Destination Areas, along with related, smaller-scale Strategic Growth Areas, provide faculty and students with new tools to identify and solve complex, 21st-century problems in which Virginia Tech already has significant strengths and can take a global leadership role. The initiative represents the next step in the evolution of the land-grant university to meet economic and societal needs of the world. [http://provost.vt.edu/destination-areas.html]

Sub-communities within this community

Recent Submissions

  • Compressed Natural Gas Vehicles: Financially Viable Option? 

    Soltani-Sobh, Ali; Heaslip, Kevin; Bosworth, Ryan; Barnes, Ryan (NAS, 2016)
    Natural gas vehicles are being developed because of increasing concerns about energy dependence, air quality and emissions, and, more recently, climate change. The major advantage of natural gas vehicles is their lower ...
  • The Cyber Deterrence Problem 

    Brantly, AF (NATO CCD COE, 2018-05-30)
    What is the role of deterrence in an age where adept hackers can credibly hold strategic assets at risk? Do conventional frameworks of deterrence maintain their applicability and meaning against state actors in cyberspace? ...
  • Bitcoin and Cryptocurrencies 

    Vasek, Marie; Jardine, Eric; Brantly, Aaron (Virginia Tech, 2018-05-18)
    This panel includes three presentations: “Cryptocurrencies and Financial Crimes” by Marie Vasek; “Cryptocurrencies and Specific Drug Types” by Eric Jardine; and “Bitcoin and OPSEC for Terrorists” by Aaron Brantly. (Please ...
  • Extremism, Malware Markets, and Public Use of Tor 

    Lindner, Andrew M.; Hawdon, James; Nunes, Eric (Virginia Tech, 2018-05-18)
    This panel includes three presentations: “When the Public Seeks Anonymity Online” by Andrew M. Lindner; “Online Extremism in the U.S.” by James Hawdon; and “Malicious Markets and Forums: An Overview” by Eric Nunes. The ...
  • Measuring and Analyzing Online Anonymous Marketplaces 

    Christin, Nicolas (Virginia Tech, 2018-05-18)
    This presentation was given as part of the conference "Understanding the Dark Web and Its Implications for Policy" held on May 18, 2018 at the Virginia Tech Executive Briefing Center in Arlington, Virginia.
  • Deep/Dark Web & Higher Education 

    Moore, Kathleen (Virginia Tech, 2018-05-18)
    This presentation was given as part of the conference "Understanding the Dark Web and Its Implications for Policy" held on May 18, 2018 at the Virginia Tech Executive Briefing Center in Arlington, Virginia.
  • Indexing the Darknet 

    Owenson, Gareth (Virginia Tech, 2018-05-18)
    This presentation was given as part of the conference "Understanding the Dark Web and Its Implications for Policy" held on May 18, 2018 at the Virginia Tech Executive Briefing Center in Arlington, Virginia.
  • Understanding the Dark Web and its Implications for Policy (program) 

    Jardine, Eric (Virginia Tech, 2018-05-18)
    The program includes the agenda, speakers, and sponsors.
  • Rapporteur Report: Understanding the Dark Web and its Implications for Policy 

    Jardine, Eric (Virginia Tech, 2018-05)
    The Understanding the Dark Web and Its Implications for Policy conference focused on addressing the challenging dilemmas posed by the anonymity created by the “Dark Web” (the unindexed portion of the Internet only accessible ...
  • Understanding the Dark Web and its Implications for Policy (flyer) 

    Jardine, Eric (Virginia Tech, 2018-05-18)
    How to deal with the negative excesses of the Dark Web and other anonymity-granting technologies without harming those who use these tools for benign activities is one of today’s most pressing policy challenges. This ...
  • Explaining racial and ethnic inequalities in postpartum allostatic load: Results from a multisite study of low to middle income women 

    Ramey, Sharon Landesman; O'Campo, Patricia; Schetter, Christine Dunkel; Guardinoc, Christine M.; Vanced; Hobele, Calvin J.; Shalowitzg, Madeleine U.; Community Child Health Network (Elsevier, 2016-12)
    Background: Racial and ethnic inequalities in women's health are widely documented, but not for the postpartum period, and few studies examine whether neighborhood, psychosocial, and biological factors explain these gaps ...
  • CrowdLayout: Crowdsourced Design and Evaluation of Biological Network Visualizations 

    Singh, Divit P.; Lisle, Lee; Murali, T.M.; Luther, Kurt (ACM, 2018-04)
    Biologists often perform experiments whose results generate large quantities of data, such as interactions between molecules in a cell, that are best represented as networks (graphs). To visualize these networks and ...
  • Detecting Malicious Landing Pages in Malware Distribution Networks 

    Wang, Gang; Stokes, Jack W.; Herley, Cormac; Felstead, David (IEEE, 2013-06)
    Drive-by download attacks attempt to compromise a victim’s computer through browser vulnerabilities. Often they are launched from Malware Distribution Networks (MDNs) consisting of landing pages to attract traffic, ...
  • Co-located Collaborative Play in Virtual Environments for Group Learning in Museums 

    Apostolellis, Panagiotis (ACM, 2014-06)
    Having witnessed the unexplored potential of co-located group collaboration in contemporary museums, the proposed research aims to identify which elements of collaborative virtual environments and serious games can be ...
  • Designing for Schadenfreude (or, how to express well-being and see if youʼre boring people) 

    André, Paul; Schraefel, M.C.; Dix, Alan; White, Ryen W.; Bernstein, Michael; Luther, Kurt (ACM, 2010)
    This position paper presents two studies of content not normally expressed in status updates—well-being and status feedback—and considers how they may be processed, valued and used for potential quality-of-life benefits ...
  • Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers 

    Gang, Wang; Wang, Tianyi; Zheng, Haitao; Zhao, Ben Y. (USENIX, 2014-08)
    Recent work in security and systems has embraced the use of machine learning (ML) techniques for identifying misbehavior, e.g. email spam and fake (Sybil) users in social networks. However, ML models are typically derived ...
  • Social Turing Tests: Crowdsourcing Sybil Detection 

    Wang, Gang; Mohanlal, Manish; Wilson, Christo; Wang, Xiao; Metzger, Miriam; Zheng, Haitao; Zhao, Ben Y. (Internet Society, 2013-02)
    As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks (OSNs). Today, sophisticated attackers are creating realistic Sybils ...
  • Survey on In-vehicle Technology Use: Results and Findings 

    Kamalanathsharma, Raj K.; Rakha, Hesham A.; Zohdy, Ismail H. (Elsevier, 2015)
    The use of advanced technology in automobiles has increased dramatically in the past couple of years. Driver-assisting gadgets such as navigation systems, advanced cruise control, collision avoidance systems, and other ...
  • A Fully-Distributed Heuristic Algorithm for Control of Autonomous Vehicle Movements at Isolated Intersections 

    Hassan, Abdallah A.; Rakha, Hesham A. (Elsevier, 2014)
    Optimizing autonomous vehicle movements through roadway intersections is a challenging problem. It has been demonstrated in the literature that traditional traffic control, such as traffic signal and stop sign control are ...

View more