust in financial institutions that have been present on earth before most of us.


The Future Of Blockchain, Elijah N. Gartrell Jan 2022

The Future Of Blockchain, Elijah N. Gartrell

Cybersecurity Undergraduate Research Showcase

Blockchain is the leading technology for cryptocurrencies, NFT’s and other online marketplace transactions that go through it because of it’s secure technology and how they distribute their data with Smart Contracts. This report shows how we can use Blockchain for other uses in our world and how it could advance us in the cybersecurity aspects. Showing also why we should use blockchain with basic cybersecurity concerns as in: Malware Detection, Voter Fraud, and Medical Record Security.


Digital Forensic Investigation, Dejuan Green Jan 2022

Digital Forensic Investigation, Dejuan Green

Cybersecurity Undergraduate Research Showcase

Finding, acquiring, processing, analyzing, and reporting data on electronically stored data is the main goal of the forensic science discipline known as "digital forensics." Nearly all illegal acts include the use of electronic evidence, making digital forensics support essential for law enforcement investigations. Furthermore, digital forensics is very important to cases aiding in many cases and can lead to saving lives/ victims and locking up criminals. A wide range of devices, including laptops, cellphones, remote storage, unmanned aerial systems, shipborne equipment, and more, can be used to gather electronic evidence. [2] Digital forensics' major objective is to take data from …


Deepfakes: Ai Technology Of The Future, Hosanna Root Jan 2022

Deepfakes: Ai Technology Of The Future, Hosanna Root

Cybersecurity Undergraduate Research Showcase

Deepfakes technology’s danger stems from its ability to create realistic but fake synthesized media that people often identify as something that is real. With this powerful technology in the wrong hands, deepfakes can cause devastating havoc through information warfare, election campaign disruptions, and more, creating distrust in society. Disinformation is already rampant today, even without wide deployments of deepfakes, which is concerning given the fact that deepfakes’ nefarious full potentials are yet to be reached.


Examining Trends And Experiences Of The Last Four Years Of Socially Engineered Ransomware Attacks, William Seymour Jan 2022

Examining Trends And Experiences Of The Last Four Years Of Socially Engineered Ransomware Attacks, William Seymour

Cybersecurity Undergraduate Research Showcase

This study examines and reports the trends of social engineering-based ransomware attacks over the past four years from three major technology corporations. The focus of the reports was on major threat actors and their attacks against the corporations and their clients. The data were organized chronologically by year, and prevalent or abnormal findings were shared in this report. It was found that social engineering attacks were tremendously effective. Many ransomware attacks stemmed from Phishing. Social engineering approaches allowed attackers to conduct breaches using ransomware applications like GandCrab and Ryuk. Humans are incredibly susceptible and fall for social engineering tactics- primarily …


Corporate Cybersecurity In The Context Of M&A Transactions, Cameron Beck Jan 2022

Corporate Cybersecurity In The Context Of M&A Transactions, Cameron Beck

Cybersecurity Undergraduate Research Showcase

The rapid rise of digital devices has unlocked a new dimension of innovation and prosperity in the 21st century. Computers are now an integrated and ubiquitous part of our global culture. You would be hard-pressed to walk into any given room without several computer chips humming inaudibly inside the machines that facilitate our modern world. Even lightbulbs and doorbells are connected to the Internet, capturing information from the world around them and sending that information to the Cloud. The Internet expands access to communication, international marketplaces, entertainment, professional resources, and nearly every book in the world.


Cybersecurity & Correctional Institutions, Kelly Himelwright Jan 2022

Cybersecurity & Correctional Institutions, Kelly Himelwright

Cybersecurity Undergraduate Research Showcase

Cybersecurity is becoming an increasingly important aspect of correctional operations. To properly maintain security, more jails and prisons are using comprehensive cyber protection techniques. Correctional facilities face risks that were perhaps unimaginable only a few decades ago. Many organizations have used information technology to help them run their businesses, but few have the resources or vision to foresee and adequately manage the cyber dangers that come with it. Institutions need to be more aware of these hazards, as well as have more information security experts on staff.