- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Smart Grid Security and Resilience
- Spam and Phishing Detection
- Traffic Prediction and Management Techniques
- Digital and Cyber Forensics
- Traffic control and management
- Vehicular Ad Hoc Networks (VANETs)
- Software Engineering Research
- Software Testing and Debugging Techniques
- Transportation Planning and Optimization
- Anomaly Detection Techniques and Applications
- Wine Industry and Tourism
- Fermentation and Sensory Analysis
- Mobile Ad Hoc Networks
- Horticultural and Viticultural Research
- Video Surveillance and Tracking Methods
- Autonomous Vehicle Technology and Safety
- Wireless Networks and Protocols
- Privacy, Security, and Data Protection
- Vehicle License Plate Recognition
- Scientific Computing and Data Management
- Digital Mental Health Interventions
- Information and Cyber Security
- Peer-to-Peer Network Technologies
University of Alabama
2016-2024
University Transportation Center for Alabama
2022
Conway School of Landscape Design
2017
University of Central Arkansas
2017
Louisiana Tech University
2010-2015
Mississippi State University
2006-2009
University of Maryland, Baltimore
2001
University of Maryland, Baltimore County
2001
Purdue University West Lafayette
2001
Organizzazione Sociopsichiatrica Cantonale
2001
Until recently, industrial control systems (ICSs) used "air-gap" security measures, where every node of the ICS network was isolated from other networks, including Internet, by a physical disconnect. Attaching networks to Internet benefits companies and engineers who use them. However, as these were designed for in air-gapped environment, protocols ICSs contain little no features are vulnerable various attacks. This paper proposes an approach detect intrusions into attached measuring...
Cyberattacks threaten the safety and security of patient data system integrity, these have been a major problem healthcare faces in recent times. Their main target is Electronic Health Records (EHR) industry. These cyberattacks come with serious consequences such as disruption operations, ransomware infections breaches to mention few [1]. This paper explains how quantum-driven predictive cybersecurity framework can secure EHR systems through use quantum computing machine learning. The...
In cloud computing, efficient resource allocation within data centers is crucial for reducing energy consumption and operational costs. Virtual Machine Placement (VMP) isa critical aspect, involving the strategic assignment of Machines (VMs) to physical servers. However, inefficient VMplacement can lead increased usage, posing significant challenges efficiency cost-effectiveness. This paper introduces a novel approach VM placement, with aim minimizing total centers. Leveraging Ant Colony...
Data Science is a successful study that incorporates varying techniques and theories from distinct fields including Mathematics, Computer Science, Economics, Business domain knowledge. Among all components in data science, knowledge the key to create high quality products by scientists. Wineinformatics new science application uses wine as related datasets, physicochemical laboratory reviews. This paper produces brand-new dataset contains more than 100,000 reviews made available Computational...
With the increase in mobile device use, there is a greater need for increasingly sophisticated malware detection algorithms. The research presented this paper examines two types of features Android applications, permission requests and system calls, as way to detect malware. We are able differentiate between benign malicious apps by applying machine learning algorithm. model that here achieved classification accuracy around 80% using permissions 60% calls relatively small dataset. In future,...
Fuzzy hashes are gaining recognition in the realm of digital forensics as an alternative method recognizing similar or nearly identical files. However, despite a high diversity algorithms existence, only SSDEEP and sdhash widely used. This paper describes several viable fuzzy not wide use compares them detail, examining both security non-security flaws. Finally, we develop guidelines to put these practical use, well suggesting improvements hashes.
The emerging connected vehicle (CV) technology has introduced the opportunity to improve traditional traffic signal operation. Real-time trajectory information (location, speed, and heading) from CV can provide about nearby conditions which potentially be utilized for enhanced control However, implementation of still is impractical due lower penetration rate CV-enabled vehicles on road limited deployment vehicle-to-infrastructure (V2I) communications. This paper developed an approach use...
This paper proposes a possible methodology for detecting and mitigating traffic congestion. method is carried out using custom-designed scenario model. The model fully developed in lieu of abundant data support from actual events, which applicable to localized surveillance conditions, where massive collection surveilling devices infeasible, or unviable. approach includes two parts: construction, re-routing strategy. construction part focuses on the development driving scenario, takes various...
Code smells are anomalies often generated in design, implementation or maintenance phase of software development life cycle. Researchers established several catalogues characterizing the smells. Fowler and Beck developed most popular catalogue 22 covering varieties issues. This literature presents an overview existing research conducted on these Our motivation is to represent with easier interpretation for developers, determine causes that generate issues applications their impact from...
Bluetooth Low Energy (BTLE) is pervasive in technology throughout all areas of our lives. In this research effort, experiments are performed to discover vulnerabilities the protocol and given right determine exploitation. Using a keyboard, practical examples were able be provided. Because results garnered, it recommended that not used for any connections may transmit sensitive data, or with devices have access networks.
Web browsers store web surfing data and history to facilitate the users ease of operation such as instant website recommendations or quicker access previously visited sites. Since cyber-criminals suspects, in general, may use browser search for any number crime methods visit different websites collect information, this is a good source electronic evidence used lawsuits other related investigations. For reason, forensics an important field Digital Forensics. It crucial know about browsing...
Modern networking architecture is designed with high scalability in mind. Different protocols can be encapsulated to support different systems. Machine identifiers (IP and MAC addresses) network packets modified easily. This modification prevents servers from determining whether the connecting machines are allowed communicate. Cryptographic functions have been used such as Secure Shell (SSH) establish node authenticity, but they circumvented by social engineering brute force attacks....
As the use of mobile devices continues to increase, so does need for sophisticated malware detection algorithms. The preliminary research presented in this paper focuses on examining permission requests made by Android apps as a means detecting malware. By using machine learning algorithm, we are able differentiate between benign and malicious apps. model achieved classification accuracy 75% 80% our dataset best combination parameters. Future work will seek improve expanding training...
Classifying wine according to their grade, price, and region of origin is a multi-label multi-target problem in wine-informatics. Using reviews as the attributes, we compare several different multi-label/multitarget methods single-label method where each label treated independently. We explore both approaches for two-class labels four-class on two three labels, with third remaining problem. In terms per-label accuracy, has best performance, although some approach performance single-label....
Computer virtualization is not a new technology, it has become increasingly important because of the many advantages offers to businesses and individuals reduce costs, while introducing challenges field digital forensics. As continues be adopted by more companies every year, malware hacker attacks are going have an increasing effect on virtualized systems. Therefore, growth created need for generation computer forensic tools techniques analyze these compromised Because rapid virtualization,...
Industrial Control Systems (ICS) are present across many industries ranging from automotive to utilities. These systems have been found be connected corporate enterprise servers and can communicate over unencrypted communication channels. Interconnections of this type provide an attack vector for people with malicious intent therefore a critical cyber security risk. To better understand these risks possible measures, research presents as proof concept several attacks against programmable...
The advancement of modern day computing has led to an increase threats and intrusions.As a result, advanced security measurements threat analysis models are necessary detect these identify protective measures needed secure system.Attack graphs attack trees the most popular form modeling today.While both approaches represent possible steps followed by attacker, architecturally more rigorous than provide insights regarding scenarios.The goal this research is direction construct from analyzing...
Although wine has been produced for several thousands of years, the ancient beverage remained popular and even more affordable in modern times. Among all making regions, Bordeaux, France is probably one most prestigious areas history. Since hundreds wines are from Bordeaux each year, humans not likely to be able examine across multiple vintages define characteristics outstanding 21st century wines. Wineinformatics a newly proposed data science research with an application domain process...
In bug localisation a developer uses information about present in software system to locate the source code elements that must be modified correct bug. Researchers have developed static techniques using Information Retrieval such as Latent Semantic Indexing (LSI) model lexical from code. this paper we new technique, LSICG, combines LSI and call graphs structural information. A case study of 21 bugs Rhino demonstrates our technique provides improved performance compared alone.