An NSF Scholarships in STEM (S-STEM) program has provided scholarships for cohorts of undergraduate engineering students since 2009, giving specific attention to the National Academy of Engineering's ...vision for the engineer of 2020 (E2020). Four E2020 outcomes are emphasized in Iowa State's program: leadership, global awareness and understanding, systems thinking, and innovation and entrepreneurship. These outcomes, or pillars, are being integrated into curricular and co-curricular activities. The four pillar areas are introduced in a one-semester first-year seminar and reinforced in a two-semester second-year seminar. These seminars supplement the regular program of study for engineering students. In this paper, we describe the curriculum and its planned integration beyond the scholarship program. We present student feedback about their experience in the program. We also introduce relevant core competencies associated with the outcomes as judged by faculty and industry representatives.
The Community College Cyber Defense Competition (CCCDC) was created as a bridge between Iowa State University and the 15 community college districts in the state of Iowa. It grew out of an ...overwhelmingly positive response to a session on IT-Adventures conducted during the ISU Community College Summit in Summer 2007. IT-Adventures is a year-long inquiry-based learning program that uses educational materials, competitive events and service learning projects to increase high school students' interest in information technology. This paper discusses the creation and evolution of the CCCDC, the two successful CCCDCs that have been conducted, as well as lessons learned about working with community college students. Additionally, we discuss the benefits of IT-Adventures participation for the community colleges who have partnered with us such as increased enrollment and additional options for dual-enrollment high school programs. Future directions our dialogues with community colleges over the past two years are taking us are also briefly touched upon. In our second CCCDC competition in December of 2008 we had nine teams in attendance which represented seven out of the 15 community college districts or 50% participation.
There is tremendous pressure on financial services organizations to ensure the highest quality of data on which to base their risk and capital adequacy calculations. The widely used method to persist ...data is known as mono-temporally in which the database tracks the time of data insertion. This approach does not allow for subsequent data adjustments to be tracked, however. The BitemporalDB is a Bitemporal database that uses two time-dimensions to track data: database dimension and business dimension. Together, one is able to provide data lineage that is required for most financial audit purposes. In addition, as the volume and velocity of datapoints could vary greatly, the BitemporalDB schema allows for quick search that is able to find a desired data with only two lookups that span the entire dataset.
Information assurance is a growing field in the information technology world. While many individuals seek further education in this field, it is currently difficult to complete an entire program of ...study remotely. A capstone course at Iowa State University will enable distance education students to complete the requirements for a Master's of Engineering in Information Assurance from an accredited university without ever setting foot on a campus. This course will encompass all focal points of the degree and demonstrate a level of mastery sufficient for awarding of the degree (in accordance with other degree requirements). This course will consist of three parts: the planning & implementing phase, the defending & attacking phase, and the infrastructure assessing phase.
Research surrounding visualization for computer and network security has produced differing accepted methods for adequately developing security visualization products. The current work proposes a ...design methodology that melds the research of the three competing frameworks for security visualization development. In addition, a product that incorporates the proposed design methodology is developed, used, and evaluated. Findings show that users of the system believe the system has increased their effectiveness at performing network security tasks and are likely to use such a system in the future.
As the IT-Adventures program was being developed, we discovered teachers of all disciplines needed a way to improve their knowledge and skills in IT to facilitate student learning as part of their ...school's IT-Club. The IT-Adventures program is built around the formation of an IT-Club at a local high school where students are given learning materials and then conduct their own inquiry-based learning in three content areas: cyber defense, game design programming and robotics. An IT-Advisor, a teacher who sponsors each local high school IT-Club, helps students in exploring the learning materials and finding solutions to the challenges they are presented. The large, non-IT base of teachers who serve as IT-Advisors caused us to offer a free, for-credit class for those individuals working with the IT-Clubs. This paper is a report on the success of a pilot project of teacher educational programming conducted as part of the IT-Adventures' inaugural year (the 2007-2008 academic year). It covers how the IT-Adventures program works, the IT-Advisor role, the details of the teacher course and the lessons learned from the pilot project. It also briefly discusses how the teacher course has been modified through feedback and experience for the 2008-2009 academic year.
ARA Zhang, Hongwei; Guan, Yong; Kamal, Ahmed ...
Proceedings of the 15th ACM Workshop on Wireless Network Testbeds, Experimental evaluation & CHaracterization,
01/2022
Conference Proceeding
Odprti dostop
The rural US includes 72% of the nation's land and 46 million people, and it serves as major sources of food and energy for the nation. Thus rural prosperity is essential to US wellbeing. As a ...foundation for next-generation rural economy and communities, broadband connectivity is a key driver of rural prosperity. Yet 39% of the rural US lacks broadband access, and most agriculture (ag) farms are not connected at all. To address the rural broadband challenge, we will develop the ARA rural wireless living lab. ARA will not only serve as a first-of-its-kind, real-world wireless experimental infrastructure for smart and connected rural communities, it will also provide the living lab processes, activities, and organizations to engage the broad wireless and application communities in the research, education, innovation, and pilot of affordable, high-capacity rural broadband solutions. Through this visioning article, we illustrate the community, application, economic, and operational contexts of rural wireless, the design of ARA, ARA-enabled research, and how ARA is expected to make rural broadband as affordable as urban broadband today. This article is also a call-to-action for the broad wireless and application communities to participate in the ARA living lab activities and to join the ARA Consortium of public-private partners in shaping the future of advanced wireless, rural broadband, and rural communities in general.
Obligated by a utility pricing model, Internet-facing web resources hosted in the public cloud are vulnerable to Fraudulent Resource Consumption (FRC) attacks. Unlike an application-layer DDoS attack ...that consumes resources with the goal of disrupting short-term availability, an FRC attack is a considerably more subtle attack that instead seeks to disrupt the long-term financial viability of operating in the cloud by exploiting the utility pricing model over an extended time period. By fraudulently consuming web resources in sufficient volume (i.e. data transferred out of the cloud), an attacker (e.g. botnet) is able to incur significant fraudulent charges to the victim. This paper proposes an attribution methodology to identify malicious clients participating in an FRC attack. Experimental results demonstrate that the presented methodology achieves qualified success against challenging attack scenarios.
...if an attacker can access one computer, they can easily access other computers in the car. The engine control unit stores a copy of the wireless key code, and thieves can clone this to a blank key ...fob to use to start the victim’s car. ...all someone has to do is break the window, insert a USB connector and start the car.
TikTok CEO Shou Zi Chew testified before the House Energy and Commerce Committee on March 23, 2023, amid a chorus of calls from members of Congress for the federal government to ban the Chinese-owned ...video social media app and reports that the Biden administration is pushing for the company’s sale. There are a few items of interest in TikTok’s privacy policy besides the information you give them when you create an account – name, age, username, password, language, email, phone number, social media account information and profile image – that are concerning. The Chinese government also has access – along with anyone else with money – to the large market for personal data, which fuels calls for stronger data privacy rules.