News Archives

A Low-Cost Multi-Failure Resilient Replication Scheme for High-Data Availability in Cloud Storage
December 1, 2020 · Publications
Summary: Data availability is one of the most important performance factors in cloud storage systems. To enhance data availability, replication is a common approach to handle the machine failures. However, previously proposed replication schemes cannot effectively handle both correlated and non-correlated machine failures, especially while increasing the data availability with limited resources. The schemes for
Josh Brunty On Digital Forensics Education
August 11, 2020 · Publications
Summary: Christa Miller interviews Josh Brunty, an associate professor at Marshall University, about the importance of collaboration between academia and law enforcement in the field of digital forensics. Brunty discusses the history of Marshall University’s cyber forensics and security programs, which were started in 2004 and have since developed into a full master’s program. He
An Enhanced Ride Sharing Model Based on Human Characteristics and Machine Learning Recommender System
April 9, 2020 · Publications
Summary: Ride Sharing provides benefits like reducing traffic and pollution, but currently, the usage is significantly low due to social barriers, long rider waiting time, and unfair pricing models. Considering the aforementioned issues, we present an Enhanced Ride Sharing Model (ERSM) in which riders are matched based on a specific set of human characteristics using
“I Did What I Believe Is Right”: A Study of Neutralizations among Anonymous Operation Participants
October 1, 2019 · Publications
Summary: Our knowledge of online activists or hacktivists is growing, but it is still far from complete. The reasons why some of these individuals violate computer laws or how they justify their behavior remains elusive, yet one particular framework that lends itself to understanding a hacker or hacktivist’s belief system is Sykes and Matza’s (1957)
Forensic Inspection of Sensitive User Data and Artifacts from Smartwatch Wearable Devices
June 10, 2019 · Publications
Summary: Wearable devices allow users the ability to leave mobile phones behind while remaining connected to the digital world; however, this creates challenges in the examination, acquisition, identification, and analysis of probative data. This preliminary research aims to provide an enhanced understanding of where sensitive user data and forensic artifacts are stored on smartwatch wearable
A Review of Sensing and Communication, Human Factors, and Controller Aspects for Information-Aware Connected and Automated Vehicles
March 15, 2019 · Publications
Summary: Information-aware connected and automated vehicles (CAVs) have drawn great attention in recent years due to their potentially significant positive impacts on roadway safety and operational efficiency. In this paper, we conduct an in-depth review of three basic and key interrelated aspects of a CAV: sensing and communication technologies; human factors; and information-aware controller design.
Prescriptive and Predictive Analytics Techniques for Enabling Cybersecurity
January 1, 2019 · Publications
Summary:   This chapter highlights significant research and challenges pertaining to the applicability of emerging predictive and prescriptive analytics solutions to achieve cyber resilience. It presents significant predictive and prescriptive analytics solutions for protecting the cyberinfrastructure supporting scientific research. The chapter discusses various predictive and prescriptive analytics techniques/algorithms that when combined effectively will aid in
Popularity-Aware Multi-Failure Resilient and Cost-Effective Replication for High Data Durability in Cloud Storage
September 30, 2018 · Publications
Summary: Large-scale data stores are an increasingly important component of cloud datacenter services. However, cloud storage system usually experiences data loss, hindering data durability. Three-way random replication is commonly used to lead better data durability in cloud storage systems. However, three-way random replication cannot effectively handle correlated machine failures to prevent data loss. Although Copyset
Social Engineering in Non-Linear Warfare
July 17, 2018 · Publications
Summary: This paper explores the use of hacking, leaking, and trolling by Russia to influence the 2016 United States Presidential Elections. These tactics have been called “the weapons of the geek” by some researchers. By using proxy hackers and Russian malware to break into the email of the Democratic National Committee and then giving that
Predictive self-learning content recommendation system for multimedia contents
May 24, 2018 · Publications
Summary: Millions of users use the Internet for entertainment, education, shopping and many other purposes. For instance; one billion hours of YouTube videos are watched every day. One of the key features of such platforms such as the entertainment and shopping platforms is the recommendation system based on past activities of users and the contents