Search
Now showing items 1-10 of 35
Civil Cyberconflict: Microsoft, Cybercrime, and Botnets
(Santa Clara University School of Law, 2014-01)
Cyber “warfare” and hackback by private companies is a hot discussion topic for its potential to fight cybercrime and promote cybersecurity. In the shadow of this provocative discussion, Microsoft has led a concerted, ...
Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity
(Virginia Tech, 2013-11-01)
A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking ...
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths
(ACM, 2015-10)
Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate and alter the control flow legally. Existing ...
Towards Optimal Secure Distributed Storage Systems with Exact Repair
(IEEE, 2016-06)
Distributed storage systems in the presence of a wiretapper are considered. A distributed storage system (DSS) is parameterized by three parameters (𝑛, 𝑘, 𝑑), in which a file stored across n distributed nodes, can be ...
A Modest Proposal for Open Market Risk Assessment to Solve the Cyber-Security Problem
(Virginia Tech, 2016-04-29)
We introduce a model for a market based economic system of cyber-risk valuation to correct fundamental problems of incentives within the information technology and information processing industries. We assess the makeup ...
Secure Coding Practices in Java: Challenges and Vulnerabilities
(Virginia Tech, 2017-09-28)
Java platform and third-party libraries provide various security features to facilitate secure coding. However, misusing these features can cost tremendous time and effort of developers or cause security vulnerabilities ...
A collaboration workflow from sound-based composition to performance of electroacoustic music using «Pure Data» as a framework.
(Bauhaus Universitat Weimer, 2011-08)
This paper describes a workflow for composers, engineers and performers to collaborate, using Pure Data (PD) as a framework, towards the design of electroacoustic musical instruments intended for live performances of ...
Are Ayurvedic herbs for diabetes effective?
(Frontline Medical Communications Inc., 2005-10)
Objective: To evaluate and synthesize the evidence on the effect of Ayurvedic therapies for diabetes mellitus.
Design: Systematic review of trials.
Measurements and main results: We found no study that assessed ...
Can Administrative Housing Data Replace Survey Data?
(HUD, 2017)
This article examines the feasibility of using local administrative data sources for enhancing and supplementing federally collected survey data to describe housing in Arlington County, Virginia. Using real estate assessment ...
Strategic Cyber Maneuver
(Small Wars Foundation, 2017-10-17)
Maneuver warfare is an integral part of the strategy, tactics and operations of the United States military, but what does it mean to maneuver in cyberspace?
<quote>
Maneuvering with an army is advantageous; with an ...