Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 2 of 2
Full-Text Articles in Physical Sciences and Mathematics
Legislative Recommendations On Biometric Security And Privacy Jurisprudence, Joshua M. Morrow
Legislative Recommendations On Biometric Security And Privacy Jurisprudence, Joshua M. Morrow
All Student Scholarship
This project focuses on the prevalence of biometrics today, their various applications, and the biometric laws and legislations in place in the United States (U.S.) and Maine. Due to various threats and vulnerabilities imposing risk on collecting and using peoples’ biometric data, sufficient cyber protections related to citizens’ privacy rights, ethical control, and security of personally identifiable information (PII) must become necessary components of contemporary biometric laws and legislation. Without such explicit cyber protections, citizens participate in and comply with various technical domains and entities, such as private companies and governmental agencies, with minimal awareness or comprehension that their sensitive …
The Truman Show: Scalable Generation Of Artificial Network Traffic For Cyber Security Research, Adam Wirth
The Truman Show: Scalable Generation Of Artificial Network Traffic For Cyber Security Research, Adam Wirth
Thinking Matters Symposium Archive
Network traffic generation is a key component of the creation of a network simulation environment. In order to create a realistic simulation of a large scale network in action, it is necessary to have a large volume of user traffic. Past methods for providing user traffic, such as hiring users to manually generate traffic, or recording existing traffic of an active network, provide limited control. Managing and directing users is time consuming, and using existing traffic is restricted by recorded conditions. The Truman Show project provides an infinitely adjustable alternative by utilizing agent based modeling of individual users. An agent …