Now showing items 54-73 of 92

    • Multipersona Hypovisors: Securing Mobile Devices through High-Performance Light-Weight Subsystem Isolation 

      Krishan, Neelima; Hitefield, Seth; Clancy, T. Charles; McGwier, Robert W.; Tront, Joseph G. (Department of Computer Science, Virginia Polytechnic Institute & State University, 2013-06-28), TR-13-02
      We propose and detail a system called multipersona Hypovisors for providing light-weight isolation for enhancing security on Multipersona mobile devices, particularly with respect to the current memory constraints of these ...
    • Network Security Data Analytics Architecture for Logged Events 

      DeYoung, Mark E.; Marchany, Randy; Tront, Joseph (2017-01-04)
      Data-driven network security and information security efforts have decades long history. The deluge of logged events from network mid-points and end-points coupled with unprecedented temporal depth in data retention are ...
    • Personal Anomaly Detection and Smart-Phone Security 

      Xiong, Huijun; Yao, Danfeng (Daphne) (Virginia Tech, 2010-04-22)
      Mobile devices increasingly become the computing platform for networked applications such as Web and email. This development requires strong guarantees on the system integrity and data security of mobile devices against ...
    • Physical layer orthogonal frequency-division multiplexing acquisition and timing synchronization security 

      La Pan, Matthew J.; Clancy, Charles T.; McGwier, Robert W. (Wiley, 2014-08-18)
      Orthogonal frequency-division multiplexing (OFDM) has become the manifest modulation choice for 4G standards. Timing acquisition and carrier frequency offset synchronization are prerequisite to OFDM demodulation and must ...
    • A policy review of the impact existing privacy principles have on current and emerging transportation safety technology 

      Pethtel, Ray D.; Phillips, James D.; Hetherington, Gene (Virginia Tech. Virginia Tech Transportation Institute, 2011-05-12)
      Ensuring the safety of travelers by the use of technology, and protecting the personal information that is collected for those applications, is an important transportation policy concern. Perceptions of an abuse of privacy ...
    • Pricing a Protest: Forecasting the Dynamics of Civil Unrest Activity in Social Media 

      Goode, Brian J.; Krishnan, Siddharth; Roan, Michael; Ramakrishnan, Naren (PLOS, 2015-10-06)
      Online social media activity can often be a precursor to disruptive events such as protests, strikes, and “occupy” movements.We have observed that such civil unrest can galvanize supporters through social networks and help ...
    • Privacy and Security in the Implementation of Health Information Technology (Electronic Health Records): U.S. and EU Compared 

      Hiller, Janine S.; McMullen, Matthew S.; Chumney, Wade M.; Baumer, David L. (Boston University School of Law, 2011)
      The importance of the adoption of Electronic Health Records (EHRs) and the associated cost savings cannot be ignored as an element in the changing delivery of health care. However, the potential cost savings predicted in ...
    • Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems 

      Bélanger, France; Crossler, Robert E. (University of Minnesota, Management Information Systems Research Center, 2011-12)
      Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and ...
    • Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce 

      Liu, Fang; Shu, Xiaokui; Yao, Danfeng (Daphne); Butt, Ali R. (2015-02-06)
      The exposure of sensitive data in storage and transmission poses a serious threat to organizational and personal security. Data leak detection aims at scanning content (in storage or transmission) for exposed sensitive ...
    • Process Authentication for High System Assurance 

      Almohri, Hussain M.J.; Yao, Danfeng (Daphne); Kafura, Dennis (IEEE Computer Society, 2013-07-11)
      This paper points out the need in modern operating system kernels for a process authentication mechanism, where a process of a user-level application proves its identity to the kernel. Process authentication is different ...
    • Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation 

      Rahaman, Sazzadur; Cheng, Long; Yao, Danfeng (Daphne); Li, He; Park, Jung-Min (Jerry) (De Gruyter Open, 2017)
      Group signature schemes enable anonymous-yetaccountable communications. Such a capability is extremely useful for applications, such as smartphone-based crowdsensing and citizen science. However, the performance of modern ...
    • Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing 

      Shu, Xiaokui; Zhang, Jing; Yao, Danfeng (Daphne); Feng, Wu-Chun (ACM, 2015-03)
      The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., ...
    • Rapporteur Report: Understanding the Dark Web and its Implications for Policy 

      Jardine, Eric (Virginia Tech, 2018-05)
      The Understanding the Dark Web and Its Implications for Policy conference focused on addressing the challenging dilemmas posed by the anonymity created by the “Dark Web” (the unindexed portion of the Internet only accessible ...
    • Religiosity and Information Security Policy Compliance 

      Borena, Berhanu; Belanger, France (AMCIS, 2013-08)
      Information security is a top concern of managers, often addressed with technical, behavioral and procedural solutions. Information Security Policies (ISPs) are among these solutions. ISPs require organizational members ...
    • Secure Coding Practices in Java: Challenges and Vulnerabilities 

      Meng, Na; Nagy, Stefan; Yao, Daphne; Zhuang, Wenjie; Argoty, Gustavo Arango (Virginia Tech, 2017-09-28)
      Java platform and third-party libraries provide various security features to facilitate secure coding. However, misusing these features can cost tremendous time and effort of developers or cause security vulnerabilities ...
    • Security and Privacy produced by nHCP Unique Identifiers 

      Tront, Joseph; Groat, Stephen; Dunlop, Matthew; Marchany, Randy (IEEE, 2011-10)
      As protection against the current privacy weaknesses of StateLess Address AutoConfiguration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrators may choose to deploy the new Dynamic Host Configuration ...
    • Social Media for Cities, Counties and Communities 

      Kavanaugh, Andrea L.; Fox, Edward A.; Sheetz, Steven D.; Yang, Seungwon; Li, Lin Tzy; Whalen, Travis; Shoemaker, Donald J.; Natsev, Apostol; Xie, Lexing (Department of Computer Science, Virginia Polytechnic Institute & State University, 2011), TR-11-09
      Social media (i.e., Twitter, Facebook, Flickr, YouTube) and other tools and services with user- generated content have made a staggering amount of information (and misinformation) available. Some government officials seek ...
    • Social Media Use by Government: From the Routine to the Critical 

      Kavanaugh, Andrea L.; Fox, Edward A.; Sheetz, Steven D.; Yang, Seungwon; Li, Lin T.; Whalen, Travis; Shoemaker, Donald J.; Natsev, Paul; Xie, Lexing (2011-06-01)
      Social media (i.e., Twitter, Facebook, Flickr, YouTube) and other services with user-generated content have made a staggering amount of information (and misinformation) available. Government officials seek to leverage these ...
    • Social Turing Tests: Crowdsourcing Sybil Detection 

      Wang, Gang; Mohanlal, Manish; Wilson, Christo; Wang, Xiao; Metzger, Miriam; Zheng, Haitao; Zhao, Ben Y. (Internet Society, 2013-02)
      As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks (OSNs). Today, sophisticated attackers are creating realistic Sybils ...