Claude Turner

Claude Turner
  • Norfolk State University

About

31
Publications
17,501
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
480
Citations
Current institution
Norfolk State University

Publications

Publications (31)
Chapter
This article discusses enhancements to an existing visualization system for cyber defense competition, LUCID. The proposed enhancements provide a new interface that presents a more flexible way to visualize critical network services and attacks while offering commentary. LUCID provides audio-visual information on active security events in a cyberse...
Article
Full-text available
This work presents LUCID Network Monitoring and Visualization Application (LNMVA), a comprehensive visualization software application for cyber security visualization. The application consists of five component types: components for monitoring network traffic, components for reporting various network messages, data storage components plus a visuali...
Article
Full-text available
While many studies applying machine learning algorithms to signature based intrusion detection systems (IDSs) have focused on log analysis, another avenue that might have the potential to yield additional insight into the intrusion detection problem is analysis of the rules that lie at the heart of an IDS. A signature-based IDS is generally ineffec...
Article
Full-text available
While stock prices and economic activity are interrelated in a nation, they “are not coincident” with each other. Stock prices are a leading economic indicator of the United States of America’s (U.S.A.’s) economy. An economic variable that influences stock market prices is interest rates through an inverse relationship. The changes in stock prices...
Article
Full-text available
Since the time of Denning's² model for the intrusion detection system (IDS), the system that laid the basis for most modern IDSes, intrusion detection technologies have grown in both complexity and sophistication. Yet challenges related to accuracy, management, and the detection of new attacks abound. This work focuses on the management issue. Spec...
Article
Full-text available
This study investigates the stock returns of the Dow Jones Industrial Average (DJIA), Standard and Poor's (S&P) 500, and the National Association of Securities Dealers Automated Quotations (NASDAQ) to analyze and compare their properties and to determine their relative predictability. While it is commonly accepted that price per earnings ratio and...
Article
Network security visualization tool plays an important role in the network security filed. It's considered the first line of defense because it provides security analysts with visualized network information we need to either prevent or investigate an attack, an intrusion, an anomalous activity and much more. In this paper, we briefly describe the 1...
Article
Full-text available
One of the most widely used approaches for feature extraction in speaker recognition is the filter bank-based Mel Frequency Cepstral Coefficients (MFCC) approach. The main goal of feature extraction in this context is to extract features from raw speech that captures the unique characteristics of a particular individual. During the feature extracti...
Article
In this article, we discuss LUCID, a visualization and broadcast system targeted to improving a spectator's ability to understand and make sense of cyber defense competitions. The system aims to engage the spectator by presenting information pertinent to understanding the real-time events of the competition as they unfold. It accomplishes this thro...
Article
Full-text available
This paper analyzes out-of-sample forecasts of real total business sales. We study monthly data from January 1970 to June 2012. The predictor variable, 3-month Treasury bill interest rate, was used with both the regression (used as a benchmark) and neural network models. The neural network models’, trained in supervised learning with the Levenberg-...
Article
Full-text available
One of the challenges in implementing differential data privacy is that the utility (usefulness) of the privatized data set diminishes even as confidentiality is guaranteed. In such settings, due to excessive noise, original data suffers loss of statistical significance despite the fact that strong levels of data privacy is assured by differential...
Conference Paper
Full-text available
During the course of the data privacy process, data loses its utility – a quantity of how beneficial a privatized dataset is to the user of that dataset. Data privacy scholars have documented that achieving an ideal equilibrium between data privacy and utility is an intractable problem. In this study, we examine data privacy and utility preservatio...
Article
Full-text available
The study of homomorphic encryption techniques has led to significant advancements in the computing domain, particularly in the sphere of cloud computing. Homomorphic encryption provides a means for securely transmitting and storing confidential information across and in a computer system. The aim of this paper is to discuss the concepts and signif...
Conference Paper
Full-text available
The increasingly rapid use of mobile devices for data transaction around the world has consequently led to a new problem, and that is, how to engage in mobile data transactions while maintaining an acceptable level of data privacy and security. While most mobile devices engage in data transactions through a data cloud or a set of data servers, it i...
Article
Full-text available
During the data privacy process, the utility of datasets diminishes as sensitive information such as personal identifiable information (PII) is removed, transformed, or distorted to achieve confidentiality. The intractability of attaining an equilibrium between data privacy and utility needs is well documented, requiring trade-offs, and further com...
Article
Full-text available
The increasingly rapid use of mobile devices for data transaction around the world has consequently led to a new problem, and that is, how to engage in mobile data transactions while maintaining an acceptable level of data privacy and security. While most mobile devices engage in data transactions through a data cloud or a set of data servers, it i...
Article
Full-text available
It is obligatory that organizations by law safeguard the privacy of individuals when handling data sets containing personal identifiable information (PII). Nevertheless, during the process of data privatization, the utility or usefulness of the privatized data diminishes. Yet achieving the optimal balance between data privacy and utility needs has...
Conference Paper
Full-text available
It is obligatory that organizations by law safeguard the privacy of individuals when handling datasets containing personal identifiable information (PII). Nevertheless, during the process of data privatization, the utility or usefulness of the privatized data diminishes. Yet achieving the optimal balance between data privacy and utility needs has b...
Article
This paper presents the work done by the ACM ITiCSE, 2013 Conference Working Group (WG) on Cybersecurity, Women and Minorities: How to Succeed in the Career! The ITiCSE 2013 conference was held July 1-3, 2013, in Canterbury, United Kingdom. The overall goal of the WG was to conduct a preliminary investigation into the reasons behind the lack of wom...
Conference Paper
Full-text available
Public and private sector entities continuously produce, store, and transact in large amounts of data. However, combined with the growth of the internet, such datasets get stored and accessed on multiple devices, locations, and across the globe. Therefore, the necessity for autonomous agents that can learn across distributed systems to extract know...
Article
Full-text available
Many organizations transact in large amounts of data often containing personal identifiable information (PII) and various confidential data. Such organizations are bound by state, federal, and international laws to ensure that the confidentiality of both individuals and sensitive data is not compromised. However, during the privacy preserving proce...
Conference Paper
Full-text available
The growth of information technology (IT) in Africa has led to an increase in the utilization of communication networks for data transaction across that continent. Thus, many in Africa have become increasingly dependent on the Internet for data transactions. In the country of Uganda, for example, exponential growth in data transaction has presented...
Article
Full-text available
An important step in speaker recognition is extracting features from raw speech that captures the unique characteristics of each speaker. The most widely used method of obtaining these features is the filterbank-based Mel Frequency Cepstral Coefficients (MFCC) approach. Typically, an important step in the process is the employment of the discrete F...
Article
Full-text available
The purchasing managers’ index (PMI) is a simple subjective survey about the state of the manufacturing sector of the national economy. It's an early indicator of the nation's economic strength with effects extending into federal monetary policy and the financial markets. It is a composite index comprising the weighted average of new orders, produc...
Article
Full-text available
The growth of Information Technology(IT) in Africa has led to an increase in the utilization of communication networks for data transaction across the continent. A growing number of entities in the private sector, academia, and government, have deployed the Internet as a medium to transact in data, routinely posting statistical and non statistical...
Article
While many colleges offer specialized security courses and tracks for students in computing majors, there are few offerings in information security for the non-computing majors. Information security is becoming increasingly critical in many fields, yet most computer literacy courses insufficiently address the security challenges faced by our gradua...
Conference Paper
This article provides a brief review of steganography, steganalysis and wireless sensor networks (WSNs). It also presents a computational framework for steganography in WSN. The technique uses the concept of redundancy and distributed computing to add robustness to the steganographic embedding and extraction algorithms.
Article
The Maryland Alliance for Information Security Assurance (MAISA) is a consortium of 15 community colleges, colleges, and universities led by Towson University. By working collaboratively, we have been able to strengthen our information assurance education programs. We present our consortium, and describe some of our current projects and the effects...

Network

Cited By