Now showing items 1-10 of 87
Framework for Evaluating the Severity of Cybervulnerability of a Traffic Cabinet
(National Academy of Sciences, 2017)
The increasing connectivity in transportation infrastructure is driving a need for additional security in transportation systems. For security decisions in a budget-constrained environment, the possible effect of a cyberattack ...
Measuring the Insecurity of Mobile Deep Links of Android
Mobile deep links are URIs that point to specific locations within apps, which are instrumental to web-to-app communications. Existing “scheme URLs” are known to have hijacking vulnerabilities where one app can freely ...
Physical layer orthogonal frequency-division multiplexing acquisition and timing synchronization security
Orthogonal frequency-division multiplexing (OFDM) has become the manifest modulation choice for 4G standards. Timing acquisition and carrier frequency offset synchronization are prerequisite to OFDM demodulation and must ...
CCS 2017- Women in Cyber Security (CyberW) Workshop
The CyberW workshop is motivated by the significant gender imbalance in all security conferences, in terms of the number of publishing authors, PC members, organizers, and attendees. What causes this gender imbalance remains ...
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
(University of Minnesota, Management Information Systems Research Center, 2011-12)
Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and ...
DEFENDING THE BORDERLAND Ukrainian Military Experiences with IO, Cyber, and EW
(Army Cyber Institute, 2017-12-01)
Applying differential association theory to online hate groups: a theoretical statement
(Social and Economic Research Association of the Turku Universities, 2012)
In this paper, I will consider how social media can nurture and encourage mass murder within a framework of one of the most prominent and widely supported criminological theories: differential association. I will briefly ...