Now showing items 1-20 of 100

    • Medical Monitoring Applications for Wearable Computing 

      Raskovic, Dejan; Martin, Thomas; Jovanov, Emil (The British Computer Society, 2004-04-01)
      Medical monitors have benefited from technological advances in the field of wireless communication, processing and power sources. These advances have made possible miniaturization and prolonged operating times of medical ...
    • An Early Event in Adipogenesis, the Nuclear Selection of the CCAAT Enhancer-binding Protein ß (C/EBP ß ) mRNA by HuR and its Translocation to the Cytosol2006 

      Gantt, Kira (American Society for Biochemistry and Molecular Biology, 2006-07)
      HuR is a ligand for nuclear mRNAs containing adenylate-uridylate-rich elements in the 3_-untranslated region. Once bound to the mRNA, HuR is recognized by adapter proteins that then facilitate nuclear export of the complex. ...
    • Keystroke-Dynamics Authentication Against Synthetic Forgeries 

      Stefan, Deian; Yao, Danfeng (Daphne) (IEEE, 2010)
      We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called ...
    • Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore 

      Chen, Zhimin; Schaumont, Patrick Robert (Cryptology ePrint Archive, 2010)
      This paper discusses a novel direction for multicore cryptographic software, namely the use of multicore to protect a design against side-channel attacks.We present a technique which is based on the principle of dual-rail ...
    • User-Behavior Based Detection of Infection Onset 

      Xu, Kui; Yao, Danfeng (Daphne); Ma, Qiang; Crowell, Alexander (Department of Computer Science, Virginia Polytechnic Institute & State University, 2010), TR-10-09
      A major vector of computer infection is through exploiting software or design flaws in networked applications such as the browser. Malicious code can be fetched and executed on a victim’s machine without the user’s permission, ...
    • Personal Anomaly Detection and Smart-Phone Security 

      Xiong, Huijun; Yao, Danfeng (Daphne) (Virginia Tech, 2010-04-22)
      Mobile devices increasingly become the computing platform for networked applications such as Web and email. This development requires strong guarantees on the system integrity and data security of mobile devices against ...
    • Applications and Security of Next-Generation, User-Centric Wireless Systems 

      Ramstetter, Jerry Rick; Yang, Yaling; Yao, Danfeng (Daphne) (MDPI, 2010-07-28)
      Pervasive wireless systems have significantly improved end-users quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual information is made more readily available, the role of ...
    • Storytelling Security: User-Intention Based Traffic Sanitization 

      Xiong, Huijun; Yao, Danfeng (Daphne); Zhang, Zhibin (Department of Computer Science, Virginia Polytechnic Institute & State University, 2010-12-01), TR-10-15
      Malicious software (malware) with decentralized communication infrastructure, such as peer-to-peer botnets, is difficult to detect. In this paper, we describe a traffic-sanitization method for identifying malware-triggered ...
    • Privacy and Security in the Implementation of Health Information Technology (Electronic Health Records): U.S. and EU Compared 

      Hiller, Janine S.; McMullen, Matthew S.; Chumney, Wade M.; Baumer, David L. (Boston University School of Law, 2011)
      The importance of the adoption of Electronic Health Records (EHRs) and the associated cost savings cannot be ignored as an element in the changing delivery of health care. However, the potential cost savings predicted in ...
    • A Declarative Approach to Hardening Services Against QoS Vulnerabilities 

      Kwon, Young-Wo; Tilevich, Eli (IEEE, 2011)
      The Quality of Service (QoS) in a distributed service-oriented application can be negatively affected by a variety of factors. Network volatility, hostile exploits, poor service management, all can prevent a service-oriented ...
    • Identifying Native Applications with High Assurance 

      Almohri, Hussain M. J.; Yao, Danfeng (Daphne); Kafura, Dennis G. (Department of Computer Science, Virginia Polytechnic Institute & State University, 2011), TR-11-20
      The work described in this paper investigates the problem of identifying and deterring stealthy malicious processes on a host. We point out the lack of strong application iden- tication in main stream operating systems. ...
    • Social Media for Cities, Counties and Communities 

      Kavanaugh, Andrea L.; Fox, Edward A.; Sheetz, Steven D.; Yang, Seungwon; Li, Lin Tzy; Whalen, Travis; Shoemaker, Donald J.; Natsev, Apostol; Xie, Lexing (Department of Computer Science, Virginia Polytechnic Institute & State University, 2011), TR-11-09
      Social media (i.e., Twitter, Facebook, Flickr, YouTube) and other tools and services with user- generated content have made a staggering amount of information (and misinformation) available. Some government officials seek ...
    • A Database Driven Initial Ontology for Crisis, Tragedy, and Recovery 

      Sheetz, Steven D. (2011-05-01)
      Many databases and supporting software have been developed to track the occurrences of natural disasters, manmade disasters, and combinations of the two. Each of the databases developed in this context, define their own ...
    • Microblogging in Crisis Situations: Mass Protests in Iran, Tunisia, Egypt 

      Kavanaugh, Andrea L.; Yang, Seungwon; Li, Lin T.; Sheetz, Steven D.; Fox, Edward A. (2011-05-01)
      In this paper we briefly examine the use of Twitter in Iran, Tunisia and Egypt during the mass political demonstrations and protests in June 2009, December 2010 and January 2011 respectively. We compare this usage with ...
    • Between a Rock and a Cell Phone: Social Media Use during Mass Protests in Iran, Tunisia and Egypt 

      Kavanaugh, Andrea L.; Yang, Seungwon; Sheetz, Steven D.; Li, Lin Tzy; Fox, Edward A. (Department of Computer Science, Virginia Polytechnic Institute & State University, 2011-05-01), TR-11-10
      In this paper we examine the use of social media, and especially Twitter, in Iran, Tunisia and Egypt during the mass political demonstrations and protests in June 2009, December 2010 - January 2011, and February 2011, ...
    • A policy review of the impact existing privacy principles have on current and emerging transportation safety technology 

      Pethtel, Ray D.; Phillips, James D.; Hetherington, Gene (Virginia Tech. Virginia Tech Transportation Institute, 2011-05-12)
      Ensuring the safety of travelers by the use of technology, and protecting the personal information that is collected for those applications, is an important transportation policy concern. Perceptions of an abuse of privacy ...
    • Twitter Use During an Emergency Event: The Case of UT Austin Shooting 

      Li, Lin T.; Yang, Seungwon; Kavanaugh, Andrea L.; Fox, Edward A.; Sheetz, Steven D.; Shoemaker, Donald J. (2011-06-01)
      This poster presents one of our efforts developed in the context of Crisis, Tragedy, and Recovery Network (CTRnet) project. One of our derived works from this project is the use of social media by government to respond to ...
    • Social Media Use by Government: From the Routine to the Critical 

      Kavanaugh, Andrea L.; Fox, Edward A.; Sheetz, Steven D.; Yang, Seungwon; Li, Lin T.; Whalen, Travis; Shoemaker, Donald J.; Natsev, Paul; Xie, Lexing (2011-06-01)
      Social media (i.e., Twitter, Facebook, Flickr, YouTube) and other services with user-generated content have made a staggering amount of information (and misinformation) available. Government officials seek to leverage these ...
    • Security and Privacy produced by nHCP Unique Identifiers 

      Tront, Joseph G.; Groat, Stephen; Dunlop, Matthew; Marchany, Randolph C. (IEEE, 2011-10)
      As protection against the current privacy weaknesses of StateLess Address AutoConfiguration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrators may choose to deploy the new Dynamic Host Configuration ...
    • Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems 

      Bélanger, France; Crossler, Robert E. (University of Minnesota, Management Information Systems Research Center, 2011-12)
      Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and ...