Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 145

Full-Text Articles in Other Computer Sciences

Data Profits Vs. Privacy Rights: Ethical Concerns In Data Commerce, Amiah Armstrong Apr 2024

Data Profits Vs. Privacy Rights: Ethical Concerns In Data Commerce, Amiah Armstrong

Cybersecurity Undergraduate Research Showcase

In today’s digital age, the collection and sale of customer data for advertising is gaining a growing number of ethical concerns. The act of amassing extensive datasets encompassing customer preferences, behaviors, and personal information raises questions of its true purpose. It is widely acknowledged that companies track and store their customer’s digital activities under the pretext of benefiting the customer, but at what cost? Are users aware of how much of their data is being collected? Do they understand the trade-off between personalized services and the potential invasion of their privacy? This paper aims to show the advantages and disadvantages …


Rising Threat - Deepfakes And National Security In The Age Of Digital Deception, Dougo Kone-Sow Dec 2023

Rising Threat - Deepfakes And National Security In The Age Of Digital Deception, Dougo Kone-Sow

Cybersecurity Undergraduate Research Showcase

This paper delves into the intricate landscape of deepfakes, exploring their genesis, capabilities, and far-reaching implications. The rise of deepfake technology presents an unprecedented threat to American national security, propagating disinformation and manipulation across various media formats. Notably, deepfakes have evolved from a historical backdrop of disinformation campaigns, merging with the advancements of artificial intelligence (AI) and machine learning to craft convincing but false multimedia content.

Examining the capabilities of deepfakes reveals their potential for misuse, evidenced by instances targeting individuals, companies, and even influencing political events like the 2020 U.S. elections. The paper highlights the direct threats posed by …


Privacy Concerns And Proposed Solutions With Iot In Wearable Technology, Hyacinth Abad Dec 2023

Privacy Concerns And Proposed Solutions With Iot In Wearable Technology, Hyacinth Abad

Cybersecurity Undergraduate Research Showcase

This paper examines the dynamic relationship between IoT cybersecurity and privacy concerns associated with wearable devices. IoT, with its exponential growth, presents both opportunities and challenges in terms of accessibility, integrity, availability, scalability, confidentiality, and interoperability. Cybersecurity concerns arise as diverse attack surfaces exploit vulnerabilities in IoT systems, necessitating robust defenses. In the field of wearable technology, these devices offer benefits like health data tracking and real-time communication. However, the adoption of these devices raises privacy concerns. The paper explores proposed solutions, including mechanisms for user-controlled data collection, the implementation of Virtual Trip Line (VTL) and virtual wall approaches, and …


Reducing Uncertainty In Sea-Level Rise Prediction: A Spatial-Variability-Aware Approach, Subhankar Ghosh, Shuai An, Arun Sharma, Jayant Gupta, Shashi Shekhar, Aneesh Subramanian Oct 2023

Reducing Uncertainty In Sea-Level Rise Prediction: A Spatial-Variability-Aware Approach, Subhankar Ghosh, Shuai An, Arun Sharma, Jayant Gupta, Shashi Shekhar, Aneesh Subramanian

I-GUIDE Forum

Given multi-model ensemble climate projections, the goal is to accurately and reliably predict future sea-level rise while lowering the uncertainty. This problem is important because sea-level rise affects millions of people in coastal communities and beyond due to climate change's impacts on polar ice sheets and the ocean. This problem is challenging due to spatial variability and unknowns such as possible tipping points (e.g., collapse of Greenland or West Antarctic ice-shelf), climate feedback loops (e.g., clouds, permafrost thawing), future policy decisions, and human actions. Most existing climate modeling approaches use the same set of weights globally, during either regression or …


The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?, Jason D. Fiege, Anastasia (Stasi) D. Baran May 2023

The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?, Jason D. Fiege, Anastasia (Stasi) D. Baran

International Conference on Gambling & Risk Taking

Abstract

It is difficult for individual players to detect differences in theoretical hold between slot machines without playing an unrealistically large number of games. This difficulty occurs because the fractional loss incurred by a player converges only slowly to the theoretical hold in the presence of volatility designed into slot pay tables. Nevertheless, many operators believe that players can detect changes in hold or differences compared to competition, especially in a locals casino market, and therefore resist increasing holds. Instead of investigating whether individual players can detect differences in hold, we ask whether a population of casino regulars who share …


Adapting An Online Learning Quality Assurance Framework In A Developing Country Setting: The Case Of A Hei In Malawi, Bennett Kankuzi, Menard Phiri, Robert Chanunkha, Jonathan Makuwira, Paul Makocho Aug 2022

Adapting An Online Learning Quality Assurance Framework In A Developing Country Setting: The Case Of A Hei In Malawi, Bennett Kankuzi, Menard Phiri, Robert Chanunkha, Jonathan Makuwira, Paul Makocho

African Conference on Information Systems and Technology

Covid-19 prompted many higher education institutions (HEIs), even in developing countries like Malawi, to abruptly shift from their traditional face-to-face mode of delivery to online learning. However, quality issues with online learning remain one of the greatest challenges to acceptance of online learning by many students and stakeholders. This paper presents an action research based study at the Malawi University of Science and Technology, in which an online learning quality assurance framework is adapted to a developed country setting. The adapted framework builds on the Online Learning Consortium (OLC) Quality Scorecard for the Administration of Online Programs. The contextualization and …


Characterization Of End-Users’ Engagement And Interaction Experience With Social Media Technologies, Yemisi Oyedele, Darelle Van Greunen Aug 2022

Characterization Of End-Users’ Engagement And Interaction Experience With Social Media Technologies, Yemisi Oyedele, Darelle Van Greunen

African Conference on Information Systems and Technology

People, particularly digital citizens, gain more technological experiences from their frequent usage of social media technologies. Their experience as end-users occurs before, during, and after their engagement and interaction with the technologies and is popularly described using behaviour-related definitions. However, an end-user's experience with technologies goes beyond the 'click-and-type" definition. This prompts the question, "what are the user experience elements that define and characterise end-users' engagement and interaction with social media technologies?". Using a case study-based approach, end-users' engagement and interaction with social media technologies were identified. The study's findings indicated that several user experience elements were characterised by emotions, …


How Can Social Networks Impact Careers In Game Development?, Tongzhang Wang Aug 2022

How Can Social Networks Impact Careers In Game Development?, Tongzhang Wang

Undergraduate Student Research Internships Conference

The game development industry is one characterized by young workers and fast worker turnover. The popularity of using twitter as a professional tool within the video games industry presents a potentially insightful view port into a professional's informal network. Investigating characteristics of the social networks of newly graduated students in the game development industry may reveal what factors contribute to fast worker turnover and how certain cohorts may face additional barriers.


Using Graph Theoretical Methods And Traceroute To Visually Represent Hidden Networks, Jordan M. Sahs Jun 2022

Using Graph Theoretical Methods And Traceroute To Visually Represent Hidden Networks, Jordan M. Sahs

UNO Student Research and Creative Activity Fair

Within the scope of a Wide Area Network (WAN), a large geographical communication network in which a collection of networking devices communicate data to each other, an example being the spanning communication network, known as the Internet, around continents. Within WANs exists a collection of Routers that transfer network packets to other devices. An issue pertinent to WANs is their immeasurable size and density, as we are not sure of the amount, or the scope, of all the devices that exists within the network. By tracing the routes and transits of data that traverses within the WAN, we can identify …


Statistical Study Into The World Of Nft Investing And The Process Behind It, Daon Morris, Teddy Gamboa, Akeisha Belgrave Apr 2022

Statistical Study Into The World Of Nft Investing And The Process Behind It, Daon Morris, Teddy Gamboa, Akeisha Belgrave

Harrisburg University Research Symposium: Highlighting Research, Innovation, & Creativity

For the purpose of this project, we gathered data from the young adults and adults of the Harrisburg University campus in support of the fact that NFT’s are not like other forms of investments in terms of the strategy used. Rather, the way people invest in them is by just simply looking at the picture, and whatever NFT people think looks cool is the NFT that will skyrocket in value.(Class Project)


Diabetic Foot Exam System, Stephanie Trusty Mar 2022

Diabetic Foot Exam System, Stephanie Trusty

Undergraduate Research Symposium

The diabetic foot exam system aims to perform certain aspects of the dermatological and musculoskeletal assessments that are typical to a 3-minute diabetic foot exam. Utilizing the RaspberryPi computer and camera module, the system seeks to capture a series of images of the patient’s foot. It then evaluates these images for calluses, blisters, and three types of deformities: claw toe deformities, hammertoe deformities, and bunions. This evaluation is performed using a trained TensorFlow image classification model, which categorizes the image as a callus, blister, or deformity. The system was tested using six different images: four callus images, a hammertoe deformity …


Covid-19 Classroom Occupancy Detection System, Stephanie Trusty Mar 2022

Covid-19 Classroom Occupancy Detection System, Stephanie Trusty

Undergraduate Research Symposium

The classroom occupancy detection system aims to limit the spread of COVID-19 and support mitigation efforts advised by national and international health organizations by enforcing social distancing in classroom environments. Utilizing the RaspberryPi computer and its compatible camera module, the system accomplishes this by capturing an overhead image of a classroom and assessing the image for violations. Here, violations are defined as the presence of adjacent occupied seats. As such, for an acceptable state to be detected, there must be at least one vacant seat between all students seated in the classroom. The system communicates the classroom’s state with two …


Socioapp: Detecting Your Sociability Status With Your Smartphone, Aaron Walker Feb 2022

Socioapp: Detecting Your Sociability Status With Your Smartphone, Aaron Walker

Research in the Capitol

Loneliness, isolation, and anti-social behaviors have increased in the past few years, whether that be due to social media, people paying more attention to their devices, or due to the COVID-19 pandemic. These behaviors are proven to decrease a student’s academic performance, causing their grades to decline, and disabling their motivation to learn. We aim to gain insight on this issue via the application of smartphone technology and machine learning, enabling those that use our app to understand if their being social or anti-social. We use a variety of sensors, location devices, and speaker recognition algorithms to identify behaviors that …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


A Note From The Co-Editors, Fayth Schutter Dec 2021

A Note From The Co-Editors, Fayth Schutter

Ideas: Exhibit Catalog for the Honors College Visiting Scholars Series

An introduction to the first issue of the third volume of Ideas Magazine, concerning the work and research of Dr. Shoshana Magnet.


An Empirical Study Of Thermal Attacks On Edge Platforms, Tyler Holmes Aug 2021

An Empirical Study Of Thermal Attacks On Edge Platforms, Tyler Holmes

Symposium of Student Scholars

Cloud-edge systems are vulnerable to thermal attacks as the increased energy consumption may remain undetected, while occurring alongside normal, CPU-intensive applications. The purpose of our research is to study thermal effects on modern edge systems. We also analyze how performance is affected from the increased heat and identify preventative measures. We speculate that due to the technology being a recent innovation, research on cloud-edge devices and thermal attacks is scarce. Other research focuses on server systems rather than edge platforms. In our paper, we use a Raspberry Pi 4 and a CPU-intensive application to represent thermal attacks on cloud-edge systems. …


Energy Saving On Edges: State-Of-The-Art And Future Directions, Kousalya Banka Aug 2021

Energy Saving On Edges: State-Of-The-Art And Future Directions, Kousalya Banka

Symposium of Student Scholars

Internet of Things (IoT) comprises a set of devices that are interconnected ranging from our daily used objects to advanced networked devices. It is a constantly evolving phenomenon as the number of devices owned by the regular user is increasing at a rapid rate. These devices are used for various reasons such as social networking, monitoring, performing complex operations and with the increase of advanced technologies, they demand more energy to perform such tasks. Cloud computing enables these communications to seamlessly perform complex tasks in a cloud environment but utilizing these resources properly to perform at the best is the …


Monitoring At-Home Care Patients Through A Scalar Polar Plot Visualization Of Motion Sensor Data, Michael Mcgavin Aug 2021

Monitoring At-Home Care Patients Through A Scalar Polar Plot Visualization Of Motion Sensor Data, Michael Mcgavin

Undergraduate Student Research Internships Conference

In Canada, approximately 18 percent (6.6 million) of the total population are age 65 or older, and 88 percent of people over age 65 want to stay in their residence for as long as possible. This older demographic is a group that is dependent on proactive and preventative healthcare. Using motion sensor data collected from a local company providing home-care services to this demographic, a data visualization was constructed to assist users in observing patient behavior and improving their quality of life while maintaining their independence. However, since the collected data is time-based, it results in a dataset that is …


Using Support Vector Machine Learning To Predict Game Entity In A “Super Smash Bros. Melee” Game, Trevor Firl Apr 2021

Using Support Vector Machine Learning To Predict Game Entity In A “Super Smash Bros. Melee” Game, Trevor Firl

Ramaley Celebration

Over the years fighting games have gotten more refined as in-game character mechanics have grown significantly more complex. With software advancements, players of the popular platform fighting game Super Smash Bros. Melee (SSBM) are able to save replay files of matches and extract metadata from previously played matches. Information from matches can be used to train classification models to predict aspects of the game such as the character played. With a diverse cast of characters to choose from, each character has a unique move set to use during a match. However with the complex nature of the SSBM in-game environment …


Optimizing Networking Topologies With Shortest Path Algorithms, Jordan Sahs Mar 2021

Optimizing Networking Topologies With Shortest Path Algorithms, Jordan Sahs

UNO Student Research and Creative Activity Fair

Communication networks tend to contain redundant devices and mediums of transmission, thus the need to locate, document, and optimize networks is increasingly becoming necessary. However, many people do not know where to start the optimization progress. What is network topology? What is this “Shortest Path Problem”, and how can it be used to better my network? These questions are presented, taught, and answered within this paper. To supplement the reader’s understanding there are thirty-eight figures in the paper that are used to help convey and compartmentalize the learning process needed to grasp the materials presented in the ending sections.

In …


A Study Of Sentiment Of Covid-19 Related Tweets In The Usa, Jack Luu, Rosangela Follmann Nov 2020

A Study Of Sentiment Of Covid-19 Related Tweets In The Usa, Jack Luu, Rosangela Follmann

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.