- Browse by Author
Browsing by Author "Nyemkova, Elena"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Methods of Current Knowledge Teaching on the Cybersecurity Example(MDPI, 2022-10-22) Nyemkova, Elena; Justice, Connie; Liaskovska, Solomiia; Lakh, Yuriy; Computer Information and Graphics Technology, Purdue School of Engineering and TechnologyTeaching of modern cybersecurity specialists should be up to date and use the newest methods and methodologies in universities as the IT industry is rapidly growing and constantly changing. A good idea is to use methods of management in IT companies as methods for current knowledge teaching of university students. It is also worth engaging students not only in educational international projects but the research projects as well. This work analyzes the method for teaching students, and the Scrum methodology was selected and implemented for educational and research projects. Students participated in both projects, however, Scrum models should be different for them and this is illustrated in the paper. The visualization of collected statistical data of the performed educational project illustrated distributions of students by specialization and by marks. The distributions by marks showed that using the Scrum model for the teaching course significantly increases the marks compared with the average level marks of the students in their specializations.Item Simulation of Authentication in Information-Processing Electronic Devices Based on Poisson Pulse Sequence Generators(MDPI, 2022) Maksymovych, Volodymyr; Nyemkova, Elena; Justice, Connie; Shabatura, Mariia; Harasymchuk, Oleh; Lakh, Yuriy; Rusynko, Morika; Electrical and Computer Engineering, Purdue School of Engineering and TechnologyPoisson pulse sequence generators are quite well studied, have good statistical properties, are implemented both in software and hardware, but have not yet been used for the purpose of authentication. The work was devoted to modeling authenticators of information-processing electronic devices by creating a bit template simulator based on a Poisson pulse sequence generator (PPSG). The generated templates imitated an important property of real bit templates, which reflected the physical uniqueness of electronic devices, namely Hamming distances between arbitrary template pairs for the same device were much smaller than the distance between arbitrary template pairs for two different devices. The limits of the control code values were determined by setting the range of the average frequency values of the output pulse sequence with the Poisson distribution law. The specified parameters of the output pulse sequence were obtained due to the optimization of the parameters of the PPSG structural elements. A combination of pseudo-random sequences with the control code’s different values formed the bit template. The comparison of the Hamming distance between the standard and real-time templates with a given threshold value was used as a validation mechanism. The simulation experiment results confirmed the unambiguous authentication of devices. The simulation results also showed similarities with the real data obtained for the bit templates of personal computers’ own noise. The proposed model could be used for improving the cybersecurity of a corporate network as an additional factor in the authentication of information-processing electronic devices for which the measurement of noise with the required accuracy is not possible or significantly difficult.