Virginia Tech
    • Log in
    Search 
    •   VTechWorks Home
    • College of Engineering (COE)
    • Search
    •   VTechWorks Home
    • College of Engineering (COE)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 20

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Privacy Preserving Network Security Data Analytics: Architectures and System Design 

    DeYoung, Mark E.; Kobezak, Philip; Raymond, David Richard; Marchany, Randolph C.; Tront, Joseph G. (University of Hawaii at Manoa, 2018-01-03)
    An incessant rhythm of data breaches, data leaks, and privacy exposure highlights the need to improve control over potentially sensitive data. History has shown that neither public nor private sector organizations are ...
    Thumbnail

    Studies In Spatial Aural Perception: Establishing Foundations For Immersive Sonification 

    Bukvic, Ivica Ico; Earle, Gregory D.; Sardana, Disha; Joo, Woohun (Georgia Institute of Technology, 2019-06)
    The Spatial Audio Data Immersive Experience (SADIE) project aims to identify new foundational relationships pertaining to human spatial aural perception, and to validate existing relationships. Our infrastructure consists ...
    Thumbnail

    Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing 

    Shu, Xiaokui; Zhang, Jing; Yao, Danfeng (Daphne); Feng, Wu-Chun (ACM, 2015-03)
    The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., ...
    Thumbnail

    Security and Privacy produced by nHCP Unique Identifiers 

    Tront, Joseph G.; Groat, Stephen; Dunlop, Matthew; Marchany, Randolph C. (IEEE, 2011-10)
    As protection against the current privacy weaknesses of StateLess Address AutoConfiguration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrators may choose to deploy the new Dynamic Host Configuration ...
    Thumbnail

    User-Centric Dependence Analysis For Identifying Malicious Mobile Apps 

    Elish, Karim O.; Yao, Danfeng (Daphne); Ryder, Barbara G. (IEEE, 2012)
    This paper describes an efficient approach for identifying malicious Android mobile applications through specialized static program analysis. Our solution performs offline analysis and enforces the normal properties of ...
    Thumbnail

    A Declarative Approach to Hardening Services Against QoS Vulnerabilities 

    Kwon, Young-Wo; Tilevich, Eli (IEEE, 2011)
    The Quality of Service (QoS) in a distributed service-oriented application can be negatively affected by a variety of factors. Network volatility, hostile exploits, poor service management, all can prevent a service-oriented ...
    Thumbnail

    Keystroke-Dynamics Authentication Against Synthetic Forgeries 

    Stefan, Deian; Yao, Danfeng (Daphne) (IEEE, 2010)
    We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called ...
    Thumbnail

    Implementing an IPv6 Moving Target Defense on a Live Network 

    Dunlop, Matthew; Groat, Stephen; Marchany, Randolph C.; Tront, Joseph G. (Cyber-Physical Systems Virtual Organization, 2012)
    The goal of our research is to protect sensitive communications, which are commonly used by government agencies, from eavesdroppers or social engineers. In prior work, we investigated the privacy implications of stateless ...
    Thumbnail

    Towards Use And Reuse Driven Big Data Management 

    Xie, Zhiwu; Chen, Yinlin; Griffin, Julie; Walters, Tyler; Tarazaga, Pablo Alberto; Kasarda, Mary (2015-06-03)
    We propose a use and reuse driven big data management approach that fuses the data repository and data processing capabilities in a co-located, public cloud. It answers to the urgent data management needs from the growing ...
    Thumbnail

    Distributed Storage Systems with Secure and Exact Repair - New Results 

    Tandon, Ravi; Amuru, SaiDhiraj; Clancy, T. Charles; Buehrer, R. Michael (IEEE, 2014-02)
    Distributed storage systems (DSS) in the presence of a passive eavesdropper are considered in this paper. A typical DSS is characterized by 3 parameters (n, k, d) where, a file is stored in a distributed manner across n ...
    • 1
    • 2

    If you believe that any material in VTechWorks should be removed, please see our policy and procedure for Requesting that Material be Amended or Removed. All takedown requests will be promptly acknowledged and investigated.

    Virginia Tech | University Libraries | Contact Us
     

     

    Browse

    All of VTechWorksCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CommunityBy Issue DateAuthorsTitlesSubjects

    My Account

    Log inRegister

    Discover

    Content Type
    Conference proceeding (20)
    Presentation (20)
    Subject6LoWPAN (1)Aging (1)algorithm (1)alignment (1)anomaly detection (1)... View MoreDate Issued2019 (1)2018 (3)2017 (1)2015 (2)2014 (4)2013 (2)2012 (2)2011 (2)2010 (3)AuthorMarchany, Randolph C. (4)Tront, Joseph G. (4)Yao, Danfeng (Daphne) (4)Bukvic, Ivica Ico (2)Dunlop, Matthew (2)... View MoreHas File(s)Yes (20)

    If you believe that any material in VTechWorks should be removed, please see our policy and procedure for Requesting that Material be Amended or Removed. All takedown requests will be promptly acknowledged and investigated.

    Virginia Tech | University Libraries | Contact Us