Now showing items 9-28 of 88

    • Battling the Bear: Ukraine's Approach to National Cybersecurity 

      Brantly, A (2018-09-29)
      Ukraine has faced substantial challenges across multiple fronts its successful 2014 Revolution of Dignity. Among the greatest challenges Ukraine has faced is the establishment of a national cybersecurity infrastructure ...
    • ‘Beating the news’ with EMBERS: Forecasting Civil Unrest using Open Source Indicators 

      Ramakrishnan, N; Butler, P; Self, N; Khandpur, R; Saraf, P; Wang, W; Cadena, J; Vullikanti, A; Korkmaz, G; Kuhlman, C; Marathe, A; Zhao, L; Ting, H; Huang, B; Srinivasan, A; Trinh, K; Getoor, L; Katz, G; Doyle, A; Ackermann, C; Zavorin, I; Ford, J; Summers, K; Fayed, Y; Arredondo, J; Gupta, D; Mares, D (2014)
    • Between a Rock and a Cell Phone: Social Media Use during Mass Protests in Iran, Tunisia and Egypt 

      Kavanaugh, Andrea L.; Yang, Seungwon; Sheetz, Steven D.; Li, Lin Tzy; Fox, Edward A. (Department of Computer Science, Virginia Polytechnic Institute & State University, 2011-05-01), TR-11-10
      In this paper we examine the use of social media, and especially Twitter, in Iran, Tunisia and Egypt during the mass political demonstrations and protests in June 2009, December 2010 - January 2011, and February 2011, ...
    • Bitcoin and Cryptocurrencies 

      Vasek, Marie; Jardine, Eric; Brantly, Aaron (Virginia Tech, 2018-05-18)
      This panel includes three presentations: “Cryptocurrencies and Financial Crimes” by Marie Vasek; “Cryptocurrencies and Specific Drug Types” by Eric Jardine; and “Bitcoin and OPSEC for Terrorists” by Aaron Brantly. (Please ...
    • CCS 2017- Women in Cyber Security (CyberW) Workshop 

      Yao, Danfeng (Daphne); Bertino, Elisa (ACM, 2017)
      The CyberW workshop is motivated by the significant gender imbalance in all security conferences, in terms of the number of publishing authors, PC members, organizers, and attendees. What causes this gender imbalance remains ...
    • Civil Cyberconflict: Microsoft, Cybercrime, and Botnets 

      Hiller, Janine S. (Santa Clara University School of Law, 2014-01)
      Cyber “warfare” and hackback by private companies is a hot discussion topic for its potential to fight cybercrime and promote cybersecurity. In the shadow of this provocative discussion, Microsoft has led a concerted, ...
    • Conceptualizing Cyber Deterrence by Entanglement 

      Brantly, A (2018-03-01)
      Dr. Brantly was invited to give one of three keynote lectures for the opening of the Cyber Governance and Policy Center at the University of Oklahoma.
    • Countering the Cyber Threat 

      Brantly, AF; Henry, S (The Army Cyber Institute, 2018-05-09)
    • Creating Technological Surprise 

      Walker, Steven H. (Virginia Tech, 2018-10-05)
      This is an abstract from the 2018 Hugh and Ethel Kelly Lecture, "Creating Technological Surprise", presented by Dr. Steven H. Walker in Goodwin Hall on October 5, 2018.
    • The Cyber Deterrence Problem 

      Brantly, AF (Nato Ccd Coe, 2018-05-30)
      What is the role of deterrence in an age where adept hackers can credibly hold strategic assets at risk? Do conventional frameworks of deterrence maintain their applicability and meaning against state actors in cyberspace? ...
    • The Cyber Losers 

      Brantly, AF (2014-05-22)
    • Cyber War Game in Temporal Networks 

      Cho, Jin-Hee; Gao, Jianxi (PLOS, 2016-02-09)
      In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with ...
    • Data Leak Detection As a Service: Challenges and Solutions 

      Shu, Xiaokui; Yao, Danfeng (Daphne) (Department of Computer Science, Virginia Polytechnic Institute & State University, 2012), TR-12-10
      We describe a network-based data-leak detection (DLD) technique, the main feature of which is that the detection does not require the data owner to reveal the content of the sensitive data. Instead, only a small amount of ...
    • A Database Driven Initial Ontology for Crisis, Tragedy, and Recovery 

      Sheetz, Steven D. (2011-05-01)
      Many databases and supporting software have been developed to track the occurrences of natural disasters, manmade disasters, and combinations of the two. Each of the databases developed in this context, define their own ...
    • Deep/Dark Web & Higher Education 

      Moore, Kathleen (Virginia Tech, 2018-05-18)
      This presentation was given as part of the conference "Understanding the Dark Web and Its Implications for Policy" held on May 18, 2018 at the Virginia Tech Executive Briefing Center in Arlington, Virginia.
    • DEFENDING THE BORDERLAND Ukrainian Military Experiences with IO, Cyber, and EW 

      Brantly, AF; Cal, N; Winkelstein, D (Army Cyber Institute, 2017-12-01)
    • Detecting Malicious Landing Pages in Malware Distribution Networks 

      Wang, Gang; Stokes, Jack W.; Herley, Cormac; Felstead, David (IEEE, 2013-06)
      Drive-by download attacks attempt to compromise a victim’s computer through browser vulnerabilities. Often they are launched from Malware Distribution Networks (MDNs) consisting of landing pages to attract traffic, ...
    • Determining Relative Airport Threats from News and Social Media 

      Khandpur, Rupinder P.; Ji, Taoran; Ning, Yue; Zhao, Liang; Lu, Chang-Tien; Smith, Erik R.; Adams, Christopher; Ramakrishnan, Naren (AAAI, 2017)
      Airports are a prime target for terrorist organizations, drug traffickers, smugglers, and other nefarious groups. Traditional forms of security assessment are not real-time and often do not exist for each airport and port ...