IS focuses on advancing and assuring the security of our vital social, political, and financial networks while balancing the crucial needs and expectations of privacy and governmental oversight. This mission cuts across four other destination areas and strategic growth areas, intersecting at key points of national interest where Virginia Tech has demonstrated expertise and capability: Security for the Internet of Everything: The interconnection of the digital world, the physical world, and humans interacting with both worlds. Governance and Ethics for Security: Questions and concerns about the adoption, use, and audit of security and privacy practices as they affect citizens and their government, consumers and business, and humans and their environment. Analytics for National Security and Preparedness: Using the capabilities of big data to improve security, forecasting, awareness, and resilience in response to disasters and for national defense.

Recent Submissions

  • Further Analysis of PRNG-Based Key Derivation Functions 

    McGinthy, Jason M.; Michaels, Alan J. (IEEE, 2019)
    The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked, security still is a major concern. Many of these sensors and devices have limitations, such ...
  • BRIoT: Behavior Rune Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems 

    Sharma, Vishal; You, Ilsun; Vim, Kangbin; Chen, Ing-Ray; Cho, Jin-Hee (IEEE, 2019)
    The identification of vulnerabilities in a mission-critical system is one of the challenges faced by a cyber-physical system (CPS). The incorporation of embedded Internet of Things (IoT) devices makes it tedious to identify ...
  • SmartFarm Innovation Network 

    Duncan, Susan; Ford, Ramsey (2019-10-04)
    This poster represents a variety of projects funded, in part, by the Virginia Agricultural Experiment Station, Virginia Tech Institute for Creativity, Arts, and Technology, NIFA, USDA NIFA and other funding sources. Some ...
  • Cyberbiosecurity: An Emerging New Discipline to Help Safeguard the Bioeconomy 

    Murch, Randall S.; So, William K.; Buchholz, Wallace G.; Raman, Sanjay; Peccoud, Jean (2018-04-05)
    Cyberbiosecurity is being proposed as a formal new enterprise which encompasses cybersecurity, cyber-physical security and biosecurity as applied to biological and biomedical-based systems. In recent years, an array of ...
  • Cyberbiosecurity: A New Perspective on Protecting US Food and Agricultural System 

    Duncan, Susan E.; Reinhard, Robert; Williams, Robert C.; Ramsey, Ford; Thomason, Wade; Lee, Kiho; Dudek, Nancy; Mostaghimi, Saied; Colbert, Edward; Murch, Randall S. (2019-03-29)
    Our national data and infrastructure security issues affecting the "bioeconomy" are evolving rapidly. Simultaneously, the conversation about cyber security of the U.S. food and agricultural system (cyber biosecurity) is ...
  • Cyberbiosecurity: A Call for Cooperation in a New Threat Landscape 

    Richardson, Lauren C.; Connell, Nancy D.; Lewis, Stephen M.; Pauwels, Eleonore; Murch, Randall S. (2019-06-06)
    The life sciences now interface broadly with information technology (IT) and cybersecurity. This convergence is a key driver in the explosion of biotechnology research and its industrial applications in health care, ...
  • Cyberbiosecurity Challenges of Pathogen Genome Databases 

    Vinatzer, Boris A.; Heath, Lenwood S.; Almohri, Hussain MJ J.; Stulberg, Michael J.; Lowe, Christopher; Li, Song (Frontiers, 2019-05-15)
    Pathogen detection, identification, and tracking is shifting from non-molecular methods, DNA fingerprinting methods, and single gene methods to methods relying on whole genomes. Viral Ebola and influenza genome data are ...
  • 2019 SAIC National Security Education Program Colloquium 

    Unknown author (Virginia Tech. Hume Center., 2019-04-16)
    The annual National Security Education Program Colloquium is the highlight of our educational programs. It allows students from across the university to interact with leaders from the intelligence and national security ...
  • Learning How to Communicate in the Internet of Things: Finite Resources and Heterogeneity 

    Park, Taehyeun; Abuzainab, Nof; Saad, Walid (IEEE, 2016)
    For a seamless deployment of the Internet of Things (IoT), there is a need for self-organizing solutions to overcome key IoT challenges that include data processing, resource management, coexistence with existing wireless ...
  • Mitigating the Impact of Renewable Variability With Demand-Side Resources Considering Communication and Cyber Security Limitations 

    Bian, Desong; Shi, Di; Pipattanasomporn, Manisa; Kuzlu, Murat; Rahman, Saifur (IEEE, 2019)
    With the rapid development of smart grid, the penetration of renewable energy resources is higher than ever and keeps growing. However, the output of renewable energy units, such as solar photovoltaics and wind turbines, ...
  • Big Data Meet Cyber-Physical Systems: A Panoramic Survey 

    Atat, Rachad; Liu, Lingjia; Wu, Jinsong; Li, Guangyu; Ye, Chunxuan; Yi, Yang (IEEE, 2018)
    The world is witnessing an unprecedented growth of cyber-physical systems (CPS), which are foreseen to revolutionize our world via creating new services and applications in a variety of sectors, such as environmental ...
  • Trust Management of Smart Service Communities 

    Al-Hamadi, Hamid; Chen, Ing-Ray; Cho, Jin-Hee (IEEE, 2019)
    In this paper, the notion of a smart service community is proposed to address the grand challenge of a huge number of the Internet-of-Things (IoT) devices providing similar services in a smart city environment (e.g., ...
  • Cyber War Game in Temporal Networks 

    Cho, Jin-Hee; Gao, Jianxi (PLOS, 2016-02-09)
    In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with ...
  • Conceptualizing Cyber Deterrence by Entanglement 

    Brantly, Aaron (2018-03-01)
    Dr. Brantly was invited to give one of three keynote lectures for the opening of the Cyber Governance and Policy Center at the University of Oklahoma.
  • Back to Reality: Cross domain deterrence and cyberspace 

    Brantly, Aaron (2018-09-01)
    This paper examines cross domain deterrence strategies involving cyber incidents. By focusing on efforts to halt Russian and Chinese cyber operations against the United States this paper examines the importance of developing, ...
  • Battling the Bear: Ukraine's Approach to National Cybersecurity 

    Brantly, Aaron (2018-09-29)
    Ukraine has faced substantial challenges across multiple fronts its successful 2014 Revolution of Dignity. Among the greatest challenges Ukraine has faced is the establishment of a national cybersecurity infrastructure ...
  • Creating Technological Surprise 

    Walker, Steven H. (Virginia Tech, 2018-10-05)
    This is an abstract from the 2018 Hugh and Ethel Kelly Lecture, "Creating Technological Surprise", presented by Dr. Steven H. Walker in Goodwin Hall on October 5, 2018.
  • Keystroke-Dynamics Authentication Against Synthetic Forgeries 

    Stefan, Deian; Yao, Danfeng (Daphne) (IEEE, 2010)
    We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called ...
  • Strategic Cyber Maneuver 

    Brantly, Aaron (Small Wars Foundation, 2017-10-17)
    Maneuver warfare is an integral part of the strategy, tactics and operations of the United States military, but what does it mean to maneuver in cyberspace? Maneuvering with an army is advantageous; with an ...

View more