• Login
    Search 
    •   Scholarly Works @ SHSU Home
    • Faculty Research
    • Search
    •   Scholarly Works @ SHSU Home
    • Faculty Research
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-4 of 4

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Implications of Malicious 3D Printer Firmware 

    Moore, Samuel Bennett; Glisson, William Bradley; Yampolskiy, Mark (Proceedings of the 50th Hawaii International Conference on System Sciences, 2017-01)
    The utilization of 3D printing technology within the manufacturing process creates an environment that is potentially conducive to malicious activity. Previous research in 3D printing focused on attack vector identification ...
    Thumbnail

    Knock! Knock! Who is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack 

    Flynn, Talon; Grispos, George; Glisson, William Bradley; Mahoney, William (Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020-01)
    The amalgamation of Medical Internet of Things (MIoT) devices into everyday life is influencing the landscape of modern medicine. The implementation of these devices potentially alleviates the pressures and physical demands ...
    Thumbnail

    Web Engineering Security (WES) Methodology 

    Glisson, William Bradley; Welland, Ray (Communications of the Association for Information Systems, 2014)
    The impact of the World Wide Web on basic operational economical components in global information-rich civilizations is significant. The repercussions force organizations to provide justification for security from a ...
    Thumbnail

    Security, Privacy and Steganographic Analysis of FaceApp and TikTo 

    Krishnan, Sundar; Liu, Qingzhong; Neyaz, Ashar; Kumar, Avinash; Placker, Jessica (International Journal of Computer Science and Security, 2020)
    Smartphone applications (Apps) can be addictive for users due to their uniqueness, ease-of-use, trendiness, and growing popularity. The addition of Artificial Intelligence (AI) into their functionality has rapidly gained ...

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    TDL
    Theme by 
    Atmire NV
     

     

    Browse

    All of Scholarly Works @ SHSUCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsDepartmentThis CommunityBy Issue DateAuthorsTitlesSubjectsDepartment

    My Account

    LoginRegister

    Discover

    AuthorGlisson, William Bradley (3)Flynn, Talon (1)Grispos, George (1)Krishnan, Sundar (1)Kumar, Avinash (1)Liu, Qingzhong (1)Mahoney, William (1)Moore, Samuel Bennett (1)Neyaz, Ashar (1)Placker, Jessica (1)... View MoreSubject
    security (4)
    3D Printing (1)3D Printing Additive Manufacturing Security Malicious Firmware (1)case study (1)cybercrime (1)cybersecurity (1)faceapp (1)Firmware (1)forensics (1)hijacking (1)... View MoreDate Issued2020 (2)2014 (1)2017 (1)Has File(s)Yes (4)

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    TDL
    Theme by 
    Atmire NV