IS focuses on advancing and assuring the security of our vital social, political, and financial networks while balancing the crucial needs and expectations of privacy and governmental oversight. This mission cuts across four other destination areas and strategic growth areas, intersecting at key points of national interest where Virginia Tech has demonstrated expertise and capability: Security for the Internet of Everything: The interconnection of the digital world, the physical world, and humans interacting with both worlds. Governance and Ethics for Security: Questions and concerns about the adoption, use, and audit of security and privacy practices as they affect citizens and their government, consumers and business, and humans and their environment. Analytics for National Security and Preparedness: Using the capabilities of big data to improve security, forecasting, awareness, and resilience in response to disasters and for national defense.

Recent Submissions

  • On market concentration and cybersecurity risk 

    Geer, Dan; Jardine, Eric; Leverett, Eireann (Taylor & Francis, 2020-02-24)
    Market concentration affects each component of the cybersecurity risk equation (i.e. threat, vulnerability and impact). As the Internet ecosystem becomes more concentrated across a number of vectors from users and incoming ...
  • Further Analysis of PRNG-Based Key Derivation Functions 

    McGinthy, Jason M.; Michaels, Alan J. (IEEE, 2019)
    The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked, security still is a major concern. Many of these sensors and devices have limitations, such ...
  • On Data Center Demand Response: A Cloud Federation Approach 

    Moghaddam, Monireh Mohebbi; Manshaei, Mohammad Hossein; Saad, Walid; Goudarzi, Maziar (IEEE, 2019)
    The significantly high energy consumption of data centers constitutes a major load on the smart power grid. Data center demand response is a promising solution to incentivize the cloud providers to adapt their consumption ...
  • BRIoT: Behavior Rune Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems 

    Sharma, Vishal; You, Ilsun; Vim, Kangbin; Chen, Ing-Ray; Cho, Jin-Hee (IEEE, 2019)
    The identification of vulnerabilities in a mission-critical system is one of the challenges faced by a cyber-physical system (CPS). The incorporation of embedded Internet of Things (IoT) devices makes it tedious to identify ...
  • SmartFarm Innovation Network 

    Duncan, Susan; Ford, Ramsey (2019-10-04)
    This poster represents a variety of projects funded, in part, by the Virginia Agricultural Experiment Station, Virginia Tech Institute for Creativity, Arts, and Technology, NIFA, USDA NIFA and other funding sources. Some ...
  • Cyberbiosecurity: An Emerging New Discipline to Help Safeguard the Bioeconomy 

    Murch, Randall S.; So, William K.; Buchholz, Wallace G.; Raman, Sanjay; Peccoud, Jean (2018-04-05)
    Cyberbiosecurity is being proposed as a formal new enterprise which encompasses cybersecurity, cyber-physical security and biosecurity as applied to biological and biomedical-based systems. In recent years, an array of ...
  • Cyberbiosecurity: A New Perspective on Protecting US Food and Agricultural System 

    Duncan, Susan E.; Reinhard, Robert; Williams, Robert C.; Ramsey, Ford; Thomason, Wade; Lee, Kiho; Dudek, Nancy; Mostaghimi, Saied; Colbert, Edward; Murch, Randall S. (2019-03-29)
    Our national data and infrastructure security issues affecting the "bioeconomy" are evolving rapidly. Simultaneously, the conversation about cyber security of the U.S. food and agricultural system (cyber biosecurity) is ...
  • Cyberbiosecurity: A Call for Cooperation in a New Threat Landscape 

    Richardson, Lauren C.; Connell, Nancy D.; Lewis, Stephen M.; Pauwels, Eleonore; Murch, Randall S. (2019-06-06)
    The life sciences now interface broadly with information technology (IT) and cybersecurity. This convergence is a key driver in the explosion of biotechnology research and its industrial applications in health care, ...
  • Cyberbiosecurity Challenges of Pathogen Genome Databases 

    Vinatzer, Boris A.; Heath, Lenwood S.; Almohri, Hussain MJ J.; Stulberg, Michael J.; Lowe, Christopher; Li, Song (Frontiers, 2019-05-15)
    Pathogen detection, identification, and tracking is shifting from non-molecular methods, DNA fingerprinting methods, and single gene methods to methods relying on whole genomes. Viral Ebola and influenza genome data are ...
  • 2019 SAIC National Security Education Program Colloquium 

    Unknown author (Virginia Tech. Hume Center., 2019-04-16)
    The annual National Security Education Program Colloquium is the highlight of our educational programs. It allows students from across the university to interact with leaders from the intelligence and national security ...
  • An Open Source Modeling Framework for Interdependent Energy-Transportation-Communication Infrastructure in Smart and Connected Communities 

    Lu, Xing; Hinkelman, Kathryn; Fu, Yangyang; Wang, Jing; Zuo, Wangda; Zhang, Qianqian; Saad, Walid (IEEE, 2019)
    Infrastructure in future smart and connected communities is envisioned as an aggregate of public services, including energy, transportation, and communication systems, all intertwined with each other. The intrinsic ...
  • Learning How to Communicate in the Internet of Things: Finite Resources and Heterogeneity 

    Park, Taehyeun; Abuzainab, Nof; Saad, Walid (IEEE, 2016)
    For a seamless deployment of the Internet of Things (IoT), there is a need for self-organizing solutions to overcome key IoT challenges that include data processing, resource management, coexistence with existing wireless ...
  • Trust Management of Smart Service Communities 

    Al-Hamadi, Hamid; Chen, Ing-Ray; Cho, Jin-Hee (IEEE, 2019)
    In this paper, the notion of a smart service community is proposed to address the grand challenge of a huge number of the Internet-of-Things (IoT) devices providing similar services in a smart city environment (e.g., ...
  • Big Data Meet Cyber-Physical Systems: A Panoramic Survey 

    Atat, Rachad; Liu, Lingjia; Wu, Jinsong; Li, Guangyu; Ye, Chunxuan; Yi, Yang (IEEE, 2018)
    The world is witnessing an unprecedented growth of cyber-physical systems (CPS), which are foreseen to revolutionize our world via creating new services and applications in a variety of sectors, such as environmental ...
  • Mitigating the Impact of Renewable Variability With Demand-Side Resources Considering Communication and Cyber Security Limitations 

    Bian, Desong; Shi, Di; Pipattanasomporn, Manisa; Kuzlu, Murat; Rahman, Saifur (IEEE, 2019)
    With the rapid development of smart grid, the penetration of renewable energy resources is higher than ever and keeps growing. However, the output of renewable energy units, such as solar photovoltaics and wind turbines, ...
  • How Two Traditions of Privacy Defenses in Image Capture Technology Inform the Debate over Drones 

    Roberts, Patrick S.; Larson, Derek (2017-05-10)
    Innovations in image capture technology create new versions of long-standing concerns about privacy, with the debate over unmanned aerial vehicles, known in the popular media as drones, as the latest example. The history ...
  • Cyber War Game in Temporal Networks 

    Cho, Jin-Hee; Gao, Jianxi (PLOS, 2016-02-09)
    In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with ...
  • Conceptualizing Cyber Deterrence by Entanglement 

    Brantly, Aaron F. (2018-03-01)
    Dr. Brantly was invited to give one of three keynote lectures for the opening of the Cyber Governance and Policy Center at the University of Oklahoma.
  • Back to Reality: Cross domain deterrence and cyberspace 

    Brantly, Aaron F. (2018-09-01)
    This paper examines cross domain deterrence strategies involving cyber incidents. By focusing on efforts to halt Russian and Chinese cyber operations against the United States this paper examines the importance of developing, ...
  • Battling the Bear: Ukraine's Approach to National Cybersecurity 

    Brantly, Aaron F. (2018-09-29)
    Ukraine has faced substantial challenges across multiple fronts its successful 2014 Revolution of Dignity. Among the greatest challenges Ukraine has faced is the establishment of a national cybersecurity infrastructure ...

View more