Virginia Tech
    • Log in
    Search 
    •   VTechWorks Home
    • Destination Areas (DAs) and Strategic Growth Areas (SGAs)
    • Destination Areas (DAs)
    • Search
    •   VTechWorks Home
    • Destination Areas (DAs) and Strategic Growth Areas (SGAs)
    • Destination Areas (DAs)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 35

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Civil Cyberconflict: Microsoft, Cybercrime, and Botnets 

    Hiller, Janine S. (Santa Clara University School of Law, 2014-01)
    Cyber “warfare” and hackback by private companies is a hot discussion topic for its potential to fight cybercrime and promote cybersecurity. In the shadow of this provocative discussion, Microsoft has led a concerted, ...
    Thumbnail

    Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity 

    Adams, Michael D.; Hitefield, Seth D.; Hoy, Bruce; Fowler, Michael C.; Clancy, T. Charles (Virginia Tech, 2013-11-01)
    A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking ...
    Thumbnail

    Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths 

    Shu, Xiaokui; Yao, Danfeng (Daphne); Ramakrishnan, Naren (ACM, 2015-10)
    Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate and alter the control flow legally. Existing ...
    Thumbnail

    Towards Optimal Secure Distributed Storage Systems with Exact Repair 

    Tandon, Ravi; Amuru, SaiDhiraj; Clancy, T. Charles; Buehrer, R. Michael (IEEE, 2016-06)
    Distributed storage systems in the presence of a wiretapper are considered. A distributed storage system (DSS) is parameterized by three parameters (𝑛, 𝑘, 𝑑), in which a file stored across n distributed nodes, can be ...
    Thumbnail

    A Modest Proposal for Open Market Risk Assessment to Solve the Cyber-Security Problem 

    O’Shea, Timothy J.; Mondl, Adam; Clancy, T. Charles (Virginia Tech, 2016-04-29)
    We introduce a model for a market based economic system of cyber-risk valuation to correct fundamental problems of incentives within the information technology and information processing industries. We assess the makeup ...
    Thumbnail

    Secure Coding Practices in Java: Challenges and Vulnerabilities 

    Meng, Na; Nagy, Stefan; Yao, Danfeng (Daphne); Zhuang, Wenjie; Argoty, Gustavo Arango (Virginia Tech, 2017-09-28)
    Java platform and third-party libraries provide various security features to facilitate secure coding. However, misusing these features can cost tremendous time and effort of developers or cause security vulnerabilities ...
    Thumbnail

    A collaboration workflow from sound-based composition to performance of electroacoustic music using «Pure Data» as a framework. 

    Tsoukalas, Kyriakos (Bauhaus Universitat Weimer, 2011-08)
    This paper describes a workflow for composers, engineers and performers to collaborate, using Pure Data (PD) as a framework, towards the design of electroacoustic musical instruments intended for live performances of ...
    Thumbnail

    Are Ayurvedic herbs for diabetes effective? 

    Shekelle, Paul G.; Hardy, Mary; Morton, Sally C.; Coulter, Ian; Venuturupalli, Swamy; Favreau, Joya; Hilton, Lara K. (Frontline Medical Communications Inc., 2005-10)
    Objective: To evaluate and synthesize the evidence on the effect of Ayurvedic therapies for diabetes mellitus. Design: Systematic review of trials. Measurements and main results: We found no study that assessed ...
    Thumbnail

    Can Administrative Housing Data Replace Survey Data? 

    Molfino, Emily; Korkmaz, Gizem; Keller, Sallie A.; Schroeder, Aaron; Shipp, Stephanie; Weinberg, Daniel H. (HUD, 2017)
    This article examines the feasibility of using local administrative data sources for enhancing and supplementing federally collected survey data to describe housing in Arlington County, Virginia. Using real estate assessment ...
    Thumbnail

    Strategic Cyber Maneuver 

    Brantly, Aaron (Small Wars Foundation, 2017-10-17)
    Maneuver warfare is an integral part of the strategy, tactics and operations of the United States military, but what does it mean to maneuver in cyberspace? <quote> Maneuvering with an army is advantageous; with an ...
    • 1
    • 2
    • 3
    • 4

    If you believe that any material in VTechWorks should be removed, please see our policy and procedure for Requesting that Material be Amended or Removed. All takedown requests will be promptly acknowledged and investigated.

    Virginia Tech | University Libraries | Contact Us
     

     

    Browse

    All of VTechWorksCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CommunityBy Issue DateAuthorsTitlesSubjects

    My Account

    Log inRegister

    Discover

    Content Type
    Article (35)
    Subjectagricultural technologies (1)antibiotic resistance genes (ARGs) (1)antibiotic, sulfamethoxazole (SMX) (1)art-expertise (1)attention deficit/hyperactivity disorder (1)... View MoreDate Issued2010 - 2017 (31)2003 - 2009 (2)AuthorClancy, T. Charles (4)Norton, George W. (2)Pruden, Amy (2)Taylor, Daniel B. (2)Yao, Danfeng (Daphne) (2)... View MoreHas File(s)Yes (35)

    If you believe that any material in VTechWorks should be removed, please see our policy and procedure for Requesting that Material be Amended or Removed. All takedown requests will be promptly acknowledged and investigated.

    Virginia Tech | University Libraries | Contact Us