Now showing items 63-82 of 88

    • Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing 

      Shu, Xiaokui; Zhang, Jing; Yao, Danfeng (Daphne); Feng, Wu-Chun (ACM, 2015-03)
      The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., ...
    • Rapporteur Report: Understanding the Dark Web and its Implications for Policy 

      Jardine, Eric (Virginia Tech, 2018-05)
      The Understanding the Dark Web and Its Implications for Policy conference focused on addressing the challenging dilemmas posed by the anonymity created by the “Dark Web” (the unindexed portion of the Internet only accessible ...
    • Religiosity and Information Security Policy Compliance 

      Borena, Berhanu; Belanger, Francé (AMCIS, 2013-08)
      Information security is a top concern of managers, often addressed with technical, behavioral and procedural solutions. Information Security Policies (ISPs) are among these solutions. ISPs require organizational members ...
    • Secure Coding Practices in Java: Challenges and Vulnerabilities 

      Meng, Na; Nagy, Stefan; Yao, Daphne; Zhuang, Wenjie; Argoty, Gustavo Arango (Virginia Tech, 2017-09-28)
      Java platform and third-party libraries provide various security features to facilitate secure coding. However, misusing these features can cost tremendous time and effort of developers or cause security vulnerabilities ...
    • Security and Privacy produced by nHCP Unique Identifiers 

      Tront, Joseph; Groat, Stephen; Dunlop, Matthew; Marchany, Randy (IEEE, 2011-10)
      As protection against the current privacy weaknesses of StateLess Address AutoConfiguration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrators may choose to deploy the new Dynamic Host Configuration ...
    • Social Media for Cities, Counties and Communities 

      Kavanaugh, Andrea L.; Fox, Edward A.; Sheetz, Steven D.; Yang, Seungwon; Li, Lin Tzy; Whalen, Travis; Shoemaker, Donald J.; Natsev, Apostol; Xie, Lexing (Department of Computer Science, Virginia Polytechnic Institute & State University, 2011), TR-11-09
    • Social Media Use by Government: From the Routine to the Critical 

      Kavanaugh, Andrea L.; Fox, Edward A.; Sheetz, Steven D.; Yang, Seungwon; Li, Lin T.; Whalen, Travis; Shoemaker, Donald J.; Natsev, Paul; Xie, Lexing (2011-06-01)
      Social media (i.e., Twitter, Facebook, Flickr, YouTube) and other services with user-generated content have made a staggering amount of information (and misinformation) available. Government officials seek to leverage these ...
    • Social Turing Tests: Crowdsourcing Sybil Detection 

      Wang, Gang; Mohanlal, Manish; Wilson, Christo; Wang, Xiao; Metzger, Miriam; Zheng, Haitao; Zhao, Ben Y. (Internet Society, 2013-02)
      As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks (OSNs). Today, sophisticated attackers are creating realistic Sybils ...
    • A Static Assurance Analysis of Android Applications 

      Elish, Karim O.; Yao, Danfeng (Daphne); Ryder, Barbara G.; Jiang, Xuxian (Department of Computer Science, Virginia Polytechnic Institute & State University, 2013-07-11), TR-13-03
      We describe an efficient approach to identify malicious Android applications through specialized static program analysis. Our solution – referred to as user intention program dependence analysis – performs offline analysis ...
    • Storytelling Security: User-Intention Based Traffic Sanitization 

      Xiong, Huijun; Yao, Danfeng (Daphne); Zhang, Zhibin (Department of Computer Science, Virginia Polytechnic Institute & State University, 2010-12-01), TR-10-15
    • Strategic Cyber Maneuver 

      Brantly, Aaron F. (Small Wars Foundation, 2017-10-17)
      Maneuver warfare is an integral part of the strategy, tactics and operations of the United States military, but what does it mean to maneuver in cyberspace? Maneuvering with an army is advantageous; with an ...
    • Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities 

      Basam, Dileep; Ransbottom, J. Scot; Marchany, Randy; Tront, Joseph G. (Hindawi, 2016-04-20)
      Moving Target IPv6 Defense (MT6D) imparts radio-frequency hopping behavior to IPv6 networks by having participating nodes periodically hop onto new addresses while giving up old addresses. Our previous research efforts ...
    • The Mobile Privacy-Security Knowledge Gap Model: Understanding Behaviors 

      Crossler, Robert E.; Bélanger, France (Hawaii International Conference on System Sciences, 2017-01-04)
      Increasing collection of individuals’ information has led to several security and privacy issues, such as identity theft and targeted marketing. These risks are further heightened in the mobile realm as data collection can ...
    • Towards Optimal Secure Distributed Storage Systems with Exact Repair 

      Tandon, Ravi; Amuru, SaiDhiraj; Clancy, T. Charles; Buehrer, R. Michael (IEEE, 2016-06)
      Distributed storage systems in the presence of a wiretapper are considered. A distributed storage system (DSS) is parameterized by three parameters (𝑛, 𝑘, 𝑑), in which a file stored across n distributed nodes, can be ...
    • Twitter Use During an Emergency Event: The Case of UT Austin Shooting 

      Li, Lin T.; Yang, Seungwon; Kavanaugh, Andrea L.; Fox, Edward A.; Sheetz, Steven D.; Shoemaker, Donald J. (2011-06-01)
      This poster presents one of our efforts developed in the context of Crisis, Tragedy, and Recovery Network (CTRnet) project. One of our derived works from this project is the use of social media by government to respond to ...
    • Understanding the Dark Web and its Implications for Policy (flyer) 

      Jardine, Eric (Virginia Tech, 2018-05-18)
      How to deal with the negative excesses of the Dark Web and other anonymity-granting technologies without harming those who use these tools for benign activities is one of today’s most pressing policy challenges. This ...
    • Understanding the Dark Web and its Implications for Policy (program) 

      Jardine, Eric (Virginia Tech, 2018-05-18)
      The program includes the agenda, speakers, and sponsors.
    • Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths 

      Shu, Xiaokui; Yao, Danfeng (Daphne); Ramakrishnan, Naren (ACM, 2015-10)
      Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate and alter the control flow legally. Existing ...
    • Unsupervised Spatial Event Detection in Targeted Domains with Applications to Civil Unrest Modeling 

      Zhao, L; Chen, F; Dai, J; Hua, T; Lu, C-T; Ramakrishnan, N (PLOS, 2014-10-28)