The Hume Center leads Virginia Tech's research, education, and outreach programs focused on the challenges of cybersecurity, autonomy, and resilience in the context of national and homeland security. Education programs provide mentorship, internships, scholarships, and seek to address key challenges in qualified US citizens entering federal service. Current research initiatives include cyber-physical system security, orchestrated missions, and the convergence of cyber warfare and electronic warfare.

Collections in this community

Recent Submissions

  • A Coupled OpenFOAM-WRF Study on Atmosphere-Wake-Ocean Interaction 

    Gilbert, John; Pitt, Jonathan (MDPI, 2020-12-30)
    This work aims to better understand how small scale disturbances that are generated at the air-sea interface propagate into the surrounding atmosphere under realistic environmental conditions. To that end, a one-way coupled ...
  • Multi-Physics Modeling of Electrochemical Deposition 

    Kauffman, Justin; Gilbert, John; Paterson, Eric (MDPI, 2020-12-11)
    Electrochemical deposition (ECD) is a common method used in the field of microelectronics to grow metallic coatings on an electrode. The deposition process occurs in an electrolyte bath where dissolved ions of the depositing ...
  • A Practical Guide for Managing Interdisciplinary Teams: Lessons Learned from Coupled Natural and Human Systems Research 

    Henson, V. Reilly; Cobourn, Kelly M.; Weathers, Kathleen C.; Carey, Cayelan C.; Farrell, Kaitlin J.; Klug, Jennifer L.; Sorice, Michael G.; Ward, Nicole K.; Weng, Weizhe (MDPI, 2020-07-09)
    Interdisciplinary team science is essential to address complex socio-environmental questions, but it also presents unique challenges. The scientific literature identifies best practices for high-level processes in team ...
  • Fallthrough Correlation Techniques for Arbitrary-Phase Spread Spectrum Waveforms 

    Fletcher, Michael; Michaels, Alan; Ridge, Devin (IEEE, 2019-09-11)
    The use of practically non-repeating spreading codes to generate sequence-based spread spectrum waveforms is a strong method to improve transmission security, by limiting an observer's opportunity to cross-correlate snapshots ...
  • Further Analysis of PRNG-Based Key Derivation Functions 

    McGinthy, Jason M.; Michaels, Alan J. (IEEE, 2019)
    The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked, security still is a major concern. Many of these sensors and devices have limitations, such ...
  • Cyberbiosecurity: A New Perspective on Protecting US Food and Agricultural System 

    Duncan, Susan E.; Reinhard, Robert; Williams, Robert C.; Ramsey, Ford; Thomason, Wade E.; Lee, Kiho; Dudek, Nancy; Mostaghimi, Saied; Colbert, Edward; Murch, Randall S. (2019-03-29)
    Our national data and infrastructure security issues affecting the "bioeconomy" are evolving rapidly. Simultaneously, the conversation about cyber security of the U.S. food and agricultural system (cyber biosecurity) is ...
  • 2019 SAIC National Security Education Program Colloquium 

    Unknown author (Virginia Tech. Hume Center., 2019-04-16)
    The annual National Security Education Program Colloquium is the highlight of our educational programs. It allows students from across the university to interact with leaders from the intelligence and national security ...
  • Specific Emitter Identification Using Convolutional Neural Network-Based IQ Imbalance Estimators 

    Wong, Lauren J.; Headley, William Christopher; Michaels, Alan J. (IEEE, 2019)
    Specific Emitter Identification is the association of a received signal to a unique emitter, and is made possible by the naturally occurring and unintentional characteristics an emitter imparts onto each transmission, known ...
  • System and method for heterogenous spectrum sharing between commercial cellular operators and legacy incumbent users in wireless networks 

    Electrical and Computer Engineering; Business Information Technology (BIT); Hume Center for National Security and Technology; Virginia Tech Intellectual Properties, Inc.; FEDERATED WIRELESS, INC.; Kumar, Akshay; Mitola, Joseph III; Reed, Jeffrey H.; Clancy, III, Thomas Charles; Amanna, III, Ashwin; McGweir, Robert; Sengupta, Avik (United States Patent and Trademark Office, 2016-12-06)
    Described herein are systems and methods for telecommunications spectrum sharing between multiple heterogeneous users, which leverage a hybrid approach that includes both distributed spectrum sharing, spectrum-sensing, and ...
  • Distributed Storage Systems with Secure and Exact Repair - New Results 

    Tandon, Ravi; Amuru, SaiDhiraj; Clancy, T. Charles; Buehrer, R. Michael (IEEE, 2014-02)
    Distributed storage systems (DSS) in the presence of a passive eavesdropper are considered in this paper. A typical DSS is characterized by 3 parameters (n, k, d) where, a file is stored in a distributed manner across n ...
  • Analyzing the Russian Way of War: Evidence from the 2008 Conflict with Georgia 

    Beehner, Lionel; Collins, Liam; Ferenzi, Steve; Person, Robert; Brantly, Aaron F. (Modern War Institute, 2018-03-20)
    In the dog days of August 2008, a column of Russian tanks and troops rolled across the Republic of Georgia’s northern border and into South Ossetia, sparking a war that was over almost before it began. The war, while not ...
  • Physical layer orthogonal frequency-division multiplexing acquisition and timing synchronization security 

    La Pan, Matthew J.; Clancy, Charles T.; McGwier, Robert W. (Wiley, 2014-08-18)
    Orthogonal frequency-division multiplexing (OFDM) has become the manifest modulation choice for 4G standards. Timing acquisition and carrier frequency offset synchronization are prerequisite to OFDM demodulation and must ...
  • Framework for Evaluating the Severity of Cybervulnerability of a Traffic Cabinet 

    Ernst, Joseph M.; Michaels, Alan J. (National Academy of Sciences, 2017)
    The increasing connectivity in transportation infrastructure is driving a need for additional security in transportation systems. For security decisions in a budget-constrained environment, the possible effect of a cyberattack ...
  • Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity 

    Adams, Michael D.; Hitefield, Seth D.; Hoy, Bruce; Fowler, Michael C.; Clancy, T. Charles (Virginia Tech, 2013-11-01)
    A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking ...
  • Intrusion Detection System for Applications using Linux Containers 

    Abed, Amr S.; Clancy, Charles; Levy, David S. (Springer, 2015-12-09)
    Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical ...
  • Towards Optimal Secure Distributed Storage Systems with Exact Repair 

    Tandon, Ravi; Amuru, SaiDhiraj; Clancy, T. Charles; Buehrer, R. Michael (IEEE, 2016-06)
    Distributed storage systems in the presence of a wiretapper are considered. A distributed storage system (DSS) is parameterized by three parameters (𝑛, 𝑘, 𝑑), in which a file stored across n distributed nodes, can be ...
  • A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions 

    Abdelhadi, Ahmed; Shajaiah, Haya; Clancy, Charles (IEEE, 2015-10-08)
    Secure spectrum auctions can revolutionize the spectrum utilization of cellular networks and satisfy the ever increasing demand for resources. In this paper, a multi-tier dynamic spectrum sharing system is studied for ...
  • Development and Analysis of a Spiral Theory-based Cybersecurity Curriculum 

    Back, Godmar V.; Basu, Debarati; Naciri, William; Lohani, Vinod K.; Plassmann, Paul; Barnette, Dwight; Ribbens, Calvin J.; Gantt, Kira; McPherson, David (2017-01-09)
    Enhance cybersecurity learning experiences of students at Virginia Tech’s large engineering program
  • Vulnerability of LTE to Hostile Interference 

    Lichtman, Marc; Reed, Jeffrey H.; Clancy, T. Charles; Norton, Mark (Ieee, 2013-01-01)
    LTE is well on its way to becoming the primary cellular standard, due to its performance and low cost. Over the next decade we will become dependent on LTE, which is why we must ensure it is secure and available when we ...