Search
Now showing items 1-10 of 20
Privacy Preserving Network Security Data Analytics: Architectures and System Design
(University of Hawaii at Manoa, 2018-01-03)
An incessant rhythm of data breaches, data leaks, and privacy exposure highlights the need to improve control over potentially sensitive data. History has shown that neither public nor private sector organizations are ...
Studies In Spatial Aural Perception: Establishing Foundations For Immersive Sonification
(Georgia Institute of Technology, 2019-06)
The Spatial Audio Data Immersive Experience (SADIE) project aims to identify new foundational relationships pertaining to human spatial aural perception, and to validate existing relationships. Our infrastructure consists ...
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing
(ACM, 2015-03)
The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., ...
Security and Privacy produced by nHCP Unique Identifiers
(IEEE, 2011-10)
As protection against the current privacy weaknesses of StateLess Address AutoConfiguration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrators may choose to deploy the new Dynamic Host Configuration ...
User-Centric Dependence Analysis For Identifying Malicious Mobile Apps
(IEEE, 2012)
This paper describes an efficient approach for identifying malicious Android mobile applications through specialized static program analysis. Our solution performs offline analysis and enforces the normal properties of ...
A Declarative Approach to Hardening Services Against QoS Vulnerabilities
(IEEE, 2011)
The Quality of Service (QoS) in a distributed service-oriented application can be negatively affected by a variety of factors. Network volatility, hostile exploits, poor service management, all can prevent a service-oriented ...
Keystroke-Dynamics Authentication Against Synthetic Forgeries
(IEEE, 2010)
We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called ...
Implementing an IPv6 Moving Target Defense on a Live Network
(Cyber-Physical Systems Virtual Organization, 2012)
The goal of our research is to protect sensitive communications, which are commonly used by government agencies, from eavesdroppers or social engineers. In prior work, we investigated the privacy implications of stateless ...
Towards Use And Reuse Driven Big Data Management
(2015-06-03)
We propose a use and reuse driven big data management approach that fuses the data repository and data processing capabilities in a co-located, public cloud. It answers to the urgent data management needs from the growing ...
Distributed Storage Systems with Secure and Exact Repair - New Results
(IEEE, 2014-02)
Distributed storage systems (DSS) in the presence of a passive eavesdropper are considered in this paper. A typical DSS is characterized by 3 parameters (n, k, d) where, a file is stored in a distributed manner across n ...