Search For:

Displaying 1-10 out of 10 total
The Insecurity of Cloud Utility Models
Found in: IT Professional
By Joseph Idziorek,Mark F. Tannian,Doug Jacobson
Issue Date:March 2013
pp. 22-27
Cloud-based services are vulnerable to attacks that seek to exploit the pay-as-you-go pricing model. A botnet could perform fraudulent resource consumption (FRC) by consuming the bandwidth of Web-based services, thereby increasing the cloud consumer's fina...
Security across the curriculum and beyond
Found in: 2012 IEEE Frontiers in Education Conference (FIE)
By Joseph Idziorek,Julie Rursch,Doug Jacobson
Issue Date:October 2012
pp. 1-6
Society's dependency on information technology has drastically outpaced educational curricula and the opportunities that universities and higher education institutes provide to students from both technical (e.g., computer engineering, computer science) and...
Workshop: Teaching computer security literacy to the masses: A practical approach
Found in: 2012 IEEE Frontiers in Education Conference (FIE)
By Doug Jacobson,Julie Rursch,Joseph Idziorek
Issue Date:October 2012
pp. 1-2
We are losing the battle in cyber security. We heavily rely on technology as the main defense, instead of recognizing that the easiest attack vectors are the people who operate the computers. The general public does not understand the decisions they make e...
Attribution of Fraudulent Resource Consumption in the Cloud
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Joseph Idziorek,Mark Tannian,Doug Jacobson
Issue Date:June 2012
pp. 99-106
Obligated by a utility pricing model, Internet-facing web resources hosted in the public cloud are vulnerable to Fraudulent Resource Consumption (FRC) attacks. Unlike an application-layer DDoS attack that consumes resources with the goal of disrupting shor...
Workshop - using Cyber Defense Competitions (CDCs) to engage and recruit students with IT: how to organize and run your own cyber defense competition
Found in: Frontiers in Education, Annual
By Doug Jacobson,Julie A. Rursch
Issue Date:October 2009
pp. 1-2
Cyber defense competitions (CDCs) can be used to engage students with information technology and recruit them into a field of study. Iowa State University has hosted over 15 CDCs for varying age levels of students ranging from high schools and community co...
Security and performance analysis of a secure clustering protocol for sensor networks
Found in: Network Computing and Applications, IEEE International Symposium on
By Pubali Banerjee, Doug Jacobson, Soumendra Nath Lahiri
Issue Date:July 2007
pp. 145-152
Clustering protocols are often used in sensor networks. In many deployment scenarios, security is a key concern. In this paper we provide a secure solution to a commonly used clustering protocol, the LEACH protocol. We show that our protocol, the GS-LEACH ...
Engineer of 2020 outcomes and the student experience
Found in: 2013 IEEE Frontiers in Education Conference (FIE)
By Diane Rover,Steve Mickelson,Beth Hartmann,Chris Rehmann,Doug Jacobson,Amy Kaleita,Mack Shelley,Andrew Ryder,Mark Laingen,Monica Bruning
Issue Date:October 2013
pp. 140-146
An NSF Scholarships in STEM (S-STEM) program has provided scholarships for cohorts of undergraduate engineering students since 2009, giving specific attention to the National Academy of Engineering's vision for the engineer of 2020 (E2020). Four E2020 outc...
When a testbed does more than testing: The Internet-Scale Event Attack and Generation Environment (ISEAGE) - providing learning and synthesizing experiences for cyber security students.
Found in: 2013 IEEE Frontiers in Education Conference (FIE)
By Julie A. Rursch,Doug Jacobson
Issue Date:October 2013
pp. 1267-1272
The importance of laboratory exercises for students is recognized unilaterally by engineering and technology programs. As engineering educators whose academic focus is information assurance and cyber security, we believe students in cyber security need the...
This IS child's play Creating a “playground” (computer network testbed) for high school students to learn, practice, and compete in cyber defense competitions
Found in: 2013 IEEE Frontiers in Education Conference (FIE)
By Julie A. Rursch,Doug Jacobson
Issue Date:October 2013
pp. 1776-1778
The IT-Adventures program is designed to increase high school students' interest in information technology (IT) as a career. It allows them to learn about IT in non-threatening, extracurricular IT-Club activities using inquiry-based learning. The IT-Clubs ...
Bounding delay on a multifarious token ring network
Found in: Communications of the ACM
By A. V. Pohm, Doug Jacobson, S. S. Gaitonde
Issue Date:January 1988
pp. 20-28
Interest in integrating voice and data on local computer networks has been building in recent years. Subsequently, much research has been devoted to various techniques that are implementable on existing networks using current standards. This exposition dis...