Now showing items 28-47 of 94

    • DEFENDING THE BORDERLAND Ukrainian Military Experiences with IO, Cyber, and EW 

      Brantly, AF; Cal, N; Winkelstein, D (Army Cyber Institute, 2017-12-01)
    • Detecting Malicious Landing Pages in Malware Distribution Networks 

      Wang, Gang; Stokes, Jack W.; Herley, Cormac; Felstead, David (IEEE, 2013-06)
      Drive-by download attacks attempt to compromise a victim’s computer through browser vulnerabilities. Often they are launched from Malware Distribution Networks (MDNs) consisting of landing pages to attract traffic, ...
    • Determining Relative Airport Threats from News and Social Media 

      Khandpur, Rupinder P.; Ji, Taoran; Ning, Yue; Zhao, Liang; Lu, Chang-Tien; Smith, Erik R.; Adams, Christopher; Ramakrishnan, Naren (AAAI, 2017)
      Airports are a prime target for terrorist organizations, drug traffickers, smugglers, and other nefarious groups. Traditional forms of security assessment are not real-time and often do not exist for each airport and port ...
    • Device-Based Isolation for Securing Cryptographic Keys 

      Elish, Karim O.; Deng, Yipan; Yao, Danfeng (Daphne); Kafura, Dennis G. (Department of Computer Science, Virginia Polytechnic Institute & State University, 2012), TR-12-21
      In this work, we describe an eective device-based isolation approach for achieving data security. Device-based isolation leverages the proliferation of personal computing devices to provide strong run-time guarantees for ...
    • Distributed Storage Systems with Secure and Exact Repair - New Results 

      Tandon, Ravi; Amuru, SaiDhiraj; Clancy, T. Charles; Buehrer, R. Michael (IEEE, 2014-02)
      Distributed storage systems (DSS) in the presence of a passive eavesdropper are considered in this paper. A typical DSS is characterized by 3 parameters (n, k, d) where, a file is stored in a distributed manner across n ...
    • Dynamical Processes on Large Networks (CS Seminar Lecture Series) 

      Prakash, B. Aditya (2012-03-23)
      How do contagions spread in population networks? Which group should we market to, for maximizing product penetration? Will a given YouTube video go viral? Who are the best people to vaccinate? What happens when two products ...
    • An Early Event in Adipogenesis, the Nuclear Selection of the CCAAT Enhancer-binding Protein ß (C/EBP ß ) mRNA by HuR and its Translocation to the Cytosol2006 

      Gantt, Kira (American Society for Biochemistry and Molecular Biology, 2006-07)
      HuR is a ligand for nuclear mRNAs containing adenylate-uridylate-rich elements in the 3_-untranslated region. Once bound to the mRNA, HuR is recognized by adapter proteins that then facilitate nuclear export of the complex. ...
    • Enterprise data breach: causes, challenges, prevention, and future directions 

      Cheng, Long; Liu, Fang; Yao, Danfeng (Daphne) (Wiley, 2017)
      A data breach is the intentional or inadvertent exposure of confidential information to unauthorized parties. In the digital era, data has become one of the most critical components of an enterprise. Data leakage poses ...
    • An Extended Perspective on Individual Security Behaviors 

      Crossler, Robert E.; Belanger, France (ACM, 2014-11)
      Security threats regularly affect users of home computers. As such, it is important to understand the practices of users for protecting their computers and networks, and to identify determinants of these practices. Several ...
    • Extremism, Malware Markets, and Public Use of Tor 

      Lindner, Andrew M.; Hawdon, James; Nunes, Eric (Virginia Tech, 2018-05-18)
      This panel includes three presentations: “When the Public Seeks Anonymity Online” by Andrew M. Lindner; “Online Extremism in the U.S.” by James Hawdon; and “Malicious Markets and Forums: An Overview” by Eric Nunes. The ...
    • Fast Detection of Transformed Data Leaks 

      Shu, Xiaokui; Zhang, Jing; Yao, Danfeng (Daphne); Feng, Wu-chun (Ieee-Inst Electrical Electronics Engineers Inc, 2016-03-01)
    • Forecasting Social Unrest Using Activity Cascades 

      Cadena, Jose; Korkmaz, Gizem; Kuhlman, Chris J.; Marathe, Achla; Ramakrishnan, Naren; Vullikanti, Anil (PLOS, 2015-06-19)
      Social unrest is endemic in many societies, and recent news has drawn attention to happenings in Latin America, the Middle East, and Eastern Europe. Civilian populations mobilize, sometimes spontaneously and sometimes in ...
    • Framework for Evaluating the Severity of Cybervulnerability of a Traffic Cabinet 

      Ernst, Joseph M.; Michaels, Alan J. (National Academy of Sciences, 2017)
      The increasing connectivity in transportation infrastructure is driving a need for additional security in transportation systems. For security decisions in a budget-constrained environment, the possible effect of a cyberattack ...
    • Identifying Native Applications with High Assurance 

      Almohri, Hussain M. J.; Yao, Danfeng (Daphne); Kafura, Dennis G. (Department of Computer Science, Virginia Polytechnic Institute & State University, 2011), TR-11-20
      The work described in this paper investigates the problem of identifying and deterring stealthy malicious processes on a host. We point out the lack of strong application iden- tication in main stream operating systems. ...
    • Implementing an IPv6 Moving Target Defense on a Live Network 

      Dunlop, Matthew; Groat, Stephen; Marchany, Randolph C.; Tront, Joseph G. (Cyber-Physical Systems Virtual Organization, 2012)
      The goal of our research is to protect sensitive communications, which are commonly used by government agencies, from eavesdroppers or social engineers. In prior work, we investigated the privacy implications of stateless ...
    • Implementing Moving Target IPv6 Defense to Secure 6LoWPAN in the Internet of Things and Smart Grid 

      Sherburne, Matthew; Marchany, Randolph C.; Tront, Joseph G. (ACM Press, 2014)
      The growing momentum of the Internet of Things (IoT) has shown an increase in attack vectors within the security research community. We propose adapting a recent new approach of frequently changing IPv6 address assignment ...
    • Indexing the Darknet 

      Owenson, Gareth (Virginia Tech, 2018-05-18)
      This presentation was given as part of the conference "Understanding the Dark Web and Its Implications for Policy" held on May 18, 2018 at the Virginia Tech Executive Briefing Center in Arlington, Virginia.
    • Intrusion Detection System for Applications using Linux Containers 

      Abed, Amr S.; Clancy, Charles; Levy, David S. (Springer, 2015-12-09)
      Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical ...
    • Keystroke-Dynamics Authentication Against Synthetic Forgeries 

      Stefan, Deian; Yao, Danfeng (Daphne) (IEEE, 2010)
      We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called ...