Now showing items 1-20 of 65

    • A Modest Proposal for Open Market Risk Assessment to Solve the Cyber-Security Problem 

      O’Shea, Timothy J.; Mondl, Adam; Clancy, T. Charles (Virginia Tech, 2016-04-29)
      We introduce a model for a market based economic system of cyber-risk valuation to correct fundamental problems of incentives within the information technology and information processing industries. We assess the makeup ...
    • A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions 

      Abdelhadi, Ahmed; Shajaiah, Haya; Clancy, Charles (IEEE, 2015-10-08)
      Secure spectrum auctions can revolutionize the spectrum utilization of cellular networks and satisfy the ever increasing demand for resources. In this paper, a multi-tier dynamic spectrum sharing system is studied for ...
    • Adaptive Key Protection in Complex Cryptosystems with Attributes 

      Wang, Zilong; Yao, Danfeng (Daphne); Feng, Rongquan (Department of Computer Science, Virginia Polytechnic Institute & State University, 2012), TR-12-16
    • Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity 

      Adams, Michael D.; Hitefield, Seth D.; Hoy, Bruce; Fowler, Michael C.; Clancy, T. Charles (Virginia Tech, 2013-11-01)
      A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking ...
    • Applications and Security of Next-Generation, User-Centric Wireless Systems 

      Ramstetter, Jerry Rick; Yang, Yaling; Yao, Danfeng (Daphne) (MDPI, 2010-07-28)
      Pervasive wireless systems have significantly improved end-users quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual information is made more readily available, the role of ...
    • Applying differential association theory to online hate groups: a theoretical statement 

      Hawdon, James (Social and Economic Research Association of the Turku Universities, 2012)
      In this paper, I will consider how social media can nurture and encourage mass murder within a framework of one of the most prominent and widely supported criminological theories: differential association. I will briefly ...
    • ‘Beating the news’ with EMBERS: Forecasting Civil Unrest using Open Source Indicators 

      Ramakrishnan, N; Butler, P; Self, N; Khandpur, R; Saraf, P; Wang, W; Cadena, J; Vullikanti, A; Korkmaz, G; Kuhlman, C; Marathe, A; Zhao, L; Ting, H; Huang, B; Srinivasan, A; Trinh, K; Getoor, L; Katz, G; Doyle, A; Ackermann, C; Zavorin, I; Ford, J; Summers, K; Fayed, Y; Arredondo, J; Gupta, D; Mares, D (2014)
    • Between a Rock and a Cell Phone: Social Media Use during Mass Protests in Iran, Tunisia and Egypt 

      Kavanaugh, Andrea L.; Yang, Seungwon; Sheetz, Steven D.; Li, Lin Tzy; Fox, Edward A. (Department of Computer Science, Virginia Polytechnic Institute & State University, 2011-05-01), TR-11-10
    • Bitcoin and Cryptocurrencies 

      Vasek, Marie; Jardine, Eric; Brantly, Aaron (Virginia Tech, 2018-05-18)
      This panel includes three presentations: “Cryptocurrencies and Financial Crimes” by Marie Vasek; “Cryptocurrencies and Specific Drug Types” by Eric Jardine; and “Bitcoin and OPSEC for Terrorists” by Aaron Brantly. (Please ...
    • CCS 2017- Women in Cyber Security (CyberW) Workshop 

      Yao, Danfeng (Daphne); Bertino, Elisa (ACM, 2017)
      The CyberW workshop is motivated by the significant gender imbalance in all security conferences, in terms of the number of publishing authors, PC members, organizers, and attendees. What causes this gender imbalance remains ...
    • Civil Cyberconflict: Microsoft, Cybercrime, and Botnets 

      Hiller, Janine S. (Santa Clara University School of Law, 2014-01)
      Cyber “warfare” and hackback by private companies is a hot discussion topic for its potential to fight cybercrime and promote cybersecurity. In the shadow of this provocative discussion, Microsoft has led a concerted, ...
    • Countering the Cyber Threat 

      Brantly, AF; Henry, S (The Army Cyber Institute, 2018-05-09)
    • The Cyber Deterrence Problem 

      Brantly, AF (NATO CCD COE, 2018-05-30)
      What is the role of deterrence in an age where adept hackers can credibly hold strategic assets at risk? Do conventional frameworks of deterrence maintain their applicability and meaning against state actors in cyberspace? ...
    • The Cyber Losers 

      Brantly, AF (2014-05-22)
    • Data Leak Detection As a Service: Challenges and Solutions 

      Shu, Xiaokui; Yao, Danfeng (Daphne) (Department of Computer Science, Virginia Polytechnic Institute & State University, 2012), TR-12-10
    • A Database Driven Initial Ontology for Crisis, Tragedy, and Recovery 

      Sheetz, Steven D. (2011-05-01)
      Many databases and supporting software have been developed to track the occurrences of natural disasters, manmade disasters, and combinations of the two. Each of the databases developed in this context, define their own ...
    • Deep/Dark Web & Higher Education 

      Moore, Kathleen (Virginia Tech, 2018-05-18)
      This presentation was given as part of the conference "Understanding the Dark Web and Its Implications for Policy" held on May 18, 2018 at the Virginia Tech Executive Briefing Center in Arlington, Virginia.
    • Detecting Malicious Landing Pages in Malware Distribution Networks 

      Wang, Gang; Stokes, Jack W.; Herley, Cormac; Felstead, David (IEEE, 2013-06)
      Drive-by download attacks attempt to compromise a victim’s computer through browser vulnerabilities. Often they are launched from Malware Distribution Networks (MDNs) consisting of landing pages to attract traffic, ...
    • Determining Relative Airport Threats from News and Social Media 

      Khandpur, Rupinder P.; Ji, Taoran; Ning, Yue; Zhao, Liang; Lu, Chang-Tien; Smith, Erik R.; Adams, Christopher; Ramakrishnan, Naren (AAAI, 2017)
      Airports are a prime target for terrorist organizations, drug traffickers, smugglers, and other nefarious groups. Traditional forms of security assessment are not real-time and often do not exist for each airport and port ...