Now showing items 1-20 of 25

    • Analyzing the Russian Way of War: Evidence from the 2008 Conflict with Georgia 

      Beehner, Lionel; Collins, Liam; Ferenzi, Steve; Person, Robert; Brantly, Aaron F. (Modern War Institute, 2018-03-20)
      In the dog days of August 2008, a column of Russian tanks and troops rolled across the Republic of Georgia’s northern border and into South Ossetia, sparking a war that was over almost before it began. The war, while not ...
    • Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity 

      Adams, Michael D.; Hitefield, Seth D.; Hoy, Bruce; Fowler, Michael C.; Clancy, Thomas Charles III (Virginia Tech, 2013-11-01)
      A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking ...
    • Attacks and Defenses for Single-Stage Residue Number System PRNGs 

      Vennos, Amy; George, Kiernan; Michaels, Alan (MDPI, 2021-06-25)
      This paper explores the security of a single-stage residue number system (RNS) pseudorandom number generator (PRNG), which has previously been shown to provide extremely high-quality outputs when evaluated through available ...
    • A Coupled OpenFOAM-WRF Study on Atmosphere-Wake-Ocean Interaction 

      Gilbert, John; Pitt, Jonathan (MDPI, 2020-12-30)
      This work aims to better understand how small scale disturbances that are generated at the air-sea interface propagate into the surrounding atmosphere under realistic environmental conditions. To that end, a one-way coupled ...
    • Cyberbiosecurity: A New Perspective on Protecting US Food and Agricultural System 

      Duncan, Susan E.; Reinhard, Robert; Williams, Robert C.; Ramsey, Ford; Thomason, Wade E.; Lee, Kiho; Dudek, Nancy; Mostaghimi, Saied; Colbert, Edward; Murch, Randall S. (2019-03-29)
      Our national data and infrastructure security issues affecting the "bioeconomy" are evolving rapidly. Simultaneously, the conversation about cyber security of the U.S. food and agricultural system (cyber biosecurity) is ...
    • Cyberphysical Security Through Resiliency: A Systems-Centric Approach 

      Fleming, Cody; Elks, Carl R.; Bakirtzis, Georgios; Adams, Stephen C.; Carter, Bryan; Beling, Peter A.; Horowitz, Barry (2021-06)
      Cyberphysical systems require resiliency techniques for defense, and multicriteria resiliency problems need an approach that evaluates systems for current threats and potential design solutions. A systems-oriented view of ...
    • Designing a Block Cipher in Galois Extension Fields for IoT Security 

      George, Kiernan; Michaels, Alan J. (MDPI, 2021-11-05)
      This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique ...
    • Development and Analysis of a Spiral Theory-based Cybersecurity Curriculum 

      Back, Godmar V.; Basu, Debarati; Naciri, William; Lohani, Vinod K.; Plassmann, Paul; Barnette, Dwight; Ribbens, Calvin J.; Gantt, Kira; McPherson, David (2017-01-09)
      Enhance cybersecurity learning experiences of students at Virginia Tech’s large engineering program
    • Distributed Storage Systems with Secure and Exact Repair - New Results 

      Tandon, Ravi; Amuru, SaiDhiraj; Clancy, Thomas Charles III; Buehrer, R. Michael (IEEE, 2014-02)
      Distributed storage systems (DSS) in the presence of a passive eavesdropper are considered in this paper. A typical DSS is characterized by 3 parameters (n, k, d) where, a file is stored in a distributed manner across n ...
    • Enabling Artificial Intelligence Adoption through Assurance 

      Freeman, Laura; Rahman, Abdul; Batarseh, Feras A. (MDPI, 2021-08-25)
      The wide scale adoption of Artificial Intelligence (AI) will require that AI engineers and developers can provide assurances to the user base that an algorithm will perform as intended and without failure. Assurance is the ...
    • Fallthrough Correlation Techniques for Arbitrary-Phase Spread Spectrum Waveforms 

      Fletcher, Michael; Michaels, Alan; Ridge, Devin (IEEE, 2019-09-11)
      The use of practically non-repeating spreading codes to generate sequence-based spread spectrum waveforms is a strong method to improve transmission security, by limiting an observer's opportunity to cross-correlate snapshots ...
    • Framework for Evaluating the Severity of Cybervulnerability of a Traffic Cabinet 

      Ernst, Joseph M.; Michaels, Alan J. (National Academy of Sciences, 2017)
      The increasing connectivity in transportation infrastructure is driving a need for additional security in transportation systems. For security decisions in a budget-constrained environment, the possible effect of a cyberattack ...
    • Further Analysis of PRNG-Based Key Derivation Functions 

      McGinthy, Jason M.; Michaels, Alan J. (IEEE, 2019)
      The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked, security still is a major concern. Many of these sensors and devices have limitations, such ...
    • Intrusion Detection System for Applications using Linux Containers 

      Abed, Amr S.; Clancy, Thomas Charles III; Levy, David S. (Springer, 2015-12-09)
      Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical ...
    • Multi-Physics Modeling of Electrochemical Deposition 

      Kauffman, Justin; Gilbert, John; Paterson, Eric G. (MDPI, 2020-12-11)
      Electrochemical deposition (ECD) is a common method used in the field of microelectronics to grow metallic coatings on an electrode. The deposition process occurs in an electrolyte bath where dissolved ions of the depositing ...
    • A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions 

      Abdelhadi, Ahmed; Shajaiah, Haya; Clancy, Thomas Charles III (IEEE, 2015-10-08)
      Secure spectrum auctions can revolutionize the spectrum utilization of cellular networks and satisfy the ever increasing demand for resources. In this paper, a multi-tier dynamic spectrum sharing system is studied for ...
    • An ontological metamodel for cyber-physical system safety, security, and resilience coengineering 

      Bakirtzis, Georgios; Sherburne, Tim; Adams, Stephen; Horowitz, Barry M.; Beling, Peter A.; Fleming, Cody H. (2021-06-01)
      Cyber-physical systems are complex systems that require the integration of diverse software, firmware, and hardware to be practical and useful. This increased complexity is impacting the management of models necessary for ...
    • Physical layer orthogonal frequency-division multiplexing acquisition and timing synchronization security 

      La Pan, Matthew J.; Clancy, Thomas Charles III; McGwier, Robert W. (Wiley, 2014-08-18)
      Orthogonal frequency-division multiplexing (OFDM) has become the manifest modulation choice for 4G standards. Timing acquisition and carrier frequency offset synchronization are prerequisite to OFDM demodulation and must ...
    • A Practical Guide for Managing Interdisciplinary Teams: Lessons Learned from Coupled Natural and Human Systems Research 

      Henson, V. Reilly; Cobourn, Kelly M.; Weathers, Kathleen C.; Carey, Cayelan C.; Farrell, Kaitlin J.; Klug, Jennifer L.; Sorice, Michael G.; Ward, Nicole K.; Weng, Weizhe (MDPI, 2020-07-09)
      Interdisciplinary team science is essential to address complex socio-environmental questions, but it also presents unique challenges. The scientific literature identifies best practices for high-level processes in team ...
    • Real-Time Mask Recognition 

      Billings, Rachel M.; Michaels, Alan J. (MDPI, 2021-11-08)
      While a variety of image processing studies have been performed to quantify the potential performance of neural network-based models using high-quality still images, relatively few studies seek to apply those models to a ...