Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Other Computer Sciences

Analysis Of Theoretical And Applied Machine Learning Models For Network Intrusion Detection, Jonah Baron May 2021

Analysis Of Theoretical And Applied Machine Learning Models For Network Intrusion Detection, Jonah Baron

Masters Theses & Doctoral Dissertations

Network Intrusion Detection System (IDS) devices play a crucial role in the realm of network security. These systems generate alerts for security analysts by performing signature-based and anomaly-based detection on malicious network traffic. However, there are several challenges when configuring and fine-tuning these IDS devices for high accuracy and precision. Machine learning utilizes a variety of algorithms and unique dataset input to generate models for effective classification. These machine learning techniques can be applied to IDS devices to classify and filter anomalous network traffic. This combination of machine learning and network security provides improved automated network defense by developing highly-optimized …


Iot Based Agriculture 4.0: Challenges And Opportunities, Halimjon Khujamatov, Temur Toshtemirov Mr., Doston Turayevich Khasanov Mr., Nasiba Saburova Ms., Ilhom Ikromovich Xamroyev Mr. Apr 2021

Iot Based Agriculture 4.0: Challenges And Opportunities, Halimjon Khujamatov, Temur Toshtemirov Mr., Doston Turayevich Khasanov Mr., Nasiba Saburova Ms., Ilhom Ikromovich Xamroyev Mr.

Bulletin of TUIT: Management and Communication Technologies

In recent years, the world's population growth has been intensifying, resulting in specific problems related to the depletion of natural resources, food shortages, declining fertile lands, and changing weather conditions. This paper has been discussed the use of IoT technology as a solution to such problems.

At the same time, the emergence of IoT technology has given rise to a new research direction in agriculture. Soil analysis and monitoring using Zigbee wireless sensor network technology, which is part of the IoT, will enable the creation of an IoT ecosystem as well as the development of smart agriculture. In addition, entrepreneurship, …


Efficacy Of Incident Response Certification In The Workforce, Samuel Jarocki Mar 2021

Efficacy Of Incident Response Certification In The Workforce, Samuel Jarocki

Masters Theses & Doctoral Dissertations

Numerous cybersecurity certifications are available both commercially and via institutes of higher learning. Hiring managers, recruiters, and personnel accountable for new hires need to make informed decisions when selecting personnel to fill positions. An incident responder or security analyst's role requires near real-time decision-making, pervasive knowledge of the environments they are protecting, and functional situational awareness. This concurrent mixed methods paper studies whether current commercial certifications offered in the cybersecurity realm, particularly incident response, provide useful indicators for a viable hiring candidate.

Managers and non-managers alike do prefer hiring candidates with an incident response certification. Both groups affirmatively believe commercial …


Block The Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul Mar 2021

Block The Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul

Masters Theses & Doctoral Dissertations

This study addresses a vulnerability in the trust-based STP protocol that allows malicious users to target an Ethernet LAN with an STP Root-Takeover Attack. This subject is relevant because an STP Root-Takeover attack is a gateway to unauthorized control over the entire network stack of a personal or enterprise network. This study aims to address this problem with a potentially trustless research solution called the STP DApp. The STP DApp is the combination of a kernel /net modification called stpverify and a Hyperledger Fabric blockchain framework in a NodeJS runtime environment in userland. The STP DApp works as an Intrusion …