Detection Of Jamming Attacks In Vanets,
2024
East Tennessee State University
Detection Of Jamming Attacks In Vanets, Thomas Justice
Undergraduate Honors Theses
A vehicular network is a type of communication network that enables vehicles to communicate with each other and the roadside infrastructure. The roadside infrastructure consists of fixed nodes such as roadside units (RSUs), traffic lights, road signs, toll booths, and so on. RSUs are devices equipped with communication capabilities that allow vehicles to obtain and share real-time information about traffic conditions, weather, road hazards, and other relevant information. These infrastructures assist in traffic management, emergency response, smart parking, autonomous driving, and public transportation to improve roadside safety, reduce traffic congestion, and enhance the overall driving experience. However, communication between the …
Stopguess: A Framework For Public-Key Authenticated Encryption With Keyword Search,
2024
Singapore Management University
Stopguess: A Framework For Public-Key Authenticated Encryption With Keyword Search, Tao Xiang, Zhongming Wang, Biwen Chen, Xiaoguo Li, Peng Wang, Fei Chen
Research Collection School Of Computing and Information Systems
Public key encryption with keyword search (PEKS) allows users to search on encrypted data without leaking the keyword information from the ciphertexts. But it does not preserve keyword privacy within the trapdoors, because an adversary (e.g., untrusted server) might launch inside keyword-guessing attacks (IKGA) to guess keywords from the trapdoors. In recent years, public key authenticated encryption with keyword search (PAEKS) has become a promising primitive to counter the IKGA. However, existing PAEKS schemes focus on the concrete construction of PAEKS, making them unable to support modular construction, intuitive proof, or flexible extension. In this paper, our proposal called “StopGuess” …
Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life,
2024
Bridgewater State University
Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee
International Journal of Cybersecurity Intelligence & Cybercrime
Papers from this issue advocate for empowering young adults with knowledge and tools to navigate cyberspace safely, emphasizing the necessity of heightened cybersecurity measures and proactive education. As we advance into the digital abyss, this call becomes imperative, ensuring that the young adults' experience remains a journey of growth and enlightenment, unaffected by the shadows of unseen online threats.
The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study,
2024
University of South Florida
The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz
International Journal of Cybersecurity Intelligence & Cybercrime
According to security experts, cybersecurity education and awareness at the user level are key in combating cybercrime. Hence, in the U.S., cybersecurity and Internet safety workshops, classes, and resources targeting children, adolescents, adults, and senior citizens abound. However, most cybercrime prevention programs are only available in English, thus, ignoring a substantial proportion of Internet users and potential cybercrime victims—Internet users with limited English proficiency (LEP). Yet, successfully combating cybercrime requires that all computer and Internet users, regardless of their language abilities and skills, have access to pertinent cybersecurity information and resources to protect themselves online. This paper presents the results …
Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency,
2024
NA
Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones
International Journal of Cybersecurity Intelligence & Cybercrime
Doubleday released Andy Greenberg’s Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency in November 2022. Through vivid case studies of global criminal investigations, the book dispels myths about the anonymizing power of cryptocurrency. The book details how the ability to identify cryptocurrency users and payment methods successfully brought down several large criminal empires, while also highlighting the continuous cat-and-mouse game between law enforcement officials and criminal actors using cryptocurrency. The book is an excellent resource for law enforcement officials, academics, and general cybersecurity practitioners interested in cryptocurrency-related criminal activities and law enforcement techniques.
Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework,
2024
University of North Texas
Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.
Journal of Cybersecurity Education, Research and Practice
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. Each facet of the NIST Framework is utilized to explore the integration of blockchain technology and address persistent security concerns. The paper contributes to the literature by defining blockchain technology applications and opportunities within …
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession,
2024
College of Southern Maryland
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Journal of Cybersecurity Education, Research and Practice
This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …
University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study,
2024
University of Johannesburg
University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo
Journal of Cybersecurity Education, Research and Practice
This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg Institutional Repository database was the data source for this study. Variations in cybersecurity keyword searches and topic modeling techniques were used to identify the frequency and distribution of research output across different disciplines. The study reveals that cybersecurity awareness has diffused across various disciplines, including non-computer science disciplines such as business, accounting, and social …
Privacy Principles And Harms: Balancing Protection And Innovation,
2024
Dakota State University
Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello
Journal of Cybersecurity Education, Research and Practice
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to reshape how personal information is collected, stored, and utilized. This paper delves into the fundamental principles of privacy and explores the potential harm that can arise from the mishandling of personal data. It emphasizes the delicate balance between safeguarding individuals' privacy rights and fostering innovation in a data-driven society. By …
Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship,
2024
University Colorado Colorado Springs
Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee
Journal of Cybersecurity Education, Research and Practice
Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory activity which continues to morph exponentially around the globe. Adding to this complexity are the increasing business disruptions, productivity and revenue losses, settlements, fines, and penalties which can amount to over $15 million, with many penalties now being ascribed to the organization’s leadership, to include the Board of Directors (BoD), the CEO and members of the senior leadership team (SLT). Thus, boards of directors can no longer ignore and in …
When Evolutionary Computation Meets Privacy,
2024
Singapore Management University
When Evolutionary Computation Meets Privacy, Bowen Zhao, Wei-Neng Chen, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Jun Zhang
Research Collection School Of Computing and Information Systems
Recently, evolutionary computation (EC) has experienced significant advancements due to the integration of machine learning, distributed computing, and big data technologies. These developments have led to new research avenues in EC, such as distributed EC and surrogate-assisted EC. While these advancements have greatly enhanced the performance and applicability of EC, they have also raised concerns regarding privacy leakages, specifically the disclosure of optimal results and surrogate models. Consequently, the combination of evolutionary computation and privacy protection becomes an increasing necessity. However, a comprehensive exploration of privacy concerns in evolutionary computation is currently lacking, particularly in terms of identifying the object, …
Building New Paradigm Of Digital Intelligence Security For New Development Pattern,
2024
Academy of Mathematics and Systems Science, Chinese Academy of Science, Beijing 100190, China
School of Economics and Management, University of Chinese Academy of Sciences, Beijing 100190, China
Building New Paradigm Of Digital Intelligence Security For New Development Pattern, Xiaoguang Yang, Yang Wu, Xingwei Zhang, Xiaolong Zheng
Bulletin of Chinese Academy of Sciences (Chinese Version)
After the 20th National Congress of the Communist Party of China, China has entered a new era of development. Simultaneously, the rapid advancement and extensive application of artificial intelligent technologies have activated a new wave of economic potential and brought about new security challenges to socioeconomic development. This study firstly analyzes the characteristics of the new development pattern in global contexts, and examines the risks and challenges of digital intelligence security (DIS) under the new pattern, encompassing technological security and personal security at the micro-level, as well as economic security, social security, and cultural security at the macro-level. Based on …
Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations,
2024
Nova Southeastern University
Towards Assessing Cybersecurity Posture Of Manufacturing Companies: Review And Recommendations, John Del Vecchio, Yair Levy, Ling Wang, Ajoy Kumar
KSU Proceedings on Cybersecurity Education, Research and Practice
With the continued changes in the way businesses work, cyber-attack targets are in a constant state of flux between organizations, individuals, as well as various aspects of the supply chain of interconnected goods and services. As one of the 16 critical infrastructure sectors, the manufacturing sector is known for complex integrated Information Systems (ISs) that are incorporated heavily into production operations. Many of these ISs are procured and supported by third parties, also referred to as interconnected entities in the supply chain. Disruptions to manufacturing companies would not only have significant financial losses but would also have economic and safety …
Quantum Computing: Computing Of The Future Made Reality,
2024
University of North Georgia
Quantum Computing: Computing Of The Future Made Reality, Janelle Mathis
KSU Proceedings on Cybersecurity Education, Research and Practice
Abstract—Quantum computing is an emerging new area focused on technology consisting of quantum theory aspects such as electrons, sub-atomic particles, and other materials engineered using quantum mechanics. Through quantum mechanics, these computers can solve problems that classical computers deem too complex. Today the closest computing technology compared to quantum computers are supercomputers, but similarly to classical computers, supercomputers also have faults. With supercomputers, when a problem is deemed too complex, it is due to the classical machinery components within the computer, thus causing a halt in solving the task or problem. In contrast, these problems could be solved with a …
Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security,
2024
University of North Georgia
Rfid Key Fobs In Vehicles: Unmasking Vulnerabilities & Strengthening Security, Devon Magda, Bryson R. Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
No abstract provided.
The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing,
2024
University of New South Wales
The Impact Of Individual Techno-Characteristics On Information Privacy Concerns In The Diffusion Of Mobile Contact Tracing, Jiesen Lin, Dapeng Liu, Lemuria Carter
KSU Proceedings on Cybersecurity Education, Research and Practice
In the wake of the global health crisis, mobile contact tracing applications have emerged as important tools in managing disease spread. However, their effectiveness heavily relies on mass adoption, significantly influenced by the public's information privacy concerns. To date, systematic examination of how these privacy concerns relate to the innovation adopter categories in mobile contact tracing remains sparse. Furthermore, the influence of individual techno-characteristics on these concerns is to be explored. This research seeks to fill these gaps. Drawing on the diffusion of innovation theory, we examine the impact of the key techno-characteristics—adopter category, propensity for identification misrepresentation, and exposure …
Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models,
2024
University of Sydney, Australia
Exploring Information Privacy Concerns During The Covid-19 Pandemic: A Juxtaposition Of Three Models, Dapeng Liu, Lemuria Carter, Jiesen Lin
KSU Proceedings on Cybersecurity Education, Research and Practice
Government agencies across the globe utilize mobile applications to interact with constituents. In response to the global pandemic, several nations have employed contact tracing services to manage the spread of COVID-19. Extent literature includes various models that explore information privacy. Several researchers have highlighted the need to compare the effectiveness of diverse information privacy models. To fill this gap, we explore the impact of information privacy concerns on citizens’ willingness to download a federal contact tracing app. In particular, we compare three types of prevalent information privacy concerns: global information privacy concerns (GIPC), concern for information privacy (CFIP), and internet …
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security,
2024
Central University of Himachal Pradesh
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain
VMASC Publications
Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication. Designated verifier signature, a variant of quantum cryptography, is very useful in applications like the Internet of Things (IoT) and auctions. An identity-based quantum-designated verifier signature (QDVS) scheme is suggested in this work. Our protocol features security attributes like eavesdropping, non-repudiation, designated verification, and hiding sources attacks. Additionally, it is protected from attacks on forgery, inter-resending, and impersonation. The proposed scheme benefits from the traditional designated …
Student Attitudes And Intentions To Use Continuous Authentication Methods Applied To Mitigate Impersonation Attacks During E-Assessments,
2024
Nova Southeastern University
Student Attitudes And Intentions To Use Continuous Authentication Methods Applied To Mitigate Impersonation Attacks During E-Assessments, Andrea E. Green
CCE Theses and Dissertations
No solution can ultimately eliminate cheating in online courses. However, universities reserve funding for authentication systems to minimize the threat of cheating in online courses. Most higher education institutions use a combination of authentication methods to secure systems against impersonation attacks during online examinations. Authentication technologies ensure that an online course is protected from impersonation attacks. However, it is important that authentication methods secure systems against impersonation attacks with minimal disruption during an examination. Authentication methods applied to secure e-assessments against impersonation attacks may impact a student’s attitude and intentions to use the e-examination system.
In this regard, the research …
Efficient Privacy-Preserving Spatial Data Query In Cloud Computing,
2024
Singapore Management University
Efficient Privacy-Preserving Spatial Data Query In Cloud Computing, Yinbin Miao, Yutao Yang, Xinghua Li, Linfeng Wei, Zhiquan Liu, Robert H. Deng
Research Collection School Of Computing and Information Systems
With the rapid development of geographic location technology and the explosive growth of data, a large amount of spatial data is outsourced to the cloud server for reducing the local high storage and computing burdens, but at the same time causes security issues. Thus, extensive privacy-preserving spatial data query schemes have been proposed. Most of the existing schemes use Asymmetric Scalar-Product-Preserving Encryption (ASPE) to encrypt data, but ASPE has proven to be insecure against known plaintext attack. And the existing schemes require users to provide more information about query range and thus generate a large amount of ciphertexts, which causes …
