Now showing items 1-20 of 116

    • A Declarative Approach to Hardening Services Against QoS Vulnerabilities 

      Kwon, Young-Wo; Tilevich, Eli (IEEE, 2011)
      The Quality of Service (QoS) in a distributed service-oriented application can be negatively affected by a variety of factors. Network volatility, hostile exploits, poor service management, all can prevent a service-oriented ...
    • Adaptive Key Protection in Complex Cryptosystems with Attributes 

      Wang, Zilong; Yao, Danfeng (Daphne); Feng, Rongquan (Department of Computer Science, Virginia Polytechnic Institute & State University, 2012), TR-12-16
      In the attribute-based encryption (ABE) model, attributes (as opposed to identities) are used to encrypt messages, and all the receivers with qualifying attributes can decrypt the ciphertext. However, compromised attribute ...
    • Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity 

      Adams, Michael D.; Hitefield, Seth D.; Hoy, Bruce; Fowler, Michael C.; Clancy, Thomas Charles III (Virginia Tech, 2013-11-01)
      A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking ...
    • Applications and Security of Next-Generation, User-Centric Wireless Systems 

      Ramstetter, Jerry Rick; Yang, Yaling; Yao, Danfeng (Daphne) (MDPI, 2010-07-28)
      Pervasive wireless systems have significantly improved end-users quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual information is made more readily available, the role of ...
    • Applying differential association theory to online hate groups: a theoretical statement 

      Hawdon, James E. (Social and Economic Research Association of the Turku Universities, 2012)
      In this paper, I will consider how social media can nurture and encourage mass murder within a framework of one of the most prominent and widely supported criminological theories: differential association. I will briefly ...
    • Assessing the Role of Cyberbiosecurity in Agriculture: A Case Study 

      Drape, Tiffany; Magerkorth, Noah; Sen, Anuradha; Simpson, Joseph; Seibel, Megan M.; Murch, Randall Steven; Duncan, Susan E. (Frontiers, 2021-08-19)
      Agriculture has adopted the use of smart technology to help meet growing food demands. This increased automation and associated connectivity increases the risk of farms being targeted by cyber-attacks. Increasing frequency ...
    • Attacks and Defenses for Single-Stage Residue Number System PRNGs 

      Vennos, Amy; George, Kiernan; Michaels, Alan J. (MDPI, 2021-06-25)
      This paper explores the security of a single-stage residue number system (RNS) pseudorandom number generator (PRNG), which has previously been shown to provide extremely high-quality outputs when evaluated through available ...
    • Back to Reality: Cross domain deterrence and cyberspace 

      Brantly, Aaron F. (2018-09-01)
      This paper examines cross domain deterrence strategies involving cyber incidents. By focusing on efforts to halt Russian and Chinese cyber operations against the United States this paper examines the importance of developing, ...
    • Battling the bear: Ukraine's approach to national cyber and information security 

      Brantly, Aaron F. (Routledge, 2022-01)
      Ukraine has faced substantial challenges across multiple fronts in its successful 2014 Revolution of Dignity. Among the greatest challenges Ukraine has faced is the establishment of a national cybersecurity infrastructure ...
    • Battling the Bear: Ukraine's Approach to National Cybersecurity 

      Brantly, Aaron F. (2018-09-29)
      Ukraine has faced substantial challenges across multiple fronts its successful 2014 Revolution of Dignity. Among the greatest challenges Ukraine has faced is the establishment of a national cybersecurity infrastructure ...
    • ‘Beating the news’ with EMBERS: Forecasting Civil Unrest using Open Source Indicators 

      Ramakrishnan, Naren; Butler, Patrick; Self, Nathan; Khandpur, Rupinder P.; Saraf, Parang; Wang, Wei; Cadena, Jose; Vullikanti, Anil Kumar S.; Korkmaz, Gizem; Kuhlman, Christopher J.; Marathe, Achla; Zhao, Liang; Ting, Hua; Huang, Bert; Srinivasan, Aravind; Trinh, Khoa; Getoor, Lise; Katz, Graham; Doyle, Andy; Ackermann, Chris; Zavorin, Ilya; Ford, Jim; Summers, Kristen; Fayed, Youssef; Arredondo, Jaime; Gupta, Dipak; Mares, David; Muthia, Sathappan; Chen, Feng; Lu, Chang-Tien (2014)
      We describe the design, implementation, and evaluation of EMBERS, an automated, 24x7 continuous system for forecasting civil unrest across 10 countries of Latin America using open source indicators such as tweets, news ...
    • Between a Rock and a Cell Phone: Social Media Use during Mass Protests in Iran, Tunisia and Egypt 

      Kavanaugh, Andrea L.; Yang, Seungwon; Sheetz, Steven D.; Li, Lin Tzy; Fox, Edward A. (Department of Computer Science, Virginia Polytechnic Institute & State University, 2011-05-01), TR-11-10
      In this paper we examine the use of social media, and especially Twitter, in Iran, Tunisia and Egypt during the mass political demonstrations and protests in June 2009, December 2010 - January 2011, and February 2011, ...
    • Big Data Meet Cyber-Physical Systems: A Panoramic Survey 

      Atat, Rachad; Liu, Lingjia; Wu, Jinsong; Li, Guangyu; Ye, Chunxuan; Yi, Yang (IEEE, 2018)
      The world is witnessing an unprecedented growth of cyber-physical systems (CPS), which are foreseen to revolutionize our world via creating new services and applications in a variety of sectors, such as environmental ...
    • Bitcoin and Cryptocurrencies 

      Vasek, Marie; Jardine, Eric; Brantly, Aaron F. (Virginia Tech, 2018-05-18)
      This panel includes three presentations: “Cryptocurrencies and Financial Crimes” by Marie Vasek; “Cryptocurrencies and Specific Drug Types” by Eric Jardine; and “Bitcoin and OPSEC for Terrorists” by Aaron Brantly. (Please ...
    • BRIoT: Behavior Rune Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems 

      Sharma, Vishal; You, Ilsun; Vim, Kangbin; Chen, Ing-Ray; Cho, Jin-Hee (IEEE, 2019)
      The identification of vulnerabilities in a mission-critical system is one of the challenges faced by a cyber-physical system (CPS). The incorporation of embedded Internet of Things (IoT) devices makes it tedious to identify ...
    • CCS 2017- Women in Cyber Security (CyberW) Workshop 

      Yao, Danfeng (Daphne); Bertino, Elisa (ACM, 2017)
      The CyberW workshop is motivated by the significant gender imbalance in all security conferences, in terms of the number of publishing authors, PC members, organizers, and attendees. What causes this gender imbalance remains ...
    • Civil Cyberconflict: Microsoft, Cybercrime, and Botnets 

      Hiller, Janine S. (Santa Clara University School of Law, 2014-01)
      Cyber “warfare” and hackback by private companies is a hot discussion topic for its potential to fight cybercrime and promote cybersecurity. In the shadow of this provocative discussion, Microsoft has led a concerted, ...
    • Conceptualizing Cyber Deterrence by Entanglement 

      Brantly, Aaron F. (2018-03-01)
      Dr. Brantly was invited to give one of three keynote lectures for the opening of the Cyber Governance and Policy Center at the University of Oklahoma.
    • Countering the Cyber Threat 

      Brantly, Aaron F.; Henry, Shawn (The Army Cyber Institute, 2018-05-09)
      The current path to national cybersecurity hides a fatal design flaw. Resident within the current national approach is the assumption that we can continue business as usual with limited sharing between the public and the ...
    • Creating Technological Surprise 

      Walker, Steven H. (Virginia Tech, 2018-10-05)
      This is an abstract from the 2018 Hugh and Ethel Kelly Lecture, "Creating Technological Surprise", presented by Dr. Steven H. Walker in Goodwin Hall on October 5, 2018.