• Adjustment of Consensus Protocol Step-Size in a Network System with Different Task Priorities via SPSA-like Algorithm under the Cost Constraints 

      Amelina, Natalia; Granichin, Oleg; Granichina, Olga; Ivanskiy, Yury; Jiang, Yuming (Journal article; Peer reviewed, 2018)
      A multi-agent network system of different computing nodes processing tasks of different priority levels is considered. Agents exchange information about their states in presence of noise in communication channels in the ...
    • Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI 

      Yildirim-Yayilgan, Sule; Yamin, Muhammad Mudassar; Ali, Subhan; Abomhara, Mohamed Ali Saleh (Peer reviewed; Journal article, 2024)
      The widespread propagation of misinformation on social media platforms poses a significant concern, prompting substantial endeavors within the research community to develop robust detection solutions. Individuals often ...
    • Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI 

      Hashmi, Ehtesham; Yildirim-Yayilgan, Sule; Yamin, Muhammad Mudassar; Ali, Subhan; Abomhara, Mohamed Ali Saleh (Journal article; Peer reviewed, 2024)
      The widespread propagation of misinformation on social media platforms poses a significant concern, prompting substantial endeavors within the research community to develop robust detection solutions. Individuals often ...
    • Advancing the concept of cybersecurity as a public good 

      Kianpour, Mazaher; Kowalski, Stewart James; Øverby, Harald (Journal article; Peer reviewed, 2022)
      This paper presents an agent-based model of cybersecurity as a participatory public good. Ineffective cybersecurity measures pose serious threats and risks to the development and stability of information societies in the ...
    • Advantages of the PaySim Simulator for Improving Financial Fraud Controls 

      Lopez Rojas, Edgar Alonso; Barneaud, Camille (Journal article; Peer reviewed, 2019)
      Financial transactions lay up the foundation of modern society. Unfortunately, illicit abuse of the financial system is pervasive. Fraud controls aim to detect these suspicious activities, but they require deep analysis ...
    • Adversarial Attacks against Face Recognition: A Comprehensive Study 

      Vakhshiteh, Fatemeh; Nickabadi, Ahmad; Ramachandra, Raghavendra (Peer reviewed; Journal article, 2021)
      Face recognition (FR) systems have demonstrated reliable verification performance, suggesting suitability for real-world applications ranging from photo tagging in social media to automated border control (ABC). In an ...
    • Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols 

      Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen (Peer reviewed; Journal article, 2020)
      Adversarial models are well-established for cryptographic protocols, but distributed real-time protocols have requirements that these abstractions are not intended to cover. The IEEE/IEC 61850 standard for communication ...
    • Age and Gender Impact on Password Hygiene 

      Juozapavičius, Aušrius; Brilingaite, A.; Bukauskas, Linas; Lugo, Ricardo Gregorio (Journal article; Peer reviewed, 2022)
      Password hygiene plays an essential part in securing systems protected with single-factor authentication. A significant fraction of security incidents happen due to weak or reused passwords. The reasons behind differences ...
    • Allocating Limited Resources to Protect a Massive Number of Targets Using a Game Theoretic Model 

      Liu, Xu; Di, Xiaoqiang; Li, Jinqing; Wang, Huan; Zhao, Jinping; Yang, Huamin; Cong, Ligang; Jiang, Yuming (Journal article; Peer reviewed, 2019)
      Resource allocation is the process of optimizing the rare resources. In the area of security, how to allocate limited resources to protect a massive number of targets is especially challenging. This paper addresses this ...
    • Ambiguous Self-Induced Disinformation (ASID) Attacks: Weaponizing a Cognitive Deficiency 

      Canham, Matthew; Sütterlin, Stefan; Ask, Torvald Fossåen; Knox, Benjamin James; Glenister, Lauren; Lugo, Ricardo Gregorio (Journal article; Peer reviewed, 2022)
      Humans quickly and effortlessly impose context onto ambiguous stimuli, as demonstrated through psychological projective testing and ambiguous figures. This feature of human cognition may be weaponized as part of an information ...
    • An Empirical Study on Security Knowledge Sharing and Learning in Open Source Software Communities 

      Wen, Shao-Fang (Journal article; Peer reviewed, 2018)
      pen source software (OSS) security has been the focus of the security community and practitioners over the past decades. However, the number of new vulnerabilities keeps increasing in today’s OSS systems. With today’s ...
    • An Experimental Platform for QoE Studies of WebRTC-based Multi-Party Video Communication 

      Ammar, Doreid; De Moor, Katrien; Heegaard, Poul Einar (Journal article, 2018)
      Web Real-Time Communication (WebRTC) enables easy to use, no installation, in browser applications such as Google hangout and appear.in. To increase the understanding of the Quality of Experience with the use of such ...
    • An Initial Insight Into InfoSec Risk Management Practices 

      Wangen, Gaute (Journal article; Peer reviewed, 2015)
      Much of the debate surrounding risk management in information security (InfoSec) has been at the academic level, and how practitioners view predominant issues is an important element often left unexplored. Thus, this article ...
    • An IP Multicast Framework for Routable Sample Value Communication in Transmission Grids 

      Adrah, Charles Mawutor; Yellajosula, Jaya R. A. K.; Kure, Oivind; Palma, David; Heegaard, Poul Einar (Journal article; Peer reviewed, 2019)
      The growth and deployment of digital substations based on IEC 61850 in power utility industry will spawn new opportunities for wide area systems. These include monitoring, protection and control applications that will ...
    • An open access medical knowledge base for community driven diagnostic decision support system development 

      Müller, Lars; Gangadharaiah, Rashmi; Klein, Simone; Perry, James; Bernstein, Greg; Nurkse, David; Wailes, Dustin; Graham, Rishi; El-Kareh, Robert; Mehta, Sanjay; Vinterbo, Staal; Aronoff-Spencer, Eliah (Journal article; Peer reviewed, 2019)
      Introduction While early diagnostic decision support systems were built around knowledge bases, more recent systems employ machine learning to consume large amounts of health data. We argue curated knowledge bases will ...
    • Analysis and Enhancement of Random Number Generator in FPGA Based on Oscillator Rings 

      Wold, Knut; Tan, Chik How (Peer reviewed; Journal article, 2009)
      A true random number generator (TRNG) is an important component in cryptographic systems. Designing a fast and secure TRNG in an FPGA is a challenging task. In this paper, we analyze the TRNG designed by Sunar et al. (2007) ...
    • Analysis of fraud controls using the PaySim financial simulator 

      Lopez Rojas, Edgar Alonso; Axelsson, Stefan; Baca, Dejan (Journal article; Peer reviewed, 2018)
      Fraud controls for financial transactions are needed and required by law enforcement agencies to flag suspicious criminal activity. These controls however require deeper analysis of the effectiveness and the negative impact ...
    • Analysis of the effect of InfoRanking on content pollution in peer-to-peer systems 

      Zhang, Peiqing; Fotiou, Nikos; Helvik, Bjarne Emil; Marias, Giannis F.; Polyzos, George C. (Journal article; Peer reviewed, 2014)
      Content pollution is one of the most common attacks against peer-to-peer file-sharing systems. As such, systems are usually open to users, and the deployed security mechanisms merely examine the sanity of the downloaded ...
    • Analysis of uPort Open, an identity management blockchain-based solution 

      Panait, Andreea E.; Olimid-Nencioni, Ruxandra-Florentina; Stefanescu, Alin (Peer reviewed; Journal article, 2020)
      Recently, academics and professionals proposed a substantial number of identity management solutions based on blockchain technology. Among them, uPort appeared promising, being considered for both personal and administrative ...
    • An Analytical Model for Sparse Network Codes: Field Size Considerations 

      Zarei, Amir; Pahlevani, Peyman; E. Lucani, Daniel (Peer reviewed; Journal article, 2020)
      One of the by-products of Sparse Network Coding (SNC) is the ability to perform partial decoding, i.e., decoding some original packets prior to collecting all needed coded packets to decode the entire coded data. Due to ...