Browsing Destination Area: Integrated Security (IS) by Title
Now showing items 14-33 of 88
-
CCS 2017- Women in Cyber Security (CyberW) Workshop
(ACM, 2017)The CyberW workshop is motivated by the significant gender imbalance in all security conferences, in terms of the number of publishing authors, PC members, organizers, and attendees. What causes this gender imbalance remains ... -
Civil Cyberconflict: Microsoft, Cybercrime, and Botnets
(Santa Clara University School of Law, 2014-01)Cyber “warfare” and hackback by private companies is a hot discussion topic for its potential to fight cybercrime and promote cybersecurity. In the shadow of this provocative discussion, Microsoft has led a concerted, ... -
Conceptualizing Cyber Deterrence by Entanglement
(2018-03-01)Dr. Brantly was invited to give one of three keynote lectures for the opening of the Cyber Governance and Policy Center at the University of Oklahoma. -
Countering the Cyber Threat
(The Army Cyber Institute, 2018-05-09) -
Creating Technological Surprise
(Virginia Tech, 2018-10-05)This is an abstract from the 2018 Hugh and Ethel Kelly Lecture, "Creating Technological Surprise", presented by Dr. Steven H. Walker in Goodwin Hall on October 5, 2018. -
Cyber Actions by State Actors: Motivation and Utility
(2014-05-12) -
The Cyber Deterrence Problem
(Nato Ccd Coe, 2018-05-30)What is the role of deterrence in an age where adept hackers can credibly hold strategic assets at risk? Do conventional frameworks of deterrence maintain their applicability and meaning against state actors in cyberspace? ... -
The Cyber Losers
(2014-05-22) -
Cyber War Game in Temporal Networks
(PLOS, 2016-02-09)In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with ... -
Data Leak Detection As a Service: Challenges and Solutions
(Department of Computer Science, Virginia Polytechnic Institute & State University, 2012), TR-12-10 -
A Database Driven Initial Ontology for Crisis, Tragedy, and Recovery
(2011-05-01)Many databases and supporting software have been developed to track the occurrences of natural disasters, manmade disasters, and combinations of the two. Each of the databases developed in this context, define their own ... -
Deep/Dark Web & Higher Education
(Virginia Tech, 2018-05-18)This presentation was given as part of the conference "Understanding the Dark Web and Its Implications for Policy" held on May 18, 2018 at the Virginia Tech Executive Briefing Center in Arlington, Virginia. -
DEFENDING THE BORDERLAND Ukrainian Military Experiences with IO, Cyber, and EW
(Army Cyber Institute, 2017-12-01) -
Detecting Malicious Landing Pages in Malware Distribution Networks
(IEEE, 2013-06)Drive-by download attacks attempt to compromise a victim’s computer through browser vulnerabilities. Often they are launched from Malware Distribution Networks (MDNs) consisting of landing pages to attract traffic, ... -
Determining Relative Airport Threats from News and Social Media
(AAAI, 2017)Airports are a prime target for terrorist organizations, drug traffickers, smugglers, and other nefarious groups. Traditional forms of security assessment are not real-time and often do not exist for each airport and port ... -
Device-Based Isolation for Securing Cryptographic Keys
(Department of Computer Science, Virginia Polytechnic Institute & State University, 2012), TR-12-21 -
Distributed Storage Systems with Secure and Exact Repair - New Results
(IEEE, 2014-02)Distributed storage systems (DSS) in the presence of a passive eavesdropper are considered in this paper. A typical DSS is characterized by 3 parameters (n, k, d) where, a file is stored in a distributed manner across n ... -
Dynamical Processes on Large Networks (CS Seminar Lecture Series)
(2012-03-23)How do contagions spread in population networks? Which group should we market to, for maximizing product penetration? Will a given YouTube video go viral? Who are the best people to vaccinate? What happens when two products ... -
An Early Event in Adipogenesis, the Nuclear Selection of the CCAAT Enhancer-binding Protein ß (C/EBP ß ) mRNA by HuR and its Translocation to the Cytosol2006
(American Society for Biochemistry and Molecular Biology, 2006-07)HuR is a ligand for nuclear mRNAs containing adenylate-uridylate-rich elements in the 3_-untranslated region. Once bound to the mRNA, HuR is recognized by adapter proteins that then facilitate nuclear export of the complex. ... -
Enterprise data breach: causes, challenges, prevention, and future directions
(Wiley, 2017)A data breach is the intentional or inadvertent exposure of confidential information to unauthorized parties. In the digital era, data has become one of the most critical components of an enterprise. Data leakage poses ...