13 research outputs found

    The Infosyst TIMES, Vol. 3, No. 2

    Get PDF
    SCSU Impresses at Inaugural Student360 Conference TERP 10 ERP Integration of Business IS Graduates get OPT Extension Meet the Faculty: Dr. Jim Chen, Dr. Paul Safonov, Dr. Jianxun Li Meet the IS Club President, Kehinde Sodunke Shoveling the Snow, Shivendran Tiruchanpalli Application Design, Terry Kisner Alumnus Insight, Hareesh Reddy My Journey, Jayakrishnan Karunanidhi NSF STEM Scholarship, Kayla Jensen Information Systems Role in Sustainability: Why is this important? Student Research Colloquium ABET Accreditation ITS Club + IA Club = CSIA Club Uncovering Fraud Triangle SCSU and Maverick Partnership Recognize Five Years of Success CSIA Competes in Cyber Defense Competition CSIA Club Works on Technical Skill

    The Infosys TIMES, Vol. 5, No. 3

    Get PDF
    Chukwuemeka C. Monwuba wins Robert E. Applebaum Scholarship worth $12,000! Professor Lynn Collen accepts the position as the Chair of the IS Department Farewell to Professor Susantha Herath IS and IA students attend Student 360 conference at 3M MSIA Student Orientation Spring 2019 UnitedHealth Group (UGH) Networking Event Academic Success and Life at SCS

    Probabilistic Models for Anomaly Detection Based on Usage of Network Traffic

    Get PDF
    Recent advances in intrusions and attacks reflect vulnerabilities in computer networks. Innovative methods and tools can help attack defenses, prevent attack propagations, detect and respond to such attacks in a timely manner. Intrusion detection and prevention systems search for unauthorized use, recognize anomalous behavior, and prevent attempts to deny services.  These systems gather and analyze information from the network, identify possible breaches of the security profile, as well as misuses. We have been experimenting with methods for introducing important concepts related to intrusion detection and improving undergraduate research experiences and education. To achieve this goal, probabilistic models are introduced to students in computer, information system and network security courses. This article presents a set of probabilistic methods and statistical models for network traffic anomaly detection. It also describes some prospects and how models have ripened from theories to big data analysis applications. Keywords: Intrusion, conditional probability, network system, regression, data analysi

    Tool to Detect Spam Websites

    Get PDF
    Traveling is about relaxing and not worrying about being scammed and losing money. The Internet is a wide place that is changing every day. Having a guide to navigate unknown places goes a long way to staying safe. In this paper, I have used several identifiers and provided analysis on the effectiveness of these identifiers. Travel Website fraud is a severe problem which is widespread around the world. Studies of travel scams are mainly focused on finding different ways that attacker’s targets on the innocent travelers. Now the technology is advanced and that is causing newer and newer techniques to scam people. By illustrating the techniques to find such frauds and to prevent people from getting scammed is something this paper is trying to achieve. In this paper we will look at the various problems and preventive measures that need to be taken while browsing the internet. In this paper I will be talking about the tools I have used for analyzing a website. I will also be providing the analysis of the different identifiers in finding out if a website is fake or genuine. The results and the conclusions from the analysis can then be used in designing a safe tool which can be used for keeping the internet users safer and wiser. The safe rules can be used to develop browser addons, computer applications etc

    An active learning environment for intermediate computer architecture courses

    No full text
    Most computer science, information systems and engineering programs have two or more computer architecture courses but lack suitable active learning and design experience in the classroom. Computer architecture at the intermediate level should focus on the implementation of basic programming constructs in different instruction set architectures. To accommodate such features we developed an undergraduate computer architecture course with hands-on classroom activities, laboratories and web based assignments. To assess the course we distributed the course modules among 200 computer architecture instructors. This paper describes our experience in developing active learning course modules. 1

    E-Collaboration issues in global trade, transactions, and practices

    No full text
    E-collaboration goes beyond ordinary buying and selling activities. It includes information sharing and integration, decision-making, as well as process and resource allocation among people and organizations via the Internet, e-mail, web, video, and wireless devices to achieve optimal productivity and high performance. It promotes international commerce, expands trade, and facilitates financial transactions through electronic media. Even though paper transactions are now a thing of the past, most legal documents, attestations, and affidavits are still done in paper form. This paper summarizes issues involved in e-collaboration with regard to trade such as time, currency, e-transactions, tracking, security, fault tolerance, and process models. Finding effective solutions for these problems as well as identifying opportunities and challenges provides a pivotal task in facilitating, promoting, and expanding international and local trade as this summary entails. © EuroJournals Publishing, Inc. 2009
    corecore