• Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI 

      Hashmi, Ehtesham; Yildirim-Yayilgan, Sule; Yamin, Muhammad Mudassar; Ali, Subhan; Abomhara, Mohamed Ali Saleh (Journal article; Peer reviewed, 2024)
      The widespread propagation of misinformation on social media platforms poses a significant concern, prompting substantial endeavors within the research community to develop robust detection solutions. Individuals often ...
    • Advancing the concept of cybersecurity as a public good 

      Kianpour, Mazaher; Kowalski, Stewart James; Øverby, Harald (Journal article; Peer reviewed, 2022)
      This paper presents an agent-based model of cybersecurity as a participatory public good. Ineffective cybersecurity measures pose serious threats and risks to the development and stability of information societies in the ...
    • Advantages of the PaySim Simulator for Improving Financial Fraud Controls 

      Lopez Rojas, Edgar Alonso; Barneaud, Camille (Journal article; Peer reviewed, 2019)
      Financial transactions lay up the foundation of modern society. Unfortunately, illicit abuse of the financial system is pervasive. Fraud controls aim to detect these suspicious activities, but they require deep analysis ...
    • Adversarial Attacks against Face Recognition: A Comprehensive Study 

      Vakhshiteh, Fatemeh; Nickabadi, Ahmad; Ramachandra, Raghavendra (Peer reviewed; Journal article, 2021)
      Face recognition (FR) systems have demonstrated reliable verification performance, suggesting suitability for real-world applications ranging from photo tagging in social media to automated border control (ABC). In an ...
    • Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols 

      Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen (Peer reviewed; Journal article, 2020)
      Adversarial models are well-established for cryptographic protocols, but distributed real-time protocols have requirements that these abstractions are not intended to cover. The IEEE/IEC 61850 standard for communication ...
    • Age and Gender Impact on Password Hygiene 

      Juozapavičius, Aušrius; Brilingaite, A.; Bukauskas, Linas; Lugo, Ricardo Gregorio (Journal article; Peer reviewed, 2022)
      Password hygiene plays an essential part in securing systems protected with single-factor authentication. A significant fraction of security incidents happen due to weak or reused passwords. The reasons behind differences ...
    • Allocating Limited Resources to Protect a Massive Number of Targets Using a Game Theoretic Model 

      Liu, Xu; Di, Xiaoqiang; Li, Jinqing; Wang, Huan; Zhao, Jinping; Yang, Huamin; Cong, Ligang; Jiang, Yuming (Journal article; Peer reviewed, 2019)
      Resource allocation is the process of optimizing the rare resources. In the area of security, how to allocate limited resources to protect a massive number of targets is especially challenging. This paper addresses this ...
    • Ambiguous Self-Induced Disinformation (ASID) Attacks: Weaponizing a Cognitive Deficiency 

      Canham, Matthew; Sütterlin, Stefan; Ask, Torvald Fossåen; Knox, Benjamin James; Glenister, Lauren; Lugo, Ricardo Gregorio (Journal article; Peer reviewed, 2022)
      Humans quickly and effortlessly impose context onto ambiguous stimuli, as demonstrated through psychological projective testing and ambiguous figures. This feature of human cognition may be weaponized as part of an information ...
    • An Empirical Study on Security Knowledge Sharing and Learning in Open Source Software Communities 

      Wen, Shao-Fang (Journal article; Peer reviewed, 2018)
      pen source software (OSS) security has been the focus of the security community and practitioners over the past decades. However, the number of new vulnerabilities keeps increasing in today’s OSS systems. With today’s ...
    • An Initial Insight Into InfoSec Risk Management Practices 

      Wangen, Gaute (Journal article; Peer reviewed, 2015)
      Much of the debate surrounding risk management in information security (InfoSec) has been at the academic level, and how practitioners view predominant issues is an important element often left unexplored. Thus, this article ...
    • An IP Multicast Framework for Routable Sample Value Communication in Transmission Grids 

      Adrah, Charles Mawutor; Yellajosula, Jaya R. A. K.; Kure, Oivind; Palma, David; Heegaard, Poul Einar (Journal article; Peer reviewed, 2019)
      The growth and deployment of digital substations based on IEC 61850 in power utility industry will spawn new opportunities for wide area systems. These include monitoring, protection and control applications that will ...
    • An open access medical knowledge base for community driven diagnostic decision support system development 

      Müller, Lars; Gangadharaiah, Rashmi; Klein, Simone; Perry, James; Bernstein, Greg; Nurkse, David; Wailes, Dustin; Graham, Rishi; El-Kareh, Robert; Mehta, Sanjay; Vinterbo, Staal; Aronoff-Spencer, Eliah (Journal article; Peer reviewed, 2019)
      Introduction While early diagnostic decision support systems were built around knowledge bases, more recent systems employ machine learning to consume large amounts of health data. We argue curated knowledge bases will ...
    • Analysis and Enhancement of Random Number Generator in FPGA Based on Oscillator Rings 

      Wold, Knut; Tan, Chik How (Peer reviewed; Journal article, 2009)
      A true random number generator (TRNG) is an important component in cryptographic systems. Designing a fast and secure TRNG in an FPGA is a challenging task. In this paper, we analyze the TRNG designed by Sunar et al. (2007) ...
    • Analysis of fraud controls using the PaySim financial simulator 

      Lopez Rojas, Edgar Alonso; Axelsson, Stefan; Baca, Dejan (Journal article; Peer reviewed, 2018)
      Fraud controls for financial transactions are needed and required by law enforcement agencies to flag suspicious criminal activity. These controls however require deeper analysis of the effectiveness and the negative impact ...
    • Analysis of the effect of InfoRanking on content pollution in peer-to-peer systems 

      Zhang, Peiqing; Fotiou, Nikos; Helvik, Bjarne Emil; Marias, Giannis F.; Polyzos, George C. (Journal article; Peer reviewed, 2014)
      Content pollution is one of the most common attacks against peer-to-peer file-sharing systems. As such, systems are usually open to users, and the deployed security mechanisms merely examine the sanity of the downloaded ...
    • Analysis of uPort Open, an identity management blockchain-based solution 

      Panait, Andreea E.; Olimid-Nencioni, Ruxandra-Florentina; Stefanescu, Alin (Peer reviewed; Journal article, 2020)
      Recently, academics and professionals proposed a substantial number of identity management solutions based on blockchain technology. Among them, uPort appeared promising, being considered for both personal and administrative ...
    • An Analytical Model for Sparse Network Codes: Field Size Considerations 

      Zarei, Amir; Pahlevani, Peyman; E. Lucani, Daniel (Peer reviewed; Journal article, 2020)
      One of the by-products of Sparse Network Coding (SNC) is the ability to perform partial decoding, i.e., decoding some original packets prior to collecting all needed coded packets to decode the entire coded data. Due to ...
    • Analyzing Amazon Products Sentiment: A Comparative Study of Machine and Deep Learning, and Transformer-Based Techniques 

      Ali, Hashir; Hashmi, Ehtesham; Yildirim-Yayilgan, Sule; Shaikh, Sarang (Journal article; Peer reviewed, 2024)
      In recent years, online shopping has surged in popularity, with customer reviews becoming a crucial aspect of the decision-making process. Reviews not only help potential customers make informed choices, but also provide ...
    • Analyzing Digital Evidence Using Parallel k-means with Triangle Inequality on Spark 

      Chitrakar, Ambika Shrestha; Petrovic, Slobodan (Chapter; Peer reviewed, 2018)
      Analyzing digital evidence has become a big data problem, which requires faster methods to handle them on a scalable framework. Standard k-means clustering algorithm is widely used in analyzing digital evidence. However, ...
    • Analyzing the DarkNetMarkets subreddit for evolutions of tools and trends using LDA topic modeling 

      Porter, Kyle (Journal article; Peer reviewed, 2018)
      Darknet markets, which can be considered as online black markets, in general sell illegal items such as drugs, firearms, and malware. In July 2017, significant law enforcement operations compromised or completely took down ...