Scholarly Works @ SHSU is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

  • Implications of Malicious 3D Printer Firmware 

    Moore, Samuel Bennett; Glisson, William Bradley; Yampolskiy, Mark (Proceedings of the 50th Hawaii International Conference on System Sciences, 2017-01)
    The utilization of 3D printing technology within the manufacturing process creates an environment that is potentially conducive to malicious activity. Previous research in 3D printing focused on attack vector identification ...
  • Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices 

    Luckett, Patrick; McDonald, J. Todd; Glisson, William Bradley (Proceedings of the 50th Hawaii International Conference on System Sciences, 2017-01)
    The continued integration of technology into all aspects of society stresses the need to identify and understand the risk associated with assimilating new technologies. This necessity is heightened when technology is used ...
  • Exploitation and Detection of a Malicious Mobile Application 

    Nguyen, Thanh; McDonald, J. Todd; Glisson, William Bradley (Proceedings of the 50th Hawaii International Conference on System Sciences, 2017-01)
    Mobile devices are increasingly being embraced by both organizations and individuals in today’s society. Specifically, Android devices have been the prominent mobile device OS for several years. This continued amalgamation ...
  • Investigating 3D Printer Residual Data 

    Miller, Daniel Bradford; Gatlin, Jacob; Glisson, William Bradley; Yampolskiy, Mark; McDonald, Jeffery Todd (Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019-01)
    The continued adoption of Additive Manufacturing (AM) technologies is raising concerns in the security, forensics, and intelligence gathering communities. These concerns range from identifying and mitigating compromised ...
  • How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations 

    Grispos, George; Glisson, William Bradley; Storer, Tim (Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019-01)
    An increasing number of cybersecurity incidents prompts organizations to explore alternative security solutions, such as threat intelligence programs. For such programs to succeed, data needs to be collected, validated, ...

View more