VTechWorks staff will be away for the Thanksgiving holiday starting November 24 through November 28, and will not be replying to requests during this time. Thank you for your patience.
 

IS focuses on advancing and assuring the security of our vital social, political, and financial networks while balancing the crucial needs and expectations of privacy and governmental oversight. This mission cuts across four other destination areas and strategic growth areas, intersecting at key points of national interest where Virginia Tech has demonstrated expertise and capability: Security for the Internet of Everything: The interconnection of the digital world, the physical world, and humans interacting with both worlds. Governance and Ethics for Security: Questions and concerns about the adoption, use, and audit of security and privacy practices as they affect citizens and their government, consumers and business, and humans and their environment. Analytics for National Security and Preparedness: Using the capabilities of big data to improve security, forecasting, awareness, and resilience in response to disasters and for national defense.

Recent Submissions

  • Designing a Block Cipher in Galois Extension Fields for IoT Security 

    George, Kiernan; Michaels, Alan J. (MDPI, 2021-11-05)
    This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique ...
  • Assessing the Role of Cyberbiosecurity in Agriculture: A Case Study 

    Drape, Tiffany; Magerkorth, Noah; Sen, Anuradha; Simpson, Joseph; Seibel, Megan; Murch, Randall Steven; Duncan, Susan E. (Frontiers, 2021-08-19)
    Agriculture has adopted the use of smart technology to help meet growing food demands. This increased automation and associated connectivity increases the risk of farms being targeted by cyber-attacks. Increasing frequency ...
  • Cyberphysical Security Through Resiliency: A Systems-Centric Approach 

    Fleming, Cody; Elks, Carl R.; Bakirtzis, Georgios; Adams, Stephen C.; Carter, Bryan; Beling, Peter A.; Horowitz, Barry (2021-06)
    Cyberphysical systems require resiliency techniques for defense, and multicriteria resiliency problems need an approach that evaluates systems for current threats and potential design solutions. A systems-oriented view of ...
  • Attacks and Defenses for Single-Stage Residue Number System PRNGs 

    Vennos, Amy; George, Kiernan; Michaels, Alan (MDPI, 2021-06-25)
    This paper explores the security of a single-stage residue number system (RNS) pseudorandom number generator (PRNG), which has previously been shown to provide extremely high-quality outputs when evaluated through available ...
  • Optimize the Communication Cost of 5G Internet of Vehicles through Coherent Beamforming Technology 

    Wu, Lan; Xu, Juan; Shi, Lei; Shi, Yi; Zhou, Wenwen (Hindawi, 2021-05-17)
    Edge computing, which sinks a large number of complex calculations into edge servers, can effectively meet the requirement of low latency and bandwidth efficiency and can be conducive to the development of the Internet of ...
  • Risk and uncertainty can be analyzed in cyberspace 

    Brantly, Aaron F. (Oxford University Press, 2021-02-23)
    Perceptions of risk and uncertainty are pervasive in all international interactions. How states perceive risk and uncertainty and how they respond to these conditions impacts their policies and diplomatic behaviors. Despite ...
  • Improving vulnerability remediation through better exploit prediction 

    Jacobs, Jay; Romanosky, Sasha; Adjerid, Idris; Baker, Wade (2020-09-14)
    Despite significant innovations in IT security products and research over the past 20 years, the information security field is still immature and struggling. Practitioners lack the ability to properly assess cyber risk, ...
  • The potential harms of the Tor anonymity network cluster disproportionately in free countries 

    Jardine, Eric; Lindner, Andrew M.; Owenson, Gareth (National Academy of Sciences, 2020-11-30)
    The Tor anonymity network allows users to protect their privacy and circumvent censorship restrictions but also shields those distributing child abuse content, selling or buying illicit drugs, or sharing malware online. ...
  • On market concentration and cybersecurity risk 

    Geer, Dan; Jardine, Eric; Leverett, Eireann (Taylor & Francis, 2020-02-24)
    Market concentration affects each component of the cybersecurity risk equation (i.e. threat, vulnerability and impact). As the Internet ecosystem becomes more concentrated across a number of vectors from users and incoming ...
  • Further Analysis of PRNG-Based Key Derivation Functions 

    McGinthy, Jason M.; Michaels, Alan J. (IEEE, 2019)
    The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked, security still is a major concern. Many of these sensors and devices have limitations, such ...
  • On Data Center Demand Response: A Cloud Federation Approach 

    Moghaddam, Monireh Mohebbi; Manshaei, Mohammad Hossein; Saad, Walid; Goudarzi, Maziar (IEEE, 2019)
    The significantly high energy consumption of data centers constitutes a major load on the smart power grid. Data center demand response is a promising solution to incentivize the cloud providers to adapt their consumption ...
  • BRIoT: Behavior Rune Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems 

    Sharma, Vishal; You, Ilsun; Vim, Kangbin; Chen, Ing-Ray; Cho, Jin-Hee (IEEE, 2019)
    The identification of vulnerabilities in a mission-critical system is one of the challenges faced by a cyber-physical system (CPS). The incorporation of embedded Internet of Things (IoT) devices makes it tedious to identify ...
  • SmartFarm Innovation Network 

    Duncan, Susan; Ford, Ramsey (2019-10-04)
    This poster represents a variety of projects funded, in part, by the Virginia Agricultural Experiment Station, Virginia Tech Institute for Creativity, Arts, and Technology, NIFA, USDA NIFA and other funding sources. Some ...
  • Cyberbiosecurity: An Emerging New Discipline to Help Safeguard the Bioeconomy 

    Murch, Randall S.; So, William K.; Buchholz, Wallace G.; Raman, Sanjay; Peccoud, Jean (2018-04-05)
    Cyberbiosecurity is being proposed as a formal new enterprise which encompasses cybersecurity, cyber-physical security and biosecurity as applied to biological and biomedical-based systems. In recent years, an array of ...
  • Cyberbiosecurity: A Call for Cooperation in a New Threat Landscape 

    Richardson, Lauren C.; Connell, Nancy D.; Lewis, Stephen M.; Pauwels, Eleonore; Murch, Randall S. (2019-06-06)
    The life sciences now interface broadly with information technology (IT) and cybersecurity. This convergence is a key driver in the explosion of biotechnology research and its industrial applications in health care, ...
  • Cyberbiosecurity: A New Perspective on Protecting US Food and Agricultural System 

    Duncan, Susan E.; Reinhard, Robert; Williams, Robert C.; Ramsey, Ford; Thomason, Wade E.; Lee, Kiho; Dudek, Nancy; Mostaghimi, Saied; Colbert, Edward; Murch, Randall S. (2019-03-29)
    Our national data and infrastructure security issues affecting the "bioeconomy" are evolving rapidly. Simultaneously, the conversation about cyber security of the U.S. food and agricultural system (cyber biosecurity) is ...
  • Cyberbiosecurity Challenges of Pathogen Genome Databases 

    Vinatzer, Boris A.; Heath, Lenwood S.; Almohri, Hussain MJ J.; Stulberg, Michael J.; Lowe, Christopher; Li, Song (Frontiers, 2019-05-15)
    Pathogen detection, identification, and tracking is shifting from non-molecular methods, DNA fingerprinting methods, and single gene methods to methods relying on whole genomes. Viral Ebola and influenza genome data are ...
  • 2019 SAIC National Security Education Program Colloquium 

    Unknown author (Virginia Tech. Hume Center., 2019-04-16)
    The annual National Security Education Program Colloquium is the highlight of our educational programs. It allows students from across the university to interact with leaders from the intelligence and national security ...
  • An Open Source Modeling Framework for Interdependent Energy-Transportation-Communication Infrastructure in Smart and Connected Communities 

    Lu, Xing; Hinkelman, Kathryn; Fu, Yangyang; Wang, Jing; Zuo, Wangda; Zhang, Qianqian; Saad, Walid (IEEE, 2019)
    Infrastructure in future smart and connected communities is envisioned as an aggregate of public services, including energy, transportation, and communication systems, all intertwined with each other. The intrinsic ...
  • Learning How to Communicate in the Internet of Things: Finite Resources and Heterogeneity 

    Park, Taehyeun; Abuzainab, Nof; Saad, Walid (IEEE, 2016)
    For a seamless deployment of the Internet of Things (IoT), there is a need for self-organizing solutions to overcome key IoT challenges that include data processing, resource management, coexistence with existing wireless ...

View more