News
Research question – Does fingerprint images classified based on the Henry system of fingerprint classification have statistically significant difference in the amount of entropy? This is a follow on ...
Calling contexts are very important for a wide range of applications such as intrusion detection, event logging, profiling, and debugging. Most applications perform expensive stack walking to recover ...
Phishing remains a critical cyber threat, with traditional ML-based detection models relying on grammatical errors and word anomalies as key indicators. However, LLM-generated phishing emails are well ...
Rehosting is the process of porting a physical device to run in software. By rehosting operational technology (OT) devices, we are able to perform cyber analysis on critical infrastructure to protect ...
Significant advancements in traffic control systems, such as integration with sensing and communication technologies, have led to increased system complexity. While these developments offer ...
'Pedohunters' pose as children online to catch adults soliciting minors. They often upload confrontation videos with those solicitors. Research shows mixed public reactions to pedohunter content.
This research focuses on the development and testing of autopilot systems for lightweight fixed-wing Unmanned Aerial Vehicles (UAVs) within a controlled environment, utilizing the Purdue UAS Research ...
The rapid proliferation of online discourse, particularly within social networks, has increased the spread of information at unprecedented rates. Although viral content often captures public attention ...
Interdependent systems, under the management of multiple decision-makers, confront rapidly growing cybersecurity threats. This paper delves into the realm of security decision-making within these ...
Intent based networking (IBN) is a high-level network configuration concept that allows network operators to use high-level intents instead of complex low-level details. We found there are ...
There is growing concern about image privacy due to the popularity of social media and photo devices, along with increasing use of face recognition systems. However, established image ...
Courtney Falk ([email protected]), Alyssa Pletcher ([email protected]), Zachary Kirkeby ([email protected]), Aiden Tian ([email protected]) Abstract This project investigates cascading risks in ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results