See also: College of Engineering’s former Department of Computer Sciences & Cybersecurity (to 2016). In late April of 2016, the Department of Computer Sciences & Cybersecurity was reformed independent of the College of Engineering into its own School of Computing. It consists of three academic units (Computer Science, Cybersecurity and Data Sciences, and Computer Information Systems) and one research unit (the Harris Institute for Assured Information).

Collections in this community

Recent Submissions

  • Open Census for Addressing False Identity Attacks in Decentralized Social Networks 

    Qin, Song (2017-05)
    We address the problem of estimating the population of a given area (e.g., a city). Unlike a centralized census where identities are reported to a single principal agency (e.g., U.S. Census Bureau) and are stored on a ...
  • Digital Quorum Sensing for Self-Organizing Malware 

    Fioravanti, Mark Edward (2016-12)
    INTRODUCTION: Malware authors present an interesting problem for the security community as they evolve and adapt to overcome network and host defenses. The determined adversary is a special class of malware author who ...
  • Soteria: A Persuasive eSecurity Assistant 

    Bhardwaj, Punica (2016-12)
    “…security is only as good as the weakest link, and people are the weakest link in the chain.” – B Schneier, 2002 Humans are often referred to as the “weakest link” in the security chain because of the poor security ...
  • A Self-Organized Approach For Detecting Communities in Networks 

    Collingsworth, Bennett C (2016-12)
    The community structure of networks reveals hidden information about the whole network structure that cannot be discerned using other topological properties. Yet, the importance of identifying community structure in ...
  • Studies with Dynamic Nuclear Imaging Image Reconstruction Algorithm 

    Chang, Haoran (2016-12)
    Non-negative matrix factorization (NMF) is a useful method for those non-negative multivariate data. In nuclear imaging, NMF, which is also called factor analysis, is used to analyze the 4D image of positron emission ...
  • Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments 

    Alshehry, Badr (2016-12)
    Contemporary security systems attempt to provide protection against distributed denial-of-service (DDoS) attacks; however, they mostly use a variety of computing and hardware resources for load distribution and request ...
  • Robotic Arm Tracing Curves Recognized by Camera 

    Findling, Timothy Karl (2016-12)
    Applications such like soldering require robot arms to follow the soldering line as present on a surface. We assume here that the surface to be soldered is remote from the robotic arm, that the soldering is performed via ...