Browsing by Subject "cybersecurity"
Now showing items 1-6 of 6
-
Comparative Analysis of Interface Usability for Cybersecurity Applications
(North Dakota State University, 2021)In cybersecurity, understanding the technologies and the best ways to interface with them is paramount for staying ahead of growing cyberthreats. Developers of cybersecurity software will benefit greatly from a greater ... -
The Design of Virtual Reality Based Data Visualization and User Interface Design in a Semi-Automated Cyber-Security Research Application
(North Dakota State University, 2019)Virtual Reality is currently an affordable and consumer ready technology used by many in the games and interactive media industry, however unlike the user interface standards in mobile, PCs, and Macs, VR UI design can vary ... -
Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices
(North Dakota State University, 2019)There are a variety of communication mediums or devices for interaction. Users hop from one medium to another frequently. Though the increase in the number of devices brings convenience, it also raises security concerns. ... -
Increasing the Predictive Potential of Machine Learning Models for Enhancing Cybersecurity
(North Dakota State University, 2021)Networks have an increasing influence on our modern life, making Cybersecurity an important field of research. Cybersecurity techniques mainly focus on antivirus software, firewalls and intrusion detection systems (IDSs), ... -
Perspectives on Securing the Multimodal Transportation System
(2022)The vast, open, and interconnected characteristics of the transportation system make it a prime target for terrorists and hackers. However, there are no standard measures of transport system vulnerability to physical or ... -
Zero-Trust Architecture and Its Cost-Effectiveness on Network Security
(North Dakota State University, 2022)Zero-Trust Architecture (ZTA) is a ‘Never Trust, Always Verify’ concept to improve cybersecurity by eliminating trust and validating network requests continuously. ZTA replaces Virtual Private Networks (VPNs) and provides ...