Browsing Virginia Tech National Security Institute by Title
Now showing items 1-20 of 36
-
2019 SAIC National Security Education Program Colloquium
(Virginia Tech. Hume Center., 2019-04-16)The annual National Security Education Program Colloquium is the highlight of our educational programs. It allows students from across the university to interact with leaders from the intelligence and national security ... -
Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas
(MDPI, 2022-07-29)This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest. There exists one transmitter that transmits to its receiver ... -
Analyzing the Russian Way of War: Evidence from the 2008 Conflict with Georgia
(Modern War Institute, 2018-03-20)In the dog days of August 2008, a column of Russian tanks and troops rolled across the Republic of Georgia’s northern border and into South Ossetia, sparking a war that was over almost before it began. The war, while not ... -
Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity
(Virginia Tech, 2013-11-01)A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking ... -
Attacks and Defenses for Single-Stage Residue Number System PRNGs
(MDPI, 2021-06-25)This paper explores the security of a single-stage residue number system (RNS) pseudorandom number generator (PRNG), which has previously been shown to provide extremely high-quality outputs when evaluated through available ... -
Collaborative Multi-Robot Multi-Human Teams in Search and Rescue
(2022-04-30)Robots such as unmanned aerial vehicles (UAVs) deployed for search and rescue (SAR) can explore areas where human searchers cannot easily go and gather information on scales that can transform SAR strategy. Multi-UAV teams ... -
A Coupled OpenFOAM-WRF Study on Atmosphere-Wake-Ocean Interaction
(MDPI, 2020-12-30)This work aims to better understand how small scale disturbances that are generated at the air-sea interface propagate into the surrounding atmosphere under realistic environmental conditions. To that end, a one-way coupled ... -
Cyberbiosecurity: A New Perspective on Protecting US Food and Agricultural System
(Frontiers, 2019-03-29)Our national data and infrastructure security issues affecting the "bioeconomy" are evolving rapidly. Simultaneously, the conversation about cyber security of the U.S. food and agricultural system (cyber biosecurity) is ... -
Cyberphysical Security Through Resiliency: A Systems-Centric Approach
(2021-06)Cyberphysical systems require resiliency techniques for defense, and multicriteria resiliency problems need an approach that evaluates systems for current threats and potential design solutions. A systems-oriented view of ... -
Decoupling RNN Training and Testing Observation Intervals for Spectrum Sensing Applications
(MDPI, 2022-06-22)Recurrent neural networks have been shown to outperform other architectures when processing temporally correlated data, such as from wireless communication signals. However, compared to other architectures, such as ... -
Designing a Block Cipher in Galois Extension Fields for IoT Security
(MDPI, 2021-11-05)This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique ... -
Development and Analysis of a Spiral Theory-based Cybersecurity Curriculum
(2017-01-09)Enhance cybersecurity learning experiences of students at Virginia Tech’s large engineering program -
Disruptive Role of Vertical Land Motion in Future Assessments of Climate Change-Driven Sea-Level Rise and Coastal Flooding Hazards in the Chesapeake Bay
(American Geophysical Union, 2023-04)Future projections of sea-level rise (SLR) used to assess coastal flooding hazards and exposure throughout the 21st century and devise risk mitigation efforts often lack an accurate estimate of coastal vertical land motion ... -
Distributed Storage Systems with Secure and Exact Repair - New Results
(IEEE, 2014-02)Distributed storage systems (DSS) in the presence of a passive eavesdropper are considered in this paper. A typical DSS is characterized by 3 parameters (n, k, d) where, a file is stored in a distributed manner across n ... -
Enabling Artificial Intelligence Adoption through Assurance
(MDPI, 2021-08-25)The wide scale adoption of Artificial Intelligence (AI) will require that AI engineers and developers can provide assurances to the user base that an algorithm will perform as intended and without failure. Assurance is the ... -
Fallthrough Correlation Techniques for Arbitrary-Phase Spread Spectrum Waveforms
(IEEE, 2019-09-11)The use of practically non-repeating spreading codes to generate sequence-based spread spectrum waveforms is a strong method to improve transmission security, by limiting an observer's opportunity to cross-correlate snapshots ... -
Framework for Evaluating the Severity of Cybervulnerability of a Traffic Cabinet
(National Academy of Sciences, 2017)The increasing connectivity in transportation infrastructure is driving a need for additional security in transportation systems. For security decisions in a budget-constrained environment, the possible effect of a cyberattack ... -
Further Analysis of PRNG-Based Key Derivation Functions
(IEEE, 2019)The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked, security still is a major concern. Many of these sensors and devices have limitations, such ... -
Hidden vulnerability of US Atlantic coast to sea-level rise due to vertical land motion
(Nature Research, 2023-04-11)The vulnerability of coastal environments to sea-level rise varies spatially, particularly due to local land subsidence. However, high-resolution observations and models of coastal subsidence are scarce, hindering an ... -
How to Attack and Defend NextG Radio Access Network Slicing With Reinforcement Learning
(IEEE, 2023)In this paper, reinforcement learning (RL) for network slicing is considered in next generation (NextG) radio access networks, where the base station (gNodeB) allocates resource blocks (RBs) to the requests of user equipments ...