Now showing items 1-5 of 5
Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity
(Virginia Tech, 2013-11-01)
A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking ...
A Modest Proposal for Open Market Risk Assessment to Solve the Cyber-Security Problem
(Virginia Tech, 2016-04-29)
We introduce a model for a market based economic system of cyber-risk valuation to correct fundamental problems of incentives within the information technology and information processing industries. We assess the makeup ...
Towards Optimal Secure Distributed Storage Systems with Exact Repair
Distributed storage systems in the presence of a wiretapper are considered. A distributed storage system (DSS) is parameterized by three parameters (𝑛, 𝑘, 𝑑), in which a file stored across n distributed nodes, can be ...
Distributed Storage Systems with Secure and Exact Repair - New Results
Distributed storage systems (DSS) in the presence of a passive eavesdropper are considered in this paper. A typical DSS is characterized by 3 parameters (n, k, d) where, a file is stored in a distributed manner across n ...
Multipersona Hypovisors: Securing Mobile Devices through High-Performance Light-Weight Subsystem Isolation
(Department of Computer Science, Virginia Polytechnic Institute & State University, 2013-06-28), TR-13-02
We propose and detail a system called multipersona Hypovisors for providing light-weight isolation for enhancing security on Multipersona mobile devices, particularly with respect to the current memory constraints of these ...