Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Engineering

2022

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 35

Full-Text Articles in Other Computer Sciences

Computer Engineering Education, Marilyn Wolf Nov 2022

Computer Engineering Education, Marilyn Wolf

CSE Conference and Workshop Papers

Computer engineering is a rapidly evolving discipline. How should we teach it to our students?

This virtual roundtable on computer engineering education was conducted in summer 2022 over a combination of email and virtual meetings. The panel considered what topics are of importance to the computer engineering curriculum, what distinguishes computer engineering from related disciplines, and how computer engineering concepts should be taught.


Enabling Daily Tracking Of Individual’S Cognitive State With Eyewear, Soha Rostaminia Oct 2022

Enabling Daily Tracking Of Individual’S Cognitive State With Eyewear, Soha Rostaminia

Doctoral Dissertations

Research studies show that sleep deprivation causes severe fatigue, impairs attention and decision making, and affects our emotional interpretation of events, which makes it a big threat to public safety, and mental and physical well-being. Hence, it would be most desired if we could continuously measure one’s drowsiness and fatigue level, their emotion while making decisions, and assess their sleep quality in order to provide personalized feedback or actionable behavioral suggestions to modulate sleep pattern and alertness levels with the aim of enhancing performance, well-being, and quality of life. While there have been decades of studies on wearable devices, we …


Unobtrusive Assessment Of Upper-Limb Motor Impairment Using Wearable Inertial Sensors, Brandon R. Oubre Oct 2022

Unobtrusive Assessment Of Upper-Limb Motor Impairment Using Wearable Inertial Sensors, Brandon R. Oubre

Doctoral Dissertations

Many neurological diseases cause motor impairments that limit autonomy and reduce health-related quality of life. Upper-limb motor impairments, in particular, significantly hamper the performance of essential activities of daily living, such as eating, bathing, and changing clothing. Assessment of impairment is necessary for tracking disease progression, measuring the efficacy of interventions, and informing clinical decision making. Impairment is currently assessed by trained clinicians using semi-quantitative rating scales that are limited by their reliance on subjective, visual assessments. Furthermore, existing scales are often burdensome to administer and do not capture patients' motor performance in home and community settings, resulting in a …


Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger Oct 2022

Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger

Electrical and Computer Engineering Publications

This paper introduces the Virtual Sensor Middleware (VSM), which facilitates distributed sensor data processing on multiple fog nodes. VSM uses a Virtual Sensor as the core component of the middleware. The virtual sensor concept is redesigned to support functionality beyond sensor/device virtualization, such as deploying a set of virtual sensors to represent an IoT application and distributed sensor data processing across multiple fog nodes. Furthermore, the virtual sensor deals with the heterogeneous nature of IoT devices and the various communication protocols using different adapters to communicate with the IoT devices and the underlying protocol. VSM uses the publish-subscribe design pattern …


Agglomerative Hierarchical Clustering With Dynamic Time Warping For Household Load Curve Clustering, Fadi Almahamid, Katarina Grolinger Oct 2022

Agglomerative Hierarchical Clustering With Dynamic Time Warping For Household Load Curve Clustering, Fadi Almahamid, Katarina Grolinger

Electrical and Computer Engineering Publications

Energy companies often implement various demand response (DR) programs to better match electricity demand and supply by offering the consumers incentives to reduce their demand during critical periods. Classifying clients according to their consumption patterns enables targeting specific groups of consumers for DR. Traditional clustering algorithms use standard distance measurement to find the distance between two points. The results produced by clustering algorithms such as K-means, K-medoids, and Gaussian Mixture Models depend on the clustering parameters or initial clusters. In contrast, our methodology uses a shape-based approach that combines Agglomerative Hierarchical Clustering (AHC) with Dynamic Time Warping (DTW) to classify …


Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti Oct 2022

Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti

Engineering Faculty Articles and Research

Due to various breakthroughs and advancements in machine learning and computer architectures, machine learning models are beginning to proliferate through embedded platforms. Some of these machine learning models cover a range of applications including computer vision, speech recognition, healthcare efficiency, industrial IoT, robotics and many more. However, there is a critical limitation in implementing ML algorithms efficiently on embedded platforms: the computational and memory expense of many machine learning models can make them unsuitable in resource-constrained environments. Therefore, to efficiently implement these memory-intensive and computationally expensive algorithms in an embedded computing environment, innovative resource management techniques are required at the …


A Roller Coaster For The Mind: Virtual Reality Sickness Modes, Metrics, And Mitigation, Dalton C. Sparks Sep 2022

A Roller Coaster For The Mind: Virtual Reality Sickness Modes, Metrics, And Mitigation, Dalton C. Sparks

The Cardinal Edge

Understanding and preventing virtual reality sickness(VRS), or cybersickness, is vital in removing barriers for the technology's adoption. Thus, this article aims to synthesize a variety of academic sources to demonstrate the modes by which VRS occurs, the metrics by which it is judged, and the methods to mitigate it. The predominant theories on the biological origins of VRS are discussed, as well as the individual factors which increase the likelihood of a user developing VRS. Moreover, subjective and physiological measurements of VRS are discussed in addition to the development of a predictive model and conceptual framework. Finally, several methodologies of …


Parasol: Efficient Parallel Synthesis Of Large Model Spaces, Clay Stevens, Hamid Bagheri Sep 2022

Parasol: Efficient Parallel Synthesis Of Large Model Spaces, Clay Stevens, Hamid Bagheri

CSE Conference and Workshop Papers

Formal analysis is an invaluable tool for software engineers, yet state-of-the-art formal analysis techniques suffer from well-known limitations in terms of scalability. In particular, some software design domains—such as tradeoff analysis and security analysis—require systematic exploration of potentially huge model spaces, which further exacerbates the problem. Despite this present and urgent challenge, few techniques exist to support the systematic exploration of large model spaces. This paper introduces Parasol, an approach and accompanying tool suite, to improve the scalability of large-scale formal model space exploration. Parasol presents a novel parallel model space synthesis approach, backed with unsupervised learning to automatically derive …


Automated Identification Of Astronauts On Board The International Space Station: A Case Study In Space Archaeology, Rao Hamza Ali, Amir Kanan Kashefi, Alice C. Gorman, Justin St. P. Walsh, Erik J. Linstead Aug 2022

Automated Identification Of Astronauts On Board The International Space Station: A Case Study In Space Archaeology, Rao Hamza Ali, Amir Kanan Kashefi, Alice C. Gorman, Justin St. P. Walsh, Erik J. Linstead

Art Faculty Articles and Research

We develop and apply a deep learning-based computer vision pipeline to automatically identify crew members in archival photographic imagery taken on-board the International Space Station. Our approach is able to quickly tag thousands of images from public and private photo repositories without human supervision with high degrees of accuracy, including photographs where crew faces are partially obscured. Using the results of our pipeline, we carry out a large-scale network analysis of the crew, using the imagery data to provide novel insights into the social interactions among crew during their missions.


Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt Aug 2022

Reduced Fuel Emissions Through Connected Vehicles And Truck Platooning, Paul D. Brummitt

Electronic Theses and Dissertations

Vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication enable the sharing, in real time, of vehicular locations and speeds with other vehicles, traffic signals, and traffic control centers. This shared information can help traffic to better traverse intersections, road segments, and congested neighborhoods, thereby reducing travel times, increasing driver safety, generating data for traffic planning, and reducing vehicular pollution. This study, which focuses on vehicular pollution, used an analysis of data from NREL, BTS, and the EPA to determine that the widespread use of V2V-based truck platooning—the convoying of trucks in close proximity to one another so as to reduce air drag …


Feature Analysis Of Indus Valley And Dravidian Language Scripts With Similarity Matrices, Sarat Sasank Barla, Sai Surya Sanjay Alamuru, Peter Revesz Aug 2022

Feature Analysis Of Indus Valley And Dravidian Language Scripts With Similarity Matrices, Sarat Sasank Barla, Sai Surya Sanjay Alamuru, Peter Revesz

CSE Conference and Workshop Papers

This paper investigates the similarity between the Indus Valley script and the Kannada, Malayalam, Tamil, and Telugu scripts that are used to write Dravidian languages. The closeness of these scripts is determined by applying a feature analysis of each sign of these scripts and creating similarity matrices that describe the similarity of any pair of signs from two different scripts. The feature list that we use for the analysis of these Dravidian language-related scripts includes six new features beyond the thirteen features that were used for the study of Minoan Linear A and related scripts by Revesz. These new features …


Combining Solution Reuse And Bound Tightening For Efficient Analysis Of Evolving Systems, Clay Stevens, Hamid Bagheri Jul 2022

Combining Solution Reuse And Bound Tightening For Efficient Analysis Of Evolving Systems, Clay Stevens, Hamid Bagheri

CSE Conference and Workshop Papers

Software engineers have long employed formal verification to ensure the safety and validity of their system designs. As the system changes—often via predictable, domain-specific operations—their models must also change, requiring system designers to repeatedly execute the same formal verification on similar system models. State-of-the-art formal verification techniques can be expensive at scale, the cost of which is multiplied by repeated analysis. This paper presents a novel analysis technique—implemented in a tool called SoRBoT—which can automatically determine domain-specific optimizations that can dramatically reduce the cost of repeatedly analyzing evolving systems. Different from all prior approaches, which focus on either tightening the …


Classifying Toe Walking Gait Patterns Among Children Diagnosed With Idiopathic Toe Walking Using Wearable Sensors And Machine Learning Algorithms, Rahul Soangra, Yuxin Wen, Hualin Yang, Marybeth Grant-Beuttler Jul 2022

Classifying Toe Walking Gait Patterns Among Children Diagnosed With Idiopathic Toe Walking Using Wearable Sensors And Machine Learning Algorithms, Rahul Soangra, Yuxin Wen, Hualin Yang, Marybeth Grant-Beuttler

Physical Therapy Faculty Articles and Research

Idiopathic toe walking (ITW) is a gait abnormality in which children’s toes touch at initial contact and demonstrate limited or no heel contact throughout the gait cycle. Toe walking results in poor balance, increased risk of falling, and developmental delays among children. Identifying toe walking steps during walking can facilitate targeted intervention among children diagnosed with ITW. With recent advances in wearable sensing, communication technologies, and machine learning, new avenues of managing toe walking behavior among children are feasible. In this study, we investigate the capabilities of Machine Learning (ML) algorithms in identifying initial foot contact (heel strike versus toe …


Finding Approximate Pythagorean Triples (And Applications To Lego Robot Building), Ronald I. Greenberg, Matthew Fahrenbacher, George K. Thiruvathukal Jul 2022

Finding Approximate Pythagorean Triples (And Applications To Lego Robot Building), Ronald I. Greenberg, Matthew Fahrenbacher, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

This assignment combines programming and data analysis to determine good combinations of side lengths that approximately satisfy the Pythagorean Theorem for right triangles. This can be a standalone exercise using a wide variety of programming languages, but the results are useful for determining good ways to assemble LEGO pieces in robot construction, so the exercise can serve to integrate three different units of the Exploring Computer Science high school curriculum: "Programming", "Computing and Data Analysis", and "Robotics". Sample assignment handouts are provided for both Scratch and Java programmers. Ideas for several variants of the assignment are also provided.


The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan Jul 2022

The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan

Distance Learning Faculty & Staff Books

The message design and human performance technology in video games, especially early video games have always been fascinating to me. From an instructional design perspective, the capabilities of the technology of the classic game consoles required a careful balance of achievable objectives, cognitive task analysis, guided problem solving, and message design. Raiders on the Atari is an excellent example of this balance. It is an epic adventure game, spanning 13+ distinct areas, with an inventory of items, where those hard to find items had to be used by the player to solve problems during their quest (and who would have …


Private Information Retrieval And Function Computation For Noncolluding Coded Databases, Sarah A. Obead May 2022

Private Information Retrieval And Function Computation For Noncolluding Coded Databases, Sarah A. Obead

Dissertations

The rapid development of information and communication technologies has motivated many data-centric paradigms such as big data and cloud computing. The resulting paradigmatic shift to cloud/network-centric applications and the accessibility of information over public networking platforms has brought information privacy to the focal point of current research challenges. Motivated by the emerging privacy concerns, the problem of private information retrieval (PIR), a standard problem of information privacy that originated in theoretical computer science, has recently attracted much attention in the information theory and coding communities. The goal of PIR is to allow a user to download a message from a …


Open Hardware In Science: The Benefits Of Open Electronics, Michael Oellermann, Jolle W. Jolles, Diego Ortiz, Rui Seabra, Tobias Wenzel, Hannah Wilson, Richelle L. Tanner May 2022

Open Hardware In Science: The Benefits Of Open Electronics, Michael Oellermann, Jolle W. Jolles, Diego Ortiz, Rui Seabra, Tobias Wenzel, Hannah Wilson, Richelle L. Tanner

Biology, Chemistry, and Environmental Sciences Faculty Articles and Research

Openly shared low-cost electronic hardware applications, known as open electronics, have sparked a new open-source movement, with much untapped potential to advance scientific research. Initially designed to appeal to electronic hobbyists, open electronics have formed a global “maker” community and are increasingly used in science and industry. In this perspective article, we review the current costs and benefits of open electronics for use in scientific research ranging from the experimental to the theoretical sciences. We discuss how user-made electronic applications can help (I) individual researchers, by increasing the customization, efficiency, and scalability of experiments, while improving data quantity and quality; …


Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen Apr 2022

Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen

Engineering Faculty Articles and Research

Deep generative networks in recent years have reinforced the need for caution while consuming various modalities of digital information. One avenue of deepfake creation is aligned with injection and removal of tumors from medical scans. Failure to detect medical deepfakes can lead to large setbacks on hospital resources or even loss of life. This paper attempts to address the detection of such attacks with a structured case study. Specifically, we evaluate eight different machine learning algorithms, which include three conventional machine learning methods (Support Vector Machine, Random Forest, Decision Tree) and five deep learning models (DenseNet121, DenseNet201, ResNet50, ResNet101, VGG19) …


Considering The Context To Build Theory In Hci, Hri, And Hmc: Explicating Differences In Processes Of Communication And Socialization With Social Technologies, Andrew Gambino, Bingjie Liu Apr 2022

Considering The Context To Build Theory In Hci, Hri, And Hmc: Explicating Differences In Processes Of Communication And Socialization With Social Technologies, Andrew Gambino, Bingjie Liu

Human-Machine Communication

The proliferation and integration of social technologies has occurred quickly, and the specific technologies with which we engage are ever-changing. The dynamic nature of the development and use of social technologies is often acknowledged by researchers as a limitation. In this manuscript, however, we present a discussion on the implications of our modern technological context by focusing on processes of socialization and communication that are fundamentally different from their interpersonal corollary. These are presented and discussed with the goal of providing theoretical building blocks toward a more robust understanding of phenomena of human-computer interaction, human-robot interaction, human-machine communication, and interpersonal …


Analysis Of An Existing Method In Refinement Of Protein Structure Predictions Using Cryo-Em Images, Maytha Alshammari, Jing He, Willy Wriggers, Jiangwen Sun Apr 2022

Analysis Of An Existing Method In Refinement Of Protein Structure Predictions Using Cryo-Em Images, Maytha Alshammari, Jing He, Willy Wriggers, Jiangwen Sun

College of Sciences Posters

Protein structure prediction produces atomic models from its amino acid sequence. Three-dimensional structures are important for understanding the function mechanism of proteins. Knowing the structure of a given protein is crucial in drug development design of novel enzymes. AlphaFold2 is a protein structure prediction tool with good performance in recent CASP competitions. Phenix is a tool for determination of a protein structure from a high-resolution 3D molecular image. Recent development of Phenix shows that it is capable to refine predicted models from AlphaFold2, specifically the poorly predicted regions, by incorporating information from the 3D image of the protein. The goal …


A Deep Learning-Based Approach To Extraction Of Filler Morphology In Sem Images With The Application Of Automated Quality Inspection, Md. Fashiar Rahman, Tzu-Liang Bill Tseng, Jianguo Wu, Yuxin Wen, Yirong Lin Mar 2022

A Deep Learning-Based Approach To Extraction Of Filler Morphology In Sem Images With The Application Of Automated Quality Inspection, Md. Fashiar Rahman, Tzu-Liang Bill Tseng, Jianguo Wu, Yuxin Wen, Yirong Lin

Engineering Faculty Articles and Research

Automatic extraction of filler morphology (size, orientation, and spatial distribution) in Scanning Electron Microscopic (SEM) images is essential in many applications such as automatic quality inspection in composite manufacturing. Extraction of filler morphology greatly depends on accurate segmentation of fillers (fibers and particles), which is a challenging task due to the overlap of fibers and particles and their obscure presence in SEM images. Convolution Neural Networks (CNNs) have been shown to be very effective at object recognition in digital images. This paper proposes an automatic filler detection system in SEM images, utilizing a Mask Region-based CNN architecture. The proposed system …


Three Wave Mixing In Epsilon-Near-Zero Plasmonic Waveguides For Signal Regeneration, Nicholas Mirchandani, Mark C. Harrison Mar 2022

Three Wave Mixing In Epsilon-Near-Zero Plasmonic Waveguides For Signal Regeneration, Nicholas Mirchandani, Mark C. Harrison

Engineering Faculty Articles and Research

Vast improvements in communications technology are possible if the conversion of digital information from optical to electric and back can be removed. Plasmonic devices offer one solution due to optical computing’s potential for increased bandwidth, which would enable increased throughput and enhanced security. Plasmonic devices have small footprints and interface with electronics easily, but these potential improvements are offset by the large device footprints of conventional signal regeneration schemes, since surface plasmon polaritons (SPPs) are incredibly lossy. As such, there is a need for novel regeneration schemes. The continuous, uniform, and unambiguous digital information encoding method is phase-shift-keying (PSK), so …


Applications Of Unsupervised Machine Learning In Autism Spectrum Disorder Research: A Review, Chelsea Parlett-Pelleriti, Elizabeth Stevens, Dennis R. Dixon, Erik J. Linstead Jan 2022

Applications Of Unsupervised Machine Learning In Autism Spectrum Disorder Research: A Review, Chelsea Parlett-Pelleriti, Elizabeth Stevens, Dennis R. Dixon, Erik J. Linstead

Engineering Faculty Articles and Research

Large amounts of autism spectrum disorder (ASD) data is created through hospitals, therapy centers, and mobile applications; however, much of this rich data does not have pre-existing classes or labels. Large amounts of data—both genetic and behavioral—that are collected as part of scientific studies or a part of treatment can provide a deeper, more nuanced insight into both diagnosis and treatment of ASD. This paper reviews 43 papers using unsupervised machine learning in ASD, including k-means clustering, hierarchical clustering, model-based clustering, and self-organizing maps. The aim of this review is to provide a survey of the current uses of …


Sustainable Computing - Without The Hot Air, Noman Bashir, David Irwin, Prashant Shenoy, Abel Souza Jan 2022

Sustainable Computing - Without The Hot Air, Noman Bashir, David Irwin, Prashant Shenoy, Abel Souza

Publications

The demand for computing is continuing to grow exponentially. This growth will translate to exponential growth in computing's energy consumption unless improvements in its energy-efficiency can outpace increases in its demand. Yet, after decades of research, further improving energy-efficiency is becoming increasingly challenging, as it is already highly optimized. As a result, at some point, increases in computing demand are likely to outpace increases in its energy-efficiency, potentially by a wide margin. Such exponential growth, if left unchecked, will position computing as a substantial contributor to global carbon emissions. While prominent technology companies have recognized the problem and sought to …


Data Science Applied To Discover Ancient Minoan-Indus Valley Trade Routes Implied By Commonweight Measures, Peter Revesz Jan 2022

Data Science Applied To Discover Ancient Minoan-Indus Valley Trade Routes Implied By Commonweight Measures, Peter Revesz

CSE Conference and Workshop Papers

This paper applies data mining of weight measures to discover possible long-distance trade routes among Bronze Age civilizations from the Mediterranean area to India. As a result, a new northern route via the Black Sea is discovered between the Minoan and the Indus Valley civilizations. This discovery enhances the growing set of evidence for a strong and vibrant connection among Bronze Age civilizations.


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …