Virginia Tech
    • Log in
    Search 
    •   VTechWorks Home
    • Virginia Tech National Security Institute
    • Search
    •   VTechWorks Home
    • Virginia Tech National Security Institute
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 36

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    SpaceDrones 2.0—Hardware-in-the-Loop Simulation and Validation for Orbital and Deep Space Computer Vision and Machine Learning Tasking Using Free-Flying Drone Platforms 

    Peterson, Marco; Du, Minzhen; Springle, Bryant; Black, Jonathan (MDPI, 2022-05-06)
    The proliferation of reusable space vehicles has fundamentally changed how assets are injected into the low earth orbit and beyond, increasing both the reliability and frequency of launches. Consequently, it has led to the ...
    Thumbnail

    Decoupling RNN Training and Testing Observation Intervals for Spectrum Sensing Applications 

    Moore, Megan O.; Buehrer, R. Michael; Headley, William Chris (MDPI, 2022-06-22)
    Recurrent neural networks have been shown to outperform other architectures when processing temporally correlated data, such as from wireless communication signals. However, compared to other architectures, such as ...
    Thumbnail

    A Practical Guide for Managing Interdisciplinary Teams: Lessons Learned from Coupled Natural and Human Systems Research 

    Henson, V. Reilly; Cobourn, Kelly M.; Weathers, Kathleen C.; Carey, Cayelan C.; Farrell, Kaitlin J.; Klug, Jennifer L.; Sorice, Michael G.; Ward, Nicole K.; Weng, Weizhe (MDPI, 2020-07-09)
    Interdisciplinary team science is essential to address complex socio-environmental questions, but it also presents unique challenges. The scientific literature identifies best practices for high-level processes in team ...
    Thumbnail

    Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity 

    Adams, Michael D.; Hitefield, Seth D.; Hoy, Bruce; Fowler, Michael C.; Clancy, Thomas Charles III (Virginia Tech, 2013-11-01)
    A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking ...
    Thumbnail

    Physical layer orthogonal frequency-division multiplexing acquisition and timing synchronization security 

    La Pan, Matthew J.; Clancy, Thomas Charles III; McGwier, Robert W. (Wiley, 2014-08-18)
    Orthogonal frequency-division multiplexing (OFDM) has become the manifest modulation choice for 4G standards. Timing acquisition and carrier frequency offset synchronization are prerequisite to OFDM demodulation and must ...
    Thumbnail

    Designing a Block Cipher in Galois Extension Fields for IoT Security 

    George, Kiernan; Michaels, Alan J. (MDPI, 2021-11-05)
    This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique ...
    Thumbnail

    A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions 

    Abdelhadi, Ahmed; Shajaiah, Haya; Clancy, Thomas Charles III (IEEE, 2015-10-08)
    Secure spectrum auctions can revolutionize the spectrum utilization of cellular networks and satisfy the ever increasing demand for resources. In this paper, a multi-tier dynamic spectrum sharing system is studied for ...
    Thumbnail

    Further Analysis of PRNG-Based Key Derivation Functions 

    McGinthy, Jason M.; Michaels, Alan J. (IEEE, 2019)
    The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked, security still is a major concern. Many of these sensors and devices have limitations, such ...
    Thumbnail

    Cyberphysical Security Through Resiliency: A Systems-Centric Approach 

    Fleming, Cody H.; Elks, Carl R.; Bakirtzis, Georgios; Adams, Stephen C.; Carter, Bryan; Beling, Peter A.; Horowitz, Barry M. (2021-06)
    Cyberphysical systems require resiliency techniques for defense, and multicriteria resiliency problems need an approach that evaluates systems for current threats and potential design solutions. A systems-oriented view of ...
    Thumbnail

    Framework for Evaluating the Severity of Cybervulnerability of a Traffic Cabinet 

    Ernst, Joseph M.; Michaels, Alan J. (National Academy of Sciences, 2017)
    The increasing connectivity in transportation infrastructure is driving a need for additional security in transportation systems. For security decisions in a budget-constrained environment, the possible effect of a cyberattack ...
    • 1
    • 2
    • 3
    • 4

    If you believe that any material in VTechWorks should be removed, please see our policy and procedure for Requesting that Material be Amended or Removed. All takedown requests will be promptly acknowledged and investigated.

    Virginia Tech | University Libraries | Contact Us
     

     

    Browse

    All of VTechWorksCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CommunityBy Issue DateAuthorsTitlesSubjects

    My Account

    Log inRegister

    Discover

    Content TypeArticle - Refereed (27)Article (3)Conference proceeding (3)Patent (1)Poster (1)... View MoreSubjectjamming (2)OpenFOAM (2)security (2)adversarial machine learning (1)agriculture (1)... View MoreDate Issued2022 (7)2021 (7)2020 (3)2019 (5)2018 (1)2017 (2)2016 (2)2015 (2)2014 (2)2013 (2)AuthorMichaels, Alan J. (9)Clancy, Thomas Charles III (7)Beling, Peter A. (3)Buehrer, R. Michael (3)Adams, Stephen C. (2)... View MoreHas File(s)
    Yes (36)

    If you believe that any material in VTechWorks should be removed, please see our policy and procedure for Requesting that Material be Amended or Removed. All takedown requests will be promptly acknowledged and investigated.

    Virginia Tech | University Libraries | Contact Us