Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tyson T. Brooks is active.

Publication


Featured researches published by Tyson T. Brooks.


international conference for internet technology and secured transactions | 2013

A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application

Tyson T. Brooks; Michelle L. Kaarst-Brown; Carlos E. Caicedo; Joon S. Park; Lee W. McKnight

Any communications network is subject to becoming the target of exploitation by criminal hackers looking to gain unauthorized access to an information system. As a computer information infrastructure, the wireless grid Edgeware technology model aims at aggregating ensembles of shared, heterogeneous and distributed wireless resources to provide transparent services of various applications, systems and devices. Currently, there is no research exploring the exploitation of technical vulnerabilities from a hackers attack against a wireless grid Edgeware application. Using a quantitative research method from the theoretical perspective of an anatomy of a network attack, the central premise of this article is to compromise the confidentiality, integrity and availability of a wireless grid called the GridStreamX Edgeware application for vulnerability exploitation through a laboratory experiment within the Syracuse University Wireless Grid Innovation Testbed (WiGiT). The GridStreamX Edgeware application is cloud to ‘worst case scenario’ emergency response wireless Grid resource, which can be utilized as a data communication vehicle during an enterprise network catastrophe and/or failure. This research makes a meaningful theoretical and managerial contribution because it represents the first empirical examination of researching the technical requirements of the open specifications for wireless grid Edgeware technology.


International Journal of Internet Technology and Secured Transactions | 2014

Secure the edge? Understanding the risk towards wireless grids Edgeware technology

Tyson T. Brooks; Michelle L. Kaarst-Brown; Carlos E. Caicedo; Joon S. Park; Lee W. McKnight

This article contributes to the foundational understanding of the security vulnerabilities and risk towards wireless grid Edgeware technology. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g., individuals who attempt to gain unauthorised access to computer systems), these individuals are gaining ever-increasing knowledge of the often widely-reported exploitable vulnerabilities in these types of innovative technologies; and thus are able to craft increasingly effective computer network attacks (CNA) against such technologies. This research responds to the overall proposition: what security vulnerability enumerations would contribute to the degradation and risk in using a wireless grid Edgeware application in a virtualised cloud environment? Using supporting research pertaining to cyber-attacks and vulnerabilities towards a wireless cloud (e.g., the integration of a cloud computing and a wireless grid architecture), security vulnerabilities in virtualisation environments and specific vulnerabilities exploited against a wireless grid Edgeware application, this research provides a greater understanding of the practical ways wireless grid Edgeware technology can be attacked and the risk in utilising this technology.


world congress on sustainable technologies | 2014

Keynote speaker 4: The Internet of Things: Connected reality

Tyson T. Brooks

The Internet of Things (IoT) will create a huge network of billions of smart ‘Things/Objects’ communicating each other. In the IoT, smart things/objects are expected to become active participants in business, information and social processes. The IoT will be able to interact and communicate by exchanging data and information sensed about the environment and by reacting autonomously to the real/physical events with or without direct human intervention. The IoT has the purpose of providing an information technology (IT) infrastructure facilitating the exchanges of things in a secure and reliable manner. This keynote will discuss the anatomy of the IoT environment and its use within the home, business and our everyday lives.


international conference for internet technology and secured transactions | 2013

ICITST-2013: Keynote speaker 3: Blurred nets: Disruption and the risk to future ‘Internet of Things’ (IoT) architectures

Tyson T. Brooks

The Internet of Things (IoT) is an integrated part of the future Internet with self-configuring capabilities based on interoperable communication protocols where physical and virtual ‘things/objects’ have identities, physical attributes and are seamlessly integrated into the information network. This keynote will address three key themes in this IoT evolution, each defining stages in the evolution of the Internet over the next decade. Over the next few years, the importance of collaboratory participation nets will further increase active creation and passive consumption. By 2015, immersive nets become predominant, integration local tags, wireless networks and smart environments offer a cloud of information accessible and editable both remotely and in-person. After 2017, metaverse nets will take this augmented world and add connections with virtual environments. Although innovative, the risk and disruption to these new architectures will present challenges to the IoT Cyber domain needing to address the very large numbers of ‘things/objects’ handing data in this new global information space.


International Journal of Intelligent Computing Research | 2012

Security Vulnerability Analysis in Virtualized Computing Environments

Tyson T. Brooks; Carlos E. Caicedo; Joon S. Park


world congress on internet security | 2012

Security challenges and countermeasures for trusted virtualized computing environments

Tyson T. Brooks; Carlos E. Caicedo; Joon S. Park


ieee international conference on cloud computing technology and science | 2012

Conceptualizing a Secure Wireless Cloud

Tyson T. Brooks; Jerry Robinson; Lee W. McKnight


International Journal of Information and Network Security | 2012

Securing Wireless Grids: Architecture Designs for Secure WiGLET-to-WiGLET Interfaces

Tyson T. Brooks; Lee W. McKnight; Accepted Oct


Archive | 2019

Cloud to Edgeware: Wireless Grid Applications, Architecture and Security for the “Internet of Things”

Lee W. McKnight; Tyson T. Brooks


Archive | 2017

Wearable IoT Computing: Interface, Emotions, Wearer's Culture, and Security/Privacy Concerns

Robert McCloud; Martha B. Lerski; Joon S. Park; Tyson T. Brooks

Collaboration


Dive into the Tyson T. Brooks's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge