-
Non-Reputable Identity Management and Information Access Technologies for Improved Cyberspace Agility by 2035
The military's use of cyberspace as a warfighting domain in current operations is vulnerable to hac
-
Organization of Cyberspace Forces
Forces that establish, sustain, manage, or operate in cyberspace are cyberspace forces. These force
-
Applying Automated Theorem Proving to Computer Security
While more and more data is stored and accessed electronically, better access control methods need
-
Flying and Fighting in Cyberspace
This research paper develops the foundation for a new military operating concept to "fight the net"
-
Dominating Networks in Cyberspace
Recognized as an equal to the air, land, sea and space domains, US military operators must gain dom
-
Philosophy.Exe
CRC Press 出版We live in an age of unprecedented complexity, where technology, cognitive biases, and societal sys
-
Availability, Reliability and Security
Springer 出版This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Wo
-
The Novel Machine
Ingram 出版The Novel Machine: Every Prompt & Response Used to Write the Novel Steelhead GraveyardStep behind t
-
The Cranky Man's Guide to LoRA & QLoRA
Ingram 出版This book is presented as a highly personal, opinionated, and practical guide to fine-tuning Large
-
Philosophy.Exe
CRC Press 出版We live in an age of unprecedented complexity, where technology, cognitive biases, and societal sys
-
The Psychology of Cybersecurity
Routledge 出版This book takes a fresh look at the underappreciated role of human psychology in cybersecurity and
-
Artificial Intelligence for Natural Language Processing
CRC Press 出版Artificial Intelligence for Natural Language Processing offers a comprehensive exploration of how a
-
Artificial Intelligence for Natural Language Processing
CRC Press 出版Artificial Intelligence for Natural Language Processing offers a comprehensive exploration of how a
-
Scams, Hacking, and Cybersecurity
Ingram 出版The internet is a powerful tool connecting us in ways unimaginable just a few decades ago. However,
-
AI Rookies Natural Language Processing
Ingram 出版Start your NLP journey by mastering the messy middle-text preprocessing. This beginner-friendly gui
-
Scams, Hacking, and Cybersecurity
The internet is a powerful tool connecting us in ways unimaginable just a few decades ago. However,
-
From Day Zero to Zero Day
Find vulnerabilities before anyone else does. Zero days aren't magic--they're missed opportunities.
-
-
AI Rookies Labs Beginning NLP with Orange
Ingram 出版Master text analytics and natural language processing-one lab at a time.This lab-based workbook is
-
AI Rookies Labs Learn Text Analytics and NLP using R
Ingram 出版Master text analytics and natural language processing-one lab at a time.This lab-based workbook is
-
A smart Healthcare System
Ingram 出版The book "Smart Healthcare Systems: Reducing False Predictions of Chronic Diseases Using IoT and Ma
-
-
-
Automating Security Protocol Analysis
Ingram 出版When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol [24], it took
-
Secureqemu
This research presents an original emulation-based software protection scheme providing protection
-
U.S. Cyber Strategy Deterrence and Strategic Response
A great deal of thought has been applied to focus government and industrial resources on the import
-
Cyberspace and the New Age of Influence
The importance of cyberspace and the utility of networked computer systems have grown exponentially
-
Historical Analysis of the Awareness and Key Issues of the Insider Threat to Information Systems
Since information systems have become smaller, faster, cheaper and more interconnected many organiz
-
Cyberspace
In the last century, the United States was protected from a direct physical attack by its adversari
-
A Study of Quality of Service Communication for High-Speed Packet-Switching Computer Sub-Networks
In this thesis, we analyze various factors that affect quality of service (QoS) communication in hi
-
Developing Cyberspace Data Understanding
Current intrusion detection systems generate a large number of specific alerts, but do not provide
-
Evaluation of the Effects of Predicted Associativity on the Reliability and Performance of Mobile Ad Hoc Networks
Routing in Mobile Ad Hoc Networks (MANETs) presents unique challenges not encountered in convention
-
Defeating 802.11 Wireless Networks
Homeland Security of the United States is constantly under threat of attack from terrorist organiza
-
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm With Application to the Detection of Distributed Computer Network Intrusions
Today's predominantly-employed signature-based intrusion detection systems are reactive in nature a
-
Performance Analysis of Protocol Independent Multicasting-Dense Mode in Low Earth Orbit Satellite Networks
This research explored the implementation of Protocol Independent Multicasting - Dense Mode (PIM-DM
-
Enabling Intrusion Detection in IPSec Protected IPv6 Networks Through Secret-Key Sharing
As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (
-
An Analysis of Information Asset Valuation Quantification Methodology for Application With Cyber Information Mission Impact Assessment
The purpose of this research is to develop a standardized Information Asset Valuation (IAV) methodo
-
In Pursuit of an Aptitude Test for Potential Cyberspace Warriors
The Air Force has officially assumed the cyberspace mission. In order to perform the mission to the
-
Cryptanalysis of Pseudorandom Number Generators in Wireless Sensor Networks
This work presents a brute-force attack on an elliptic curve cryptosystemimplemented on UC Berkley'
-
Speech Recognition Using the Mellin Transform
The purpose of this research was to improve performance in speech recognition. Specifically, a new
-
Developing Cyberspace Data Understanding
Current intrusion detection systems generate a large number of specific alerts, but do not provide
-
Supplementing an Ad Hoc Wireless Network Routing Protocol With Radio Frequency Identification Tags
Wireless sensor networks (WSNs) have a broad and varied range of applications, yet all of these are
-
Evaluation of the Effects of Predicted Associativity on the Reliability and Performance of Mobile Ad Hoc Networks
Routing in Mobile Ad Hoc Networks (MANETs) presents unique challenges not encountered in convention
-
Performance Evaluation and Benchmarking
Springer 出版This book constitutes the refereed proceedings of the 16th TPC Technology Conference on Performance
-
Automating Security Protocol Analysis
When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol [24], it took
-
Interagency Organization for Cyberwar
Many people take for granted things they cannot see, smell, or touch. For most people, security in
-
Defining Our National Cyberspace Boundaries
In February 2009, the Obama Administration commissioned a 60-day review of the United States' cyber
-
A Study of Quality of Service Communication for High-Speed Packet-Switching Computer Sub-Networks
In this thesis, we analyze various factors that affect quality of service (QoS) communication in hi