-
Defining Our National Cyberspace Boundaries
In February 2009, the Obama Administration commissioned a 60-day review of the United States' cyber
-
A Study of Quality of Service Communication for High-Speed Packet-Switching Computer Sub-Networks
In this thesis, we analyze various factors that affect quality of service (QoS) communication in hi
-
Performance Analysis of Protocol Independent Multicasting-Dense Mode in Low Earth Orbit Satellite Networks
This research explored the implementation of Protocol Independent Multicasting - Dense Mode (PIM-DM
-
Enabling Intrusion Detection in IPSec Protected IPv6 Networks Through Secret-Key Sharing
As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (
-
In Pursuit of an Aptitude Test for Potential Cyberspace Warriors
The Air Force has officially assumed the cyberspace mission. In order to perform the mission to the
-
U.S. Policy Recommendation for Responding to Cyber Attacks Against the United States
U.S. Response Strategy for Cyber Attacks The United States has traditionally looked to its military
-
Virtualization Technology Applied to Rootkit Defense
This research effort examines the idea of applying virtualization hardware to enhance operating sys
-
Cyberspace and the New Age of Influence
The importance of cyberspace and the utility of networked computer systems have grown exponentially
-
Secureqemu
This research presents an original emulation-based software protection scheme providing protection
-
What Senior Leaders Need to Know About Cyberspace
What must senior security leaders know about cyberspace to transform their organizations and make w
-
Cyberspace
In the last century, the United States was protected from a direct physical attack by its adversari
-
Multicast Algorithms for Mobile Satellite Communication Networks
With the rise of mobile computing and an increasing need for ubiquitous high speed data connections
-
Internet of Things, Smart Spaces, and Next Generation Networks and Systems
Springer 出版This two-volume set LNCS 15554 and LNCS 15555 constitutes the refereed proceedings of the 24th Inte
-
Air Force and the Cyberspace Mission
Ingram 出版A little over year ago, in November 2005, the Secretary of the Air Force Michael W. Wynne and Air F
-
Netwars Based Study of a Joint STARS Link-16 Network
Ingram 出版Both secure and anti-jam resistant, the Link-16 is the primary communications channel used by the J
-
Offensive Cyber Capability
Ingram 出版The subject of cyberterrorism has become a topic of increasing importance to both the U.S. governme
-
Android Protection System
Ingram 出版This research develops the Android Protection System (APS), a hardware-implemented application secu
-
Scalable and Fault Tolerant Group Key Management
Ingram 出版To address the group key management problem for modern networks this research proposes a lightweigh
-
Psychological Operations Within the Cyberspace Domain
Ingram 出版The importance of cyberspace and the utility of networked computer systems have grown exponentially
-
Cloud-Driven Defense
Ingram 出版The cloud has transformed how we build and scale technology but security remains its most overlooke
-
Computer and Information Security
Springer 出版This book constitutes the proceedings of the first World Conference of Computer and Information Sec
-
Throughput Performance Evaluation and Analysis of Unmodified Bluetooth Devices
Ingram 出版The Air Force relies on the application of new technologies to support and execute its mission. As
-
Packet Analysis of Unmodified Bluetooth Communication Devices
Ingram 出版Bluetooth technology has potential for widespread use within the Department of Defense and the Air
-
Evaluation of the Ad Hoc On-Demand Distance Vector Routing Protocol for Mobile Ad Hoc Networks
Routing protocols designed for wired networks cannot be used in mobile ad hoc networks (MANETs) due
-
Uscybercom
Even though the Department of Defense has named cyberspace as the newest domain of warfare, the Uni
-
Mission Assurance
Military organizations have embedded information technology (IT) into mission processes to increase
-
Insider Threat Detection Using Microsoft Log Files
Many threats to a network are not detected in a timely manner. Some are found hours or even days af
-
Enemy at the Gateways
Every day, hackers use the Internet to "virtually" invade the borders of the United States and its
-
-
Ten Propositions Regarding Cyberpower
This thesis is an initial attempt to clarify and further conceptualize cyberspace as an Air Force w
-
Multi-Class Classification for Identifying JPEG Steganography Embedding Methods
Over 725 steganography tools are available over the Internet, each providing a method for covert tr
-
A Study of Rootkit Stealth Techniques and Associated Detection Methods
In today's world of advanced computing power at the fingertips of any user, we must constantly thin
-
Strategic Deterrence in Cyberspace
This research outlines practical steps that the United States can take to improve strategic deterre
-
Internet Protocol Over Link-16
The purpose of Link-16 is to exchange real-time tactical data among units of the United States and
-
Analysis of Routing Worm Infection Rates on an IPV4 Network
Malicious logic, specifically worms cost network users an enormous amount of time and money. Worms,
-
A Taxonomy for and Analysis of Anonymous Communications Networks
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks inten
-
Using Prospect Theory to Investigate Decision-Making Bias Within an Information Security Context
Information security is an issue that has increased greatly in importance to bothindustry executive
-
From Web1 to Web3
CRC Press 出版From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ol
-
Active Computer Network Defense
A Presidential Commission, several writers, and numerous network security incidents have called att
-
Visually Managing IPsec
The United States Air Force relies heavily on computer networks to transmit vast amounts of informa
-
Internet2
In 2005 Air Force leadership added cyberspace to the USAF mission statement. Shortly thereafter, 8t
-
Mitigating Reversing Vulnerabilities in .NET Applications Using Virtualized Software Protection
Protecting intellectual property contained in application source code and preventing tampering with
-
Patching the Wetware
In the practice of information security, it is increasingly observed that the weakest link in the s
-
Bubble World a Novel Visual Information Retrieval Technique
With the tremendous growth of published electronic information sources in the last decade and the u
-
A Taxonomy for and Analysis of Anonymous Communications Networks
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks inten
-
Establishing the Human Firewall
Hackers frequently use social engineering attacks to gain a foothold into a target network. This ty
-
Software and Critical Technology Protection Against Side-Channel Analysis Through Dynamic Hardware Obfuscation
Side Channel Analysis (SCA) is a method by which an adversary can gather information about a proces
-
WLAN CSMA/CA Performance in a Bluetooth Interference Environment
IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medi