IS focuses on advancing and assuring the security of our vital social, political, and financial networks while balancing the crucial needs and expectations of privacy and governmental oversight. This mission cuts across four other destination areas and strategic growth areas, intersecting at key points of national interest where Virginia Tech has demonstrated expertise and capability: Security for the Internet of Everything: The interconnection of the digital world, the physical world, and humans interacting with both worlds. Governance and Ethics for Security: Questions and concerns about the adoption, use, and audit of security and privacy practices as they affect citizens and their government, consumers and business, and humans and their environment. Analytics for National Security and Preparedness: Using the capabilities of big data to improve security, forecasting, awareness, and resilience in response to disasters and for national defense.

Recent Submissions

  • Cyberbiosecurity Challenges of Pathogen Genome Databases 

    Vinatzer, Boris A.; Heath, Lenwood S.; Almohri, Hussain MJ J.; Stulberg, Michael J.; Lowe, Christopher; Li, Song (Frontiers, 2019-05-15)
    Pathogen detection, identification, and tracking is shifting from non-molecular methods, DNA fingerprinting methods, and single gene methods to methods relying on whole genomes. Viral Ebola and influenza genome data are ...
  • 2019 SAIC National Security Education Program Colloquium 

    Unknown author (Virginia Tech. Hume Center., 2019-04-16)
    The annual National Security Education Program Colloquium is the highlight of our educational programs. It allows students from across the university to interact with leaders from the intelligence and national security ...
  • Learning How to Communicate in the Internet of Things: Finite Resources and Heterogeneity 

    Park, Taehyeun; Abuzainab, Nof; Saad, Walid (IEEE, 2016)
    For a seamless deployment of the Internet of Things (IoT), there is a need for self-organizing solutions to overcome key IoT challenges that include data processing, resource management, coexistence with existing wireless ...
  • Mitigating the Impact of Renewable Variability With Demand-Side Resources Considering Communication and Cyber Security Limitations 

    Bian, Desong; Shi, Di; Pipattanasomporn, Manisa; Kuzlu, Murat; Rahman, Saifur (IEEE, 2019)
    With the rapid development of smart grid, the penetration of renewable energy resources is higher than ever and keeps growing. However, the output of renewable energy units, such as solar photovoltaics and wind turbines, ...
  • Big Data Meet Cyber-Physical Systems: A Panoramic Survey 

    Atat, Rachad; Liu, Lingjia; Wu, Jinsong; Li, Guangyu; Ye, Chunxuan; Yi, Yang (IEEE, 2018)
    The world is witnessing an unprecedented growth of cyber-physical systems (CPS), which are foreseen to revolutionize our world via creating new services and applications in a variety of sectors, such as environmental ...
  • Trust Management of Smart Service Communities 

    Al-Hamadi, Hamid; Chen, Ing-Ray; Cho, Jin-Hee (IEEE, 2019)
    In this paper, the notion of a smart service community is proposed to address the grand challenge of a huge number of the Internet-of-Things (IoT) devices providing similar services in a smart city environment (e.g., ...
  • Cyber War Game in Temporal Networks 

    Cho, Jin-Hee; Gao, Jianxi (PLOS, 2016-02-09)
    In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with ...
  • Conceptualizing Cyber Deterrence by Entanglement 

    Brantly, Aaron (2018-03-01)
    Dr. Brantly was invited to give one of three keynote lectures for the opening of the Cyber Governance and Policy Center at the University of Oklahoma.
  • Back to Reality: Cross domain deterrence and cyberspace 

    Brantly, Aaron (2018-09-01)
    This paper examines cross domain deterrence strategies involving cyber incidents. By focusing on efforts to halt Russian and Chinese cyber operations against the United States this paper examines the importance of developing, ...
  • Battling the Bear: Ukraine's Approach to National Cybersecurity 

    Brantly, Aaron (2018-09-29)
    Ukraine has faced substantial challenges across multiple fronts its successful 2014 Revolution of Dignity. Among the greatest challenges Ukraine has faced is the establishment of a national cybersecurity infrastructure ...
  • Creating Technological Surprise 

    Walker, Steven H. (Virginia Tech, 2018-10-05)
    This is an abstract from the 2018 Hugh and Ethel Kelly Lecture, "Creating Technological Surprise", presented by Dr. Steven H. Walker in Goodwin Hall on October 5, 2018.
  • Keystroke-Dynamics Authentication Against Synthetic Forgeries 

    Stefan, Deian; Yao, Danfeng (Daphne) (IEEE, 2010)
    We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called ...
  • Strategic Cyber Maneuver 

    Brantly, Aaron (Small Wars Foundation, 2017-10-17)
    Maneuver warfare is an integral part of the strategy, tactics and operations of the United States military, but what does it mean to maneuver in cyberspace? Maneuvering with an army is advantageous; with an ...
  • Distributed Storage Systems with Secure and Exact Repair - New Results 

    Tandon, Ravi; Amuru, SaiDhiraj; Clancy, T. Charles; Buehrer, R. Michael (IEEE, 2014-02)
    Distributed storage systems (DSS) in the presence of a passive eavesdropper are considered in this paper. A typical DSS is characterized by 3 parameters (n, k, d) where, a file is stored in a distributed manner across n ...
  • Security and Privacy produced by nHCP Unique Identifiers 

    Tront, Joseph G.; Groat, Stephen; Dunlop, Matthew; Marchany, Randolph C. (IEEE, 2011-10)
    As protection against the current privacy weaknesses of StateLess Address AutoConfiguration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrators may choose to deploy the new Dynamic Host Configuration ...
  • Personal Anomaly Detection and Smart-Phone Security 

    Xiong, Huijun; Yao, Danfeng (Daphne) (Virginia Tech, 2010-04-22)
    Mobile devices increasingly become the computing platform for networked applications such as Web and email. This development requires strong guarantees on the system integrity and data security of mobile devices against ...
  • Implementing Moving Target IPv6 Defense to Secure 6LoWPAN in the Internet of Things and Smart Grid 

    Sherburne, Matthew; Marchany, Randolph C.; Tront, Joseph G. (ACM Press, 2014)
    The growing momentum of the Internet of Things (IoT) has shown an increase in attack vectors within the security research community. We propose adapting a recent new approach of frequently changing IPv6 address assignment ...
  • Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation 

    Rahaman, Sazzadur; Cheng, Long; Yao, Danfeng (Daphne); Li, He; Park, Jung-Min (Jerry) (De Gruyter Open, 2017)
    Group signature schemes enable anonymous-yetaccountable communications. Such a capability is extremely useful for applications, such as smartphone-based crowdsensing and citizen science. However, the performance of modern ...
  • Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing 

    Shu, Xiaokui; Zhang, Jing; Yao, Danfeng (Daphne); Feng, Wu-Chun (ACM, 2015-03)
    The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., ...

View more