Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jessie Walker is active.

Publication


Featured researches published by Jessie Walker.


international conference on big data | 2014

A layer based architecture for provenance in big data

Ashiq Imran; Rajeev Agrawal; Jessie Walker; Anthony Gomes

Big data is a new technology wave that makes the world awash in data. Various organizations accumulate data that are difficult to exploit. Government databases, social media, healthcare databases etc. are the examples of that big data. Big data covers absorbing and analyzing huge amount of data that may have originated or processed outside of the organization. Data provenance can be defined as origin and process of data. It carries significant information of a system. It can be useful for debugging, auditing, measuring performance and trust in data. Data provenance in big data is relatively unexplored topic. It is necessary to appropriately track the creation and collection process of the data to provide context and reproducibility. This poster tries to address the challenges of capturing provenance data. Additionally, we propose an intuitive layer based architecture of provenance in big data that can handle the challenges.


ieee international conference on technologies for homeland security | 2010

Cyber security for emergency management

Jessie Walker; Byron J. Williams; Gordon W. Skelton

Cyber security continues to be an increasingly important topic when considering Homeland Security issues. This area however is often overlooked during a disaster or emergency situation. Emergency management within the US as it currently stands lacks any real cyber situational awareness with respect to the core activities of emergency management such as mitigation, preparedness, response and recovery. As a result critical cyberinfrastructure resources that emergency management personnel rely on is left on the sideline when planning, handling, and recovering from emergencies or natural disasters. As emergency management evolves within the US to handle dynamic man-made, and natural disasters such as terrorist attacks, hurricanes, and floods, these issues must be addressed to mitigate risks. This paper takes the first step in examining the issue of cyber situational awareness within emergency management and identifies several concerns for the emergency management community.


ieee international conference on technologies for homeland security | 2011

Visualization, modeling and predictive analysis of cyber security attacks against cyber infrastructure-oriented systems

Jessie Walker; Travis Jones; Roy Blount

Cyber security threats require rapid identification of imminent or potential attacks to support deterrence and protection. Thomas Friedman theorized that technology has leveled or “flattened” the global playing field that once existed. This flattening has happened as a result of what he calls the “triple convergence” of platform, process and people. However, there is a general lack of understanding about how to describe, assess the complex and dynamic nature of cyber security related information to improve overall cyber security task performance. Ever since the first computer virus traversed the Internet it has been apparent that attacks can spread rapidly across national boundaries. This paper presents research that utilize bioinformatics techniques, to forecast cyber security attacks by identifying emerging threats based on analysis of computer infection, and incursions models based on human disease models.


management of emergent digital ecosystems | 2015

Cloud forensics challenges from a service model standpoint: IaaS, PaaS and SaaS

David Freet; Rajeev Agrawal; Sherin John; Jessie Walker

Cloud computing is a promising and expanding technology which could replace traditional IT systems. Cloud computing resembles a giant pool of resources which contains hardware, software and related applications, which can be accessed through web-based services on a pay-per-usage model. The main features of the cloud model are accessibility, availability and scalability, and it can be subdivided into three service models: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Cloud computing continues to transform how security challenges are addressed in closed and private networks. Given the advanced functionality offered by cloud computing, network monitoring and digital forensics efforts are potentially detectable and service-interruptive, which significantly impacts the effectiveness and thoroughness of digital forensic methods. This paper presents a general view of cloud computing, which aims to highlight the security issues and vulnerabilities associated with cloud service models. The technology is mainly based on virtualization, where data is always volatile and typically stored in a de-centralized architecture located across various countries and regions. This presents forensics investigators with legal challenges, due to the nature of multi-tenancy and distributed shared resources. This paper examines the three cloud service models and discusses the security challenges and issues involved with each service model along with potential solutions for each.


ieee international conference on technologies for homeland security | 2015

Scenario-based design for a cloud forensics portal

Curtis Jackson; Rajeev Agrawal; Jessie Walker; William I. Grosky

Cloud computing continues to transform how we address security challenges in closed and private networks. Given the advanced functionality offered by cloud computing, network monitoring and digital forensics efforts are potentially detectable and service interruptive which affects the effectiveness and thoroughness of digital forensic methods. Virtualization, the cost-effective delivery platform for clouds and data centers, provides an opportunity for Virtual Machine Introspection (VMI) through the hypervisor. VMI would be an environment to monitor the activity of a Virtual Machine (VM). In this paper, we propose a multi-phase scenario-based design concept within an open source virtualized environment to collect data to validate the hypervisors ability to provide a portal for threat monitoring that is effective, undetectable, and non-interruptive.


ieee international conference on technologies for homeland security | 2012

Plan recognition in intrusion detection systems using logic programming

Sandeep Chintabathina; Jorge Villacis; Jessie Walker; Hugo R. Gomez

In this paper we focus on logic programming based approach to plan recognition in intrusion detection systems. The goal of an intruder is to attack a computer or a network system for malicious reasons and the goal of the intrusion detection system is to detect the actions of the intruder and warn the network administrator of an impending attack. We show how an intrusion detection system can recognize the plans of the intruder by modeling the domain as a logic program and then reducing the plan recognition problem to computing models of the logic program. This methodology has been used widely for several planning problems and fits very naturally for plan recognition problems. We give an example scenario and show how to model it. Our results are quite satisfactory and we believe that our approach can lead to a generalized solution to plan recognition.


southeastcon | 2016

Open source cloud management platforms and hypervisor technologies: A review and comparison

David Freet; Rajeev Agrawal; Jessie Walker; Youakim Badr

Cloud computing continues to redefine the way in which organizations utilize information technology by providing increased flexibility, reduced cost of ownership and maintenance, massive scalability, and on-demand/pay-as-you-go services. Virtual and cloud technology replaces traditional IT products with services that can be purchased as-needed without the overhead of dedicated IT resources and staff. Public and private clouds are deployed using many different software platforms such as Eucalyptus, Xen, OpenStack, CloudStack and Amazon Web Services. This paper compares many popular cloud deployment platforms and related hypervisor technologies for implementing effective cloud-based computing services.


Archive | 2016

Historically black colleges and university libraries’ utilization of Twitter for patron engagement: an exploratory study

Brenton Stewart; Jessie Walker

African American millennials form the largest demographic of Twitter users. Historically Black College and University (HBCU) libraries have incorporated the micro-blogging service Twitter into their information services as a strategy to market and inform library users. However, there is little in the literature on assessment; do we know if users are interacting with libraries via social media? This study examined followers of HBCU libraries, and measures their engagement with library-generated content on Twitter. This study utilizes social analytics techniques, specifically propagation and sentiment analysis to measure the state of engagement among library Twitter followers, within a one-year period. Dispute an active presence on Twitter; libraries in this investigation had a relativity small footprint in the Twitter universe. Results indicate little engagement with followers and neutral emotional responses to library-generated tweets.


cyber-enabled distributed computing and knowledge discovery | 2011

Cyber Security Concerns for Ubiquitous/Pervasive Computing Environments

Jessie Walker; Travis Jones; Mansour Mortazavi; Roy Blount

The computing paradigm of ubiquitous/pervasive computing has changed the way in which nomadic computer users interact with computer devices and network systems. Modern ubiquitous computing devices have enabled nomadic computer users to interact with computer and network systems anywhere and at anytime. Although the issue of cyber security has been overlooked by many within the community, these devices provide users with a rich set of context-relevant information including location, usage data, and even the location/state of similar devices within the reach. Cyber Security has become a matter of national, economic, and societal importance. Present-day attacks on the nations computer systems do not simply damage an isolated machine or disrupt a single enterprise system. Instead, modern attacks target infrastructure that is integral to the economy, and daily life. Computer networks have joined food, water, transportation, and energy as critical resources for the functioning of the national economy. As a result of our interconnected world no device is an island, and security still remains a significant obstacle for ubiquitous and pervasive environments, partially in terms intrusions. This paper examines intrusion detection within ubiquitous and pervasive environments within the context of plan recognition as means to classify attacks both quantitatively and qualitatively.


International Journal of Emerging Technologies in Learning (ijet) | 2012

E-Learning using Cyberinfrastructure

Jessie Walker; S. Swaid; M. Mortazvi

Collaboration


Dive into the Jessie Walker's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Roy Blount

University of Arkansas at Pine Bluff

View shared research outputs
Top Co-Authors

Avatar

Travis Jones

University of Arkansas at Pine Bluff

View shared research outputs
Top Co-Authors

Avatar

Brenton Stewart

Louisiana State University

View shared research outputs
Top Co-Authors

Avatar

David Freet

Eastern Kentucky University

View shared research outputs
Top Co-Authors

Avatar

Anthony Gomes

University of Arkansas at Pine Bluff

View shared research outputs
Top Co-Authors

Avatar

Brenton J Stewart

University of Wisconsin-Madison

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ciji Ramos

Jackson State University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge