Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (620)
- Information Security (243)
- Engineering (120)
- Computer Engineering (78)
- Social and Behavioral Sciences (76)
-
- Electrical and Computer Engineering (53)
- Databases and Information Systems (40)
- Medicine and Health Sciences (35)
- Software Engineering (34)
- Business (31)
- Artificial Intelligence and Robotics (29)
- OS and Networks (25)
- Law (24)
- Public Affairs, Public Policy and Public Administration (24)
- Systems Architecture (21)
- Sociology (14)
- Education (13)
- Other Computer Sciences (13)
- Computer Law (12)
- Defense and Security Studies (12)
- Technology and Innovation (12)
- Legal Studies (11)
- Theory and Algorithms (11)
- Arts and Humanities (10)
- Communication (10)
- Environmental Sciences (10)
- Forensic Science and Technology (10)
- Health Information Technology (10)
- Science and Technology Studies (10)
- Institution
-
- Edith Cowan University (102)
- Dartmouth College (54)
- Singapore Management University (51)
- Selected Works (41)
- Old Dominion University (29)
-
- Brigham Young University (22)
- University of Wollongong (20)
- Missouri University of Science and Technology (17)
- Nova Southeastern University (16)
- Syracuse University (15)
- University of South Florida (14)
- TÜBİTAK (13)
- Embry-Riddle Aeronautical University (11)
- Zayed University (11)
- Kennesaw State University (10)
- University of Nebraska at Omaha (10)
- Marquette University (9)
- Purdue University (9)
- Walden University (9)
- University of Arkansas, Fayetteville (8)
- Wright State University (8)
- City University of New York (CUNY) (7)
- University for Business and Technology in Kosovo (7)
- University of Texas at Arlington (7)
- Florida International University (6)
- University of Nebraska - Lincoln (6)
- University of New Haven (6)
- SelectedWorks (5)
- Technological University Dublin (5)
- University of Kentucky (5)
- Publication Year
- Publication
-
- Dartmouth Scholarship (48)
- Australian Information Security Management Conference (45)
- Research Collection School Of Computing and Information Systems (44)
- Theses and Dissertations (27)
- CCE Theses and Dissertations (16)
-
- USF Tampa Graduate Theses and Dissertations (14)
- Electrical Engineering and Computer Science - All Scholarship (13)
- Faculty of Informatics - Papers (Archive) (13)
- Turkish Journal of Electrical Engineering and Computer Sciences (13)
- Research outputs pre 2011 (12)
- All Works (11)
- VMASC Publications (11)
- Computer Science Faculty Publications (10)
- Computer Science Faculty Research & Creative Works (10)
- Professor Katina Michael (10)
- Dissertations (9)
- Electronic Theses and Dissertations (9)
- Walden Dissertations and Doctoral Studies (9)
- Australian Digital Forensics Conference (8)
- Browse all Theses and Dissertations (8)
- Graduate Theses and Dissertations (8)
- Research outputs 2014 to 2021 (8)
- UBT International Conference (7)
- Australian Information Warfare and Security Conference (6)
- Australian Security and Intelligence Conference (6)
- Doctoral Dissertations (6)
- Electrical & Computer Engineering and Computer Science Faculty Publications (6)
- FIU Electronic Theses and Dissertations (6)
- Research outputs 2022 to 2026 (6)
- Associate Professor Katina Michael (5)
- Publication Type
- File Type
Articles 271 - 300 of 681
Full-Text Articles in Physical Sciences and Mathematics
A Privacy Preserving Framework For Rfid Based Healthcare Systems, Farzana Rahman, Anwarul A. Bhuiyan, Sheikh Iqbal Ahamed
A Privacy Preserving Framework For Rfid Based Healthcare Systems, Farzana Rahman, Anwarul A. Bhuiyan, Sheikh Iqbal Ahamed
Mathematics, Statistics and Computer Science Faculty Research and Publications
RFID (Radio Frequency IDentification) is anticipated to be a core technology that will be used in many practical applications of our life in near future. It has received considerable attention within the healthcare for almost a decade now. The technology’s promise to efficiently track hospital supplies, medical equipment, medications and patients is an attractive proposition to the healthcare industry. However, the prospect of wide spread use of RFID tags in the healthcare area has also triggered discussions regarding privacy, particularly because RFID data in transit may easily be intercepted and can be send to track its user (owner). In a …
Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen
Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen
Journal of Cybersecurity Education, Research and Practice
Industrial Control Systems (ICS), which are pervasive in our nation’s critical infrastructures, are becoming increasingly at risk and vulnerable to internal and external threats. It is imperative that the future workforce be educated and trained on the security of such systems. However, it is equally important that careful and deliberate considerations must be exercised in designing and implementing the educational and training activities that pertain to ICS. To that end, we designed and implemented pedagogical materials and tools to facilitate the teaching and learning processes in the area of ICS security. In this paper, we describe those resources, the professional …
Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur
Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur
Information Science Faculty Publications
The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network paradigm which is providing various types of solutions to the community and the individual user in various sectors including environmental monitoring, entertainment, transportation, security, and healthcare. We explore and compare the features of wireless sensor networks and ubiquitous sensor networks and based on the differences between these two types of systems, we classify the security-related challenges of ubiquitous sensor networks. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges that need to be addressed …
Bystanders' Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith
Bystanders' Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith
Computer Science Faculty Publications
The growing adoption of Internet-connected devices has given rise to significant privacy issues not only for users but also for bystanders. The authors explore privacy concerns related to bystanders' privacy and present a taxonomy of the solutions found in the literature to handle this issue. They also explore open issues that must be addressed in the future.
Breathprint: Breathing Acoustics-Based User Authentication, Jagmohan Chauhan, Yining Hu, Suranga Sereviratne, Archan Misra, Aruna Sereviratne, Youngki Lee
Breathprint: Breathing Acoustics-Based User Authentication, Jagmohan Chauhan, Yining Hu, Suranga Sereviratne, Archan Misra, Aruna Sereviratne, Youngki Lee
Research Collection School Of Computing and Information Systems
We propose BreathPrint, a new behavioural biometric signature based on audio features derived from an individual's commonplace breathing gestures. Specifically, BreathPrint uses the audio signatures associated with the three individual gestures: sniff, normal, and deep breathing, which are sufficiently different across individuals. Using these three breathing gestures, we develop the processing pipeline that identifies users via the microphone sensor on smartphones and wearable devices. In BreathPrint, a user performs breathing gestures while holding the device very close to their nose. Using off-the-shelf hardware, we experimentally evaluate the BreathPrint prototype with 10 users, observed over seven days. We show that users …
Malware Analysis And Privacy Policy Enforcement Techniques For Android Applications, Aisha Ibrahim Ali-Gombe
Malware Analysis And Privacy Policy Enforcement Techniques For Android Applications, Aisha Ibrahim Ali-Gombe
University of New Orleans Theses and Dissertations
The rapid increase in mobile malware and deployment of over-privileged applications over the years has been of great concern to the security community. Encroaching on user’s privacy, mobile applications (apps) increasingly exploit various sensitive data on mobile devices. The information gathered by these applications is sufficient to uniquely and accurately profile users and can cause tremendous personal and financial damage.
On Android specifically, the security and privacy holes in the operating system and framework code has created a whole new dynamic for malware and privacy exploitation. This research work seeks to develop novel analysis techniques that monitor Android applications for …
Lighttouch: Securely Connecting Wearables To Ambient Displays With User Intent, Xiaohui Liang, Tianlong Yun, Ronald Peterson, David Kotz
Lighttouch: Securely Connecting Wearables To Ambient Displays With User Intent, Xiaohui Liang, Tianlong Yun, Ronald Peterson, David Kotz
Dartmouth Scholarship
Wearables are small and have limited user interfaces, so they often wirelessly interface with a personal smartphone/computer to relay information from the wearable for display or other interactions. In this paper, we envision a new method, LightTouch, by which a wearable can establish a secure connection to an ambient display, such as a television or a computer monitor, while ensuring the user's intention to connect to the display. LightTouch uses standard RF methods (like Bluetooth) for communicating the data to display, securely bootstrapped via the visible-light communication (the brightness channel) from the display to the low-cost, low-power, ambient light sensor …
Practical Attacks On Cryptographically End-To-End Verifiable Internet Voting Systems, Nicholas Chang-Fong
Practical Attacks On Cryptographically End-To-End Verifiable Internet Voting Systems, Nicholas Chang-Fong
Electronic Thesis and Dissertation Repository
Cryptographic end-to-end verifiable voting technologies concern themselves with the provision of a more trustworthy, transparent, and robust elections. To provide voting systems with more transparency and accountability throughout the process while preserving privacy which allows voters to express their true intent.
Helios Voting is one of these systems---an online platform where anyone can easily host their own cryptographically end-to-end verifiable election, aiming to bring verifiable voting to the masses. Helios does this by providing explicit cryptographic checks that an election was counted correctly, checks that any member of the public can independently verify. All of this while still protecting one …
Tradeoffs In Protocol Designs For Collaborative Authentication, Jacob Venne
Tradeoffs In Protocol Designs For Collaborative Authentication, Jacob Venne
USF Tampa Graduate Theses and Dissertations
Authentication is a crucial tool used in access control mechanisms to verify a user’s identity. Collaborative Authentication (co-authentication) is a newly proposed authentication scheme designed to improve on traditional token authentication. Co-authentication works by using multiple user devices as tokens to collaborate in a challenge and authenticate a user request on single device.
This thesis adds two contributions to the co-authentication project. First, a detailed survey of applications that are suitable for adopting co-authentication is presented. Second, an analysis of tradeoffs between varying protocol designs of co-authentication is performed to determine whether, and how, any designs are superior to other …
Anonpri: A Secure Anonymous Private Authentication Protocol For Rfid Systems, Farzana Rahman, Md. Endadul Hoque, Sheikh Iqbal Ahamed
Anonpri: A Secure Anonymous Private Authentication Protocol For Rfid Systems, Farzana Rahman, Md. Endadul Hoque, Sheikh Iqbal Ahamed
Mathematics, Statistics and Computer Science Faculty Research and Publications
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services. Hence, significant efforts have been made to design RFID systems that preserve users' privacy. Majority of the privacy preserving protocols for RFID systems require the reader to search all tags in the system in order to identify a single RFID tag which not efficient for large scale systems. In order to achieve high-speed authentication in large-scale RFID systems, researchers propose tree-based approaches, in which any pair of tags …
Evaluating Ip Surveillance Camera Vulnerabilities, Brian Cusack, Zhuang Tian
Evaluating Ip Surveillance Camera Vulnerabilities, Brian Cusack, Zhuang Tian
Australian Information Security Management Conference
Hacking of IP surveillance camera systems came to public attention in 2016 when the high bandwidth and resources were exploited for a massive DDoS attack that affected one third of all US Internet services. A review of previous studies show that a vast number of IP cameras have been hacked because the default usernames and passwords have not been changed from the factory defaults. In this research we asked, What are the vulnerabilities of an IP surveillance camera? The purpose of the study was to provide identification of vulnerabilities and guidance for the protection of surveillance camera systems. The research …
Neurosecurity For Brainware Devices, Brian Cusack, Kaushik Sundararajan, Reza Khaleghparast
Neurosecurity For Brainware Devices, Brian Cusack, Kaushik Sundararajan, Reza Khaleghparast
Australian Information Security Management Conference
Brainware has a long history of development down into the present day where very simple and usable devices are available to train for the control of games and services. One of the big areas of application has been in the health sciences to provide compensatory control to humans who may lack the usual capabilities. Our concern has been the protection of information in brainware so that a human intention may have confidentiality, integrity, and accessibility to the required implementation mechanisms for services. The research question was: What are the consequences of security failure in brainware? Our research tested a brainware …
Contextualizing Secure Information System Design: A Socio-Technical Approach, Abdul Rahim Charif
Contextualizing Secure Information System Design: A Socio-Technical Approach, Abdul Rahim Charif
CCE Theses and Dissertations
Secure Information Systems (SIS) design paradigms have evolved in generations to adapt to IS security needs. However, modern IS are still vulnerable and are far from secure. The development of an underlying IS cannot be reduced to “technological fixes” neither is the design of SIS. Technical security cannot ensure IS security. Generations of SIS design paradigms have evolved, all with their own sets of shortcomings. A SIS design paradigm must meet well-defined requirements, yet contemporary paradigms do not meet all these requirements. Current SIS design paradigms are not easily applicable to IS. They lack a comprehensive modeling support and ignore …
The Proceedings Of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia, Craig Valli (Ed.)
The Proceedings Of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia, Craig Valli (Ed.)
Australian Information Security Management Conference
Conference Foreword
The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fifteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The papers cover topics from vulnerabilities in “Internet of Things” protocols through to improvements in biometric identification algorithms and surveillance camera weaknesses. The conference has drawn interest and …
Cyber Security Incidents On Critical Infrastructure And Industrial Networks, Robert Ighodaro Ogie
Cyber Security Incidents On Critical Infrastructure And Industrial Networks, Robert Ighodaro Ogie
SMART Infrastructure Facility - Papers
National critical infrastructure and industrial processes are heavily reliant on automation, monitoring and control technologies, including the widely used Supervisory Control and Data Acquisition (SCADA) systems. The growing interconnection of these systems with corporate networks exposes them to cyber attacks, with several security incidents reported over the last few decades. This study provides a classification scheme for categorising security incidents related to critical infrastructure and industrial control systems. The classification scheme is applied to analyse 242 security incidents on critical infrastructure and industrial control networks, which were reported between 1982 and 2014. The results show interesting patterns, with key points …
How Attitude Toward The Behavior, Subjective Norm, And Perceived Behavioral Control Affects Information Security Behavior Intention, David Philip Johnson
How Attitude Toward The Behavior, Subjective Norm, And Perceived Behavioral Control Affects Information Security Behavior Intention, David Philip Johnson
Walden Dissertations and Doctoral Studies
The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human InfoSec behavior. Applying sociobehavioral theories to InfoSec research provides information to aid IT security program managers in developing improved SETA programs. The purpose of this correlational study was to examine through the theoretical lens of the theory of planned behavior (TPB) how attitude toward the behavior (ATT), subjective norm (SN), and …
Exploring Security, Privacy, And Reliability Strategies To Enable The Adoption Of Iot, Daud Alyas Kamin
Exploring Security, Privacy, And Reliability Strategies To Enable The Adoption Of Iot, Daud Alyas Kamin
Walden Dissertations and Doctoral Studies
The Internet of things (IoT) is a technology that will enable machine-to-machine communication and eventually set the stage for self-driving cars, smart cities, and remote care for patients. However, some barriers that organizations face prevent them from the adoption of IoT. The purpose of this qualitative exploratory case study was to explore strategies that organization information technology (IT) leaders use for security, privacy, and reliability to enable the adoption of IoT devices. The study population included organization IT leaders who had knowledge or perceptions of security, privacy, and reliability strategies to adopt IoT at an organization in the eastern region …
A Particle Swarm Optimization And Block-Svd-Based Watermarking For Digital Images, Falgun Thakkar, Vinay Kumar Srivastava
A Particle Swarm Optimization And Block-Svd-Based Watermarking For Digital Images, Falgun Thakkar, Vinay Kumar Srivastava
Turkish Journal of Electrical Engineering and Computer Sciences
The major issues in most watermarking schemes are security, reliability, and robustness against attacks. To achieve these objectives in a watermarking algorithm, the selection of a scale factor to embed the watermark into the host image is a challenging problem. In this paper, a block singular value decomposition (SVD)-based reliable, robust, secure, and fast watermarking scheme is proposed that uses particle swarm optimization (PSO) in the selection of the scale factor. SVD is applied here on the nonoverlapping blocks of LL wavelet subbands. Selected singular values of these blocks are modified with the pixel values of the watermark image. Selected …
Proposing A New Clustering Method To Detect Phishing Websites, Morteza Arab, Mohammad Karim Sohrabi
Proposing A New Clustering Method To Detect Phishing Websites, Morteza Arab, Mohammad Karim Sohrabi
Turkish Journal of Electrical Engineering and Computer Sciences
Phishing websites are fake ones that are developed by ill-intentioned people to imitate real and legal websites. Most of these types of web pages have high visual similarities to hustle the victims. The victims of phishing websites may give their bank accounts, passwords, credit card numbers, and other important information to the designers and owners of phishing websites. The increasing number of phishing websites has become a great challenge in e-business in general and in electronic banking specifically. In the present study, a novel framework based on model-based clustering is introduced to fight against phishing websites. First, a model is …
A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini
A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini
International Journal of Nuclear Security
The paper investigates the approach used by a new set of regional institutions, the Disaster Preparedness and Risk Management Organizations (DPRMOs), in strengthening regional governance and cooperation. It also inquires in what ways these new institutions might indirectly contribute to the establishment of a more cohesive global nuclear security framework. More specifically, through the examination of the case of Southeast Asia, the paper argues that these institutions, albeit without a specific and direct mandate to operate in the nuclear security domain, are fundamentally strengthening states’ capacity to assess risks and threats and to map vulnerabilities in timely fashion. They are …
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
International Journal of Nuclear Security
Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.
The Paradox Of Social Media Security: A Study Of It Students’ Perceptions Versus Behavior On Using Facebook, Zahra Y. Alqubaiti
The Paradox Of Social Media Security: A Study Of It Students’ Perceptions Versus Behavior On Using Facebook, Zahra Y. Alqubaiti
Master of Science in Information Technology Theses
Social media plays an essential role in the modern society, enabling people to be better connected to each other and creating new opportunities for businesses. At the same time, social networking sites have become major targets for cyber-security attacks due to their massive user base. Many studies investigated the security vulnerabilities and privacy issues of social networking sites and made recommendations on how to mitigate security risks. Users are an integral part of any security mix. In this thesis, we explore the relationship between users’ security perceptions and their actual behavior on social networking sites. Protection motivation theory (PMT), initially …
Convicted By Memory: Automatically Recovering Spatial-Temporal Evidence From Memory Images, Brendan D. Saltaformaggio
Convicted By Memory: Automatically Recovering Spatial-Temporal Evidence From Memory Images, Brendan D. Saltaformaggio
Open Access Dissertations
Memory forensics can reveal “up to the minute” evidence of a device’s usage, often without requiring a suspect’s password to unlock the device, and it is oblivious to any persistent storage encryption schemes, e.g., whole disk encryption. Prior to my work, researchers and investigators alike considered data-structure recovery the ultimate goal of memory image forensics. This, however, was far from sufficient, as investigators were still largely unable to understand the content of the recovered evidence, and hence efficiently locating and accurately analyzing such evidence locked in memory images remained an open research challenge.
In this dissertation, I propose breaking from …
A System For Detecting Malicious Insider Data Theft In Iaas Cloud Environments, Jason Nikolai, Yong Wang
A System For Detecting Malicious Insider Data Theft In Iaas Cloud Environments, Jason Nikolai, Yong Wang
Research & Publications
The Cloud Security Alliance lists data theft and insider attacks as critical threats to cloud security. Our work puts forth an approach using a train, monitor, detect pattern which leverages a stateful rule based k-nearest neighbors anomaly detection technique and system state data to detect inside attacker data theft on Infrastructure as a Service (IaaS) nodes. We posit, instantiate, and demonstrate our approach using the Eucalyptus cloud computing infrastructure where we observe a 100 percent detection rate for abnormal login events and data copies to outside systems.
Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu
Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Software repackaging is a common approach for creating malware. In this approach, malware authors inject malicious payloads into legitimate applications; then, to ren- der security analysis more difficult, they obfuscate most or all of the code. This forces analysts to spend a large amount of effort filtering out benign obfuscated methods in order to locate potentially malicious methods for further analysis. If an effective mechanism for filtering out benign obfuscated methods were available, the number of methods that must be analyzed could be reduced, allowing analysts to be more productive. In this thesis, we introduce SEMEO, a highly effective and …
Context-Sensitive Auto-Sanitization For Php, Jared M. Smith, Richard J. Connor, David P. Cunningham, Kyle G. Bashour, Walter T. Work
Context-Sensitive Auto-Sanitization For Php, Jared M. Smith, Richard J. Connor, David P. Cunningham, Kyle G. Bashour, Walter T. Work
Chancellor’s Honors Program Projects
No abstract provided.
Teaching Android Security Through Examples: A Publicly Available Database Of Vulnerable Apps, Daniel E. Krutz, Samuel A. Malachowsky
Teaching Android Security Through Examples: A Publicly Available Database Of Vulnerable Apps, Daniel E. Krutz, Samuel A. Malachowsky
Articles
Security is hard, and teaching security can be even harder. Here we describe a public educational activity to assist in the instruction of both students and developers in creating secure Android apps. Our set of activities includes example vulnerable applications, information about each vulnerability, steps on how to repair the vulnerabilities, and information about how to confirm that the vulnerability has been properly repaired. Our primary goal is to make these activities available to other instructors for use in their classrooms ranging from the K-12 to university settings. A secondary goal of this project is to foster interest in security …
Improvement Of Security In Uas Communication And Navigation Using Ads-B, Vedadatta Gouripeddi
Improvement Of Security In Uas Communication And Navigation Using Ads-B, Vedadatta Gouripeddi
UNLV Theses, Dissertations, Professional Papers, and Capstones
In this thesis, we congregate the security threats on UAS and suggest solutions using ADS-B device. UAS ground and intercommunication is prone to availability, confidentiality and integrity attacks. UAS communication has three layered wireless Ad-Hock network which comprises of Complex group key exchange. Loss of one layer in the Ad-hock network leads to a complete loss of communication in the network. Current UAS navigation methods include complete reliance on on-board sensors, radars and GPS. This research proposes solutions for UAS communication, navigation and collision avoidance using ADS-B. ADS-B acts as a back-up when there is a loss in any one …
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
UNLV Theses, Dissertations, Professional Papers, and Capstones
Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …
The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran
The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran
International Journal of Nuclear Security
In the emerging field of nuclear security, those responsible for education and training are constantly seeking to identify and engage with tools and approaches that provide for a constructive learning environment. In this context, this paper explores the nature and value of Tabletop exercises (TTX) and how they can be applied in the nuclear security context. On the one hand, the paper dissects the key components of the TTX and considers the broader pedagogical benefits of this teaching method. On the other hand, the paper draws lessons from the authors’ experience of running TTXs as part of nuclear security professional …