21,119 research outputs found

    New Hampshire University Research and Industry Plan: A Roadmap for Collaboration and Innovation

    Get PDF
    This University Research and Industry plan for New Hampshire is focused on accelerating innovation-led development in the state by partnering academia’s strengths with the state’s substantial base of existing and emerging advanced industries. These advanced industries are defined by their deep investment and connections to research and development and the high-quality jobs they generate across production, new product development and administrative positions involving skills in science, technology, engineering and math (STEM)

    Materials supplement to EE fellowship

    Get PDF
    Issued as Final report, Project no. E-21-540 (subproject E-21-551

    DEVELOPMENT OF A DIGITAL FORENSICS LAB TO SUPPORT ACTIVE LEARNING

    Get PDF
    The curriculum of a program in Information technology must be current and competitive to remain relevant and valuable. The authors of this paper explored the research related to the rationale to supplement higher education theoretical knowledge of digital forensics with opportunities for students in technology related programs to gains some hands-on experience. The paper also used the widely accepted learning theories of active learning and constructivism to assist in the decision to build a hands-on digital forensics lab environment. An explanation of the processes, opportunities, challenges, and outcomes are available in the Lab design section. Finally the paper concludes with implications for students and recommendations for other higher education institutions that are considering enhancing theory with practical hands-on learning opportunities

    Internet Predictions

    Get PDF
    More than a dozen leading experts give their opinions on where the Internet is headed and where it will be in the next decade in terms of technology, policy, and applications. They cover topics ranging from the Internet of Things to climate change to the digital storage of the future. A summary of the articles is available in the Web extras section

    The Internet of Things Will Thrive by 2025

    Get PDF
    This report is the latest research report in a sustained effort throughout 2014 by the Pew Research Center Internet Project to mark the 25th anniversary of the creation of the World Wide Web by Sir Tim Berners-LeeThis current report is an analysis of opinions about the likely expansion of the Internet of Things (sometimes called the Cloud of Things), a catchall phrase for the array of devices, appliances, vehicles, wearable material, and sensor-laden parts of the environment that connect to each other and feed data back and forth. It covers the over 1,600 responses that were offered specifically about our question about where the Internet of Things would stand by the year 2025. The report is the next in a series of eight Pew Research and Elon University analyses to be issued this year in which experts will share their expectations about the future of such things as privacy, cybersecurity, and net neutrality. It includes some of the best and most provocative of the predictions survey respondents made when specifically asked to share their views about the evolution of embedded and wearable computing and the Internet of Things

    Delivering Computer-Based Training Within State Prisons

    Get PDF
    Internet-connected devices are ubiquitous, and our built environment allows us to tap into formerly impossible solutions. As our world increasingly depends on technology to operate, one demographic cannot gain exposure to internet-connected devices or web-based educational programs: incarcerated individuals. The Department of Justice reports that 5 out of 6 State Prisoners are arrested and returned to prison within nine years of their initial release. Research shows that education is a pathway to reducing the U.S. prison population. Individuals who participated in any educational program are 43 percent less likely to return to prison.1 Prisons in the United States often partner with local organizations to provide job training and certification to incarcerated individuals, but few offer technical-vocational skills. Many programs rely exclusively on a partnership with a local college or lack the knowledge base to teach computer networking. By utilizing Docker containers to provide secure and isolated computerbased training, currently incarcerated individuals can increase their education beyond teacher-led classroom instruction. Providing computer access in prison presents significant security and accessibility challenges. The NIST Risk Management Framework implements proven cyber security access frameworks that help prevent unauthorized use. This study shows that combining robust cyber security frameworks with isolated Docker containers running the ToyNet learning suite helps break the cycle of recidivism among individuals incarcerated across the United States

    A Conversation With Harry Martz

    Full text link
    Harry F. Martz was born June 16, 1942 and grew up in Cumberland, Maryland. He received a Bachelor of Science degree in mathematics (with a minor in physics) from Frostburg State University in 1964, and earned a Ph.D. in statistics at Virginia Polytechnic Institute and State University in 1968. He started his statistics career at Texas Tech University's Department of Industrial Engineering and Statistics right after graduation. In 1978, he joined the technical staff at Los Alamos National Laboratory (LANL) in Los Alamos, New Mexico after first working as Full Professor in the Department of Industrial Engineering at Utah State University in the fall of 1977. He has had a prolific 23-year career with the statistics group at LANL; over the course of his career, Martz has published over 80 research papers in books and refereed journals, one book (with co-author Ray Waller), and has four patents associated with his work at LANL. He is a fellow of the American Statistical Association and has received numerous awards, including the Technometrics Frank Wilcoxon Prize for Best Applications Paper (1996), Los Alamos National Laboratory Achievement Award (1998), R&D 100 Award by R&D Magazine (2003), Council for Chemical Research Collaboration Success Award (2004), and Los Alamos National Laboratory's Distinguished Licensing Award (2004). Since retiring as a Technical Staff member at LANL in 2001, he has worked as a LANL Laboratory Associate.Comment: Published at http://dx.doi.org/10.1214/088342306000000646 in the Statistical Science (http://www.imstat.org/sts/) by the Institute of Mathematical Statistics (http://www.imstat.org

    A Flexible Laboratory Environment Supporting Honeypot Deployment for Teaching Real-World Cybersecurity Skills

    Get PDF
    In the practical study of cybersecurity, students benefit greatly from having full control of physical equipment and services. However, this presents far too great a risk to security to be permitted on university campus networks. This paper describes an approach, used successfully at Northumbria University, in which students have control of an off-campus network laboratory, with a dedicated connection to the Internet. The laboratory is flexible enough to allow the teaching of general purpose networking and operating systems courses, while also supporting the teaching of cybersecurity through the safe integration of honeypot devices. In addition, the paper gives an analysis of honeypot architectures and presents two in detail. One of these offers students the opportunity to study cybersecurity attacks and defences at very low cost. It has been developed as a stand-alone device that also can be integrated safely into the laboratory environment for the study of more complex scenarios. The main contributions of this paper are the design and implementation of: an off-campus, physical network laboratory; a small, low-cost, configurable platform for use as a “lightweight” honeypot; and a laboratory-based, multi-user honeypot for large-scale, concurrent, cybersecurity experiments. The paper outlines how the laboratory environment has been successfully deployed within a university setting to support the teaching and learning of cybersecurity. It highlights the type of experiments and projects that have been supported and can be supported in the future

    Ready or Not? Protecting the Public's Health in the Age of Bioterrorism, 2004

    Get PDF
    Examines ten key indicators to evaluate state preparedness to respond to bioterrorist attacks and other public health emergencies. Evaluates the federal government's role and performance, and offers recommendations for improving readiness
    • …
    corecore