EAGER

group_project

Visible to the public EAGER: Computational Models, Topological Games, and Classical Information

Modern computer systems are too complex to be analyzed directly, and often mathematical models are employed to analyze such computer systems to understand how well they function and whether they operate correctly. The area of computational models is devoted to constructing such models, and to their application to solve problems in computing, such as specifying computational devices designed to solve specific problems.

group_project

Visible to the public EAGER: Poll Workers and Election Security

On Election Day, poll workers must operate a complex system composed of people, processes, and technology. Even minor mistakes in the operation of the system can lead to security failures, which could in turn lead to the wrong candidates being selected. However, pollworkers are generally not technically astute, receive minimal training, are not attuned to systems and security issues, and are prone to making security mistakes that endanger elections, especially towards the end of the day due to worker fatigue.

group_project

Visible to the public EAGER: Collaborative: Winning the Internet Lottery: Growing Income Inequality, Social Class, and Susceptibility to Cybercrime

As the digital divide closes and more groups have access to the Internet, cybersafety is an increasingly relevant issue. With the connectivity provided by the Internet comes an inherent interdependency between devices connected to the Internet. Compromised devices are used in various forms of cybercrime (e.g., spam campaigns) that can affect the Internet as a whole. Thus, to increase cybersecurity, it is important to understand the ways and extent to which certain groups may be more susceptible to Internet crime.

group_project

Visible to the public EAGER: Collaborative: A Multi-Disciplinary Framework for Modeling Spatial, Temporal and Social Dynamics of Cyber Criminals

This project designs and deploys a multi-disciplinary framework to model spatial, temporal and social dynamics of cyber criminals. The framework fuses theories in both computer science and criminology. Specifically, project objectives are a) Apply and validate existing theories in the realm of general criminology (in particular Akers?

group_project

Visible to the public EAGER: Collaborative: Winning the Internet Lottery: Growing Income Inequality, Social Class, and Susceptibility to Cybercrime

As the digital divide closes and more groups have access to the Internet, cybersafety is an increasingly relevant issue. With the connectivity provided by the Internet comes an inherent interdependency between devices connected to the Internet. Compromised devices are used in various forms of cybercrime (e.g., spam campaigns) that can affect the Internet as a whole. Thus, to increase cybersecurity, it is important to understand the ways and extent to which certain groups may be more susceptible to Internet crime.

group_project

Visible to the public EAGER: Designing Individualized Privacy and Security Systems

This project explores the extent to which personality traits predict privacy and security behaviors. Over the past decade, computer privacy and security have improved by leaps and bounds by considering human factors in the design process. However, previous work to improve the usability of privacy and security systems has only examined the behaviors of "average users," which is believed to only yield local maxima because no individual perfectly fits this profile.

group_project

Visible to the public EAGER: Designing Individualized Privacy and Security Systems

This project explores the extent to which personality traits predict privacy and security behaviors. Over the past decade, computer privacy and security have improved by leaps and bounds by considering human factors in the design process. However, previous work to improve the usability of privacy and security systems has only examined the behaviors of "average users," which is believed to only yield local maxima because no individual perfectly fits this profile.

group_project

Visible to the public EAGER: Collaborative: A Multi-Disciplinary Framework for Modeling Spatial, Temporal and Social Dynamics of Cyber Criminals

This project designs and deploys a multi-disciplinary framework to model spatial, temporal and social dynamics of cyber criminals. The framework fuses theories in both computer science and criminology. Specifically, project objectives are a) Apply and validate existing theories in the realm of general criminology (in particular Akers?

group_project

Visible to the public EAGER: Collaborative: A Multi-Disciplinary Framework for Modeling Spatial, Temporal and Social Dynamics of Cyber Criminals

This project designs and deploys a multi-disciplinary framework to model spatial, temporal and social dynamics of cyber criminals. The framework fuses theories in both computer science and criminology. Specifically, project objectives are a) Apply and validate existing theories in the realm of general criminology (in particular Akers?

group_project

Visible to the public EAGER: Novel Imaging Approaches for the Detection of Counterfeit ICs

Typically, an electronic component goes through process of design, fabrication, assembly, distribution, usage in the system, and finally end of life. Obsolete integrated circuits (ICs) are commonly targeted by counterfeiters through recycling, remarking, and cloning. If counterfeit components end up in critical applications such as defense, aerospace, automotive, or medical systems, the results could be catastrophic.