IS focuses on advancing and assuring the security of our vital social, political, and financial networks while balancing the crucial needs and expectations of privacy and governmental oversight. This mission cuts across four other destination areas and strategic growth areas, intersecting at key points of national interest where Virginia Tech has demonstrated expertise and capability: Security for the Internet of Everything: The interconnection of the digital world, the physical world, and humans interacting with both worlds. Governance and Ethics for Security: Questions and concerns about the adoption, use, and audit of security and privacy practices as they affect citizens and their government, consumers and business, and humans and their environment. Analytics for National Security and Preparedness: Using the capabilities of big data to improve security, forecasting, awareness, and resilience in response to disasters and for national defense.

Recent Submissions

  • Understanding the Challenges of Cryptography-Related Cybercrime and Its Investigation 

    Choi, Sinyong; Parti, Katalin (Boston University, 2022-08-22)
    Cryptography has been applied to a range of modern technologies which criminals also exploit to gain criminal rewards while hiding their identity. Although understanding of cybercrime involving this technique is necessary ...
  • Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas 

    Kim, Brian; Sagduyu, Yalin; Davaslioglu, Kemal; Erpek, Tugba; Ulukus, Sennur (MDPI, 2022-07-29)
    This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest. There exists one transmitter that transmits to its receiver ...
  • Integrating Cybersecurity and Agricultural Innovation 

    Drape, Tiffany A.; Thompson, Cris; Johnson, Kellie; Brown, Anne M.; Simpson, Joseph; Oakes, Joseph; Duncan, Sue; Westfall-Rudd, Donna M. (Virginia Tech, 2022-08-10)
    This 1-2 credit undergraduate course, as presented, is designed to provide an interdisciplinary, experiential-learning-based background and exposure to working on and completing a team project in cyberbiosecurity in ...
  • CyberBioSecurity through Leadership-as-Practice Development 

    Kaufman, Eric K.; Adeoye, Samson; Batarseh, Feras; Brown, Anne M.; Drape, Tiffany; Duncan, Susan; Rutherford, Tracy; Strawn, Laura; Xia, Kang (2022-03-28)
    CyberBioSecurity is an emerging field at the interface of life sciences and digital worlds (Murch, 2018). The solution to the global cyberbiosecurity challenge is not merely technical; society needs cyberbiosecurity ...
  • Going beyond deterrence: A middle-range theory of motives and controls for insider computer abuse 

    Burns, A. J.; Roberts, Tom L.; Posey, Clay; Lowry, Paul Benjamin; Fuller, Bryan (Institute for Operations Research and Management Sciences, 2022-04)
    Despite widespread agreement among practitioners and academicians that organizational insiders are a significant threat to organizational information systems security, insider computer abuse (ICA)—unauthorized and deliberate ...
  • Measurement of Local Differential Privacy Techniques for IoT-based Streaming Data 

    Afrose, Sharmin; Yao, Danfeng (Daphne); Kotevska, Olivera (IEEE, 2021-01-01)
    Various Internet of Things (IoT) devices generate complex, dynamically changed, and infinite data streams. Adversaries can cause harm if they can access the user's sensitive raw streaming data. For this reason, protecting ...
  • Policing the Dark Web: Legal Challenges in the 2015 Playpen Case 

    Chertoff, Michael; Jardine, Eric (2021-11-11)
    The dark web allows for anonymous browsing and publishing of content and is inherently cross-border by design. Law enforcement’s best tool to police anonymous dark web sites is a suite of technologies known as “network ...
  • Battling the bear: Ukraine's approach to national cyber and information security 

    Brantly, Aaron F. (Routledge, 2022-01)
    Ukraine has faced substantial challenges across multiple fronts in its successful 2014 Revolution of Dignity. Among the greatest challenges Ukraine has faced is the establishment of a national cybersecurity infrastructure ...
  • The Internet of Things, Fog and Cloud continuum: Integration and challenges 

    Bittencourt, Luiz; Immich, Roger; Sakellariou, Rizos; Fonseca, Nelson; Madeira, Edmundo; Curado, Marilia; Villas, Leandro; DaSilva, Luiz A.; Lee, Craig; Rana, Omer (Elsevier, 2018-10-01)
    The Internet of Things needs for computing power and storage are expected to remain on the rise in the next decade. Consequently, the amount of data generated by devices at the edge of the network will also grow. While ...
  • Designing a Block Cipher in Galois Extension Fields for IoT Security 

    George, Kiernan; Michaels, Alan J. (MDPI, 2021-11-05)
    This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique ...
  • Assessing the Role of Cyberbiosecurity in Agriculture: A Case Study 

    Drape, Tiffany; Magerkorth, Noah; Sen, Anuradha; Simpson, Joseph; Seibel, Megan M.; Murch, Randall Steven; Duncan, Susan E. (Frontiers, 2021-08-19)
    Agriculture has adopted the use of smart technology to help meet growing food demands. This increased automation and associated connectivity increases the risk of farms being targeted by cyber-attacks. Increasing frequency ...
  • Cyberphysical Security Through Resiliency: A Systems-Centric Approach 

    Fleming, Cody H.; Elks, Carl R.; Bakirtzis, Georgios; Adams, Stephen C.; Carter, Bryan; Beling, Peter A.; Horowitz, Barry M. (2021-06)
    Cyberphysical systems require resiliency techniques for defense, and multicriteria resiliency problems need an approach that evaluates systems for current threats and potential design solutions. A systems-oriented view of ...
  • Attacks and Defenses for Single-Stage Residue Number System PRNGs 

    Vennos, Amy; George, Kiernan; Michaels, Alan J. (MDPI, 2021-06-25)
    This paper explores the security of a single-stage residue number system (RNS) pseudorandom number generator (PRNG), which has previously been shown to provide extremely high-quality outputs when evaluated through available ...
  • Optimize the Communication Cost of 5G Internet of Vehicles through Coherent Beamforming Technology 

    Wu, Lan; Xu, Juan; Shi, Lei; Shi, Yi; Zhou, Wenwen (Hindawi, 2021-05-17)
    Edge computing, which sinks a large number of complex calculations into edge servers, can effectively meet the requirement of low latency and bandwidth efficiency and can be conducive to the development of the Internet of ...
  • Risk and uncertainty can be analyzed in cyberspace 

    Brantly, Aaron F. (Oxford University Press, 2021-02-23)
    Perceptions of risk and uncertainty are pervasive in all international interactions. How states perceive risk and uncertainty and how they respond to these conditions impacts their policies and diplomatic behaviors. Despite ...
  • Improving vulnerability remediation through better exploit prediction 

    Jacobs, Jay; Romanosky, Sasha; Adjerid, Idris; Baker, Wade (2020-09-14)
    Despite significant innovations in IT security products and research over the past 20 years, the information security field is still immature and struggling. Practitioners lack the ability to properly assess cyber risk, ...
  • The potential harms of the Tor anonymity network cluster disproportionately in free countries 

    Jardine, Eric; Lindner, Andrew M.; Owenson, Gareth (National Academy of Sciences, 2020-11-30)
    The Tor anonymity network allows users to protect their privacy and circumvent censorship restrictions but also shields those distributing child abuse content, selling or buying illicit drugs, or sharing malware online. ...
  • On market concentration and cybersecurity risk 

    Geer, Dan; Jardine, Eric; Leverett, Eireann (Taylor & Francis, 2020-02-24)
    Market concentration affects each component of the cybersecurity risk equation (i.e. threat, vulnerability and impact). As the Internet ecosystem becomes more concentrated across a number of vectors from users and incoming ...
  • On Data Center Demand Response: A Cloud Federation Approach 

    Moghaddam, Monireh Mohebbi; Manshaei, Mohammad Hossein; Saad, Walid; Goudarzi, Maziar (IEEE, 2019)
    The significantly high energy consumption of data centers constitutes a major load on the smart power grid. Data center demand response is a promising solution to incentivize the cloud providers to adapt their consumption ...
  • Further Analysis of PRNG-Based Key Derivation Functions 

    McGinthy, Jason M.; Michaels, Alan J. (IEEE, 2019)
    The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked, security still is a major concern. Many of these sensors and devices have limitations, such ...

View more