Now showing items 1-3 of 3
Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity
(Virginia Tech, 2013-11-01)
A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking ...
Vulnerability of LTE to Hostile Interference
LTE is well on its way to becoming the primary cellular standard, due to its performance and low cost. Over the next decade we will become dependent on LTE, which is why we must ensure it is secure and available when we ...
Towards Optimal Secure Distributed Storage Systems with Exact Repair
Distributed storage systems in the presence of a wiretapper are considered. A distributed storage system (DSS) is parameterized by three parameters (𝑛, 𝑘, 𝑑), in which a file stored across n distributed nodes, can be ...