-
Flexible Options for Cyber Deterrence
The idea of deterrence has existed since the beginning of humanity. The concept of deterrence becam
-
Simple Public Key Infrastructure Analysis Protocol Analysis and Design
Secure electronic communication is based on secrecy, authentication and authorization. One means of
-
Spear Phishing Attack Detection
This thesis addresses the problem of identifying email spear phishing attacks, which are indicative
-
Megabyte Will Always get Through
The purpose of this monograph is to describe the future road ahead for the US Cyber community in li
-
Evaluation of the Ad Hoc On-Demand Distance Vector Routing Protocol for Mobile Ad Hoc Networks
Routing protocols designed for wired networks cannot be used in mobile ad hoc networks (MANETs) due
-
Visually Managing IPsec
The United States Air Force relies heavily on computer networks to transmit vast amounts of informa
-
Insider Threat Detection Using Microsoft Log Files
Many threats to a network are not detected in a timely manner. Some are found hours or even days af
-
Throughput Performance Evaluation and Analysis of Unmodified Bluetooth Devices
The Air Force relies on the application of new technologies to support and execute its mission. As
-
Graph Theoretical Analysis of Network-centric Operations Using Multi-layer Models
As the Department of Defense continues its transformations to a network centric force, evaluating D
-
Packet Analysis of Unmodified Bluetooth Communication Devices
Bluetooth technology has potential for widespread use within the Department of Defense and the Air
-
Spectral Domain RF Fingerprinting for 802.11 Wireless Devices
The increase in availability and reduction in cost of commercial communication devices (IEEE compli
-
Strategic Deterrence in Cyberspace
This research outlines practical steps that the United States can take to improve strategic deterre
-
Stastistical Machine Translation of Japanese
Statistical machine translation (SMT) uses large amounts of language training data to statistically
-
WLAN CSMA/CA Performance in a Bluetooth Interference Environment
IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medi
-
Internet2
In 2005 Air Force leadership added cyberspace to the USAF mission statement. Shortly thereafter, 8t
-
Defeating Adversary Network Intelligence Efforts With Active Cyber Defense Techniques
The purpose of this research was to assess the potential of dynamic network reconfiguration and dec
-
Ten Propositions Regarding Cyberpower
This thesis is an initial attempt to clarify and further conceptualize cyberspace as an Air Force w
-
Internet Protocol Over Link-16
The purpose of Link-16 is to exchange real-time tactical data among units of the United States and
-
Analysis of Routing Worm Infection Rates on an IPV4 Network
Malicious logic, specifically worms cost network users an enormous amount of time and money. Worms,
-
The Psychology of Cybersecurity
Routledge 出版This book takes a fresh look at the underappreciated role of human psychology in cybersecurity and
-
From Web1 to Web3
CRC Press 出版From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ol
-
Emerging Roles of Combat Communication Squadrons in Cyber Warfare As Related to Computer Network Attack, Defense And Exploitation
The warfighter has become increasingly dependent of the cyber domain and the computer network that
-
Software and Critical Technology Protection Against Side-Channel Analysis Through Dynamic Hardware Obfuscation
Side Channel Analysis (SCA) is a method by which an adversary can gather information about a proces
-
Megabyte Will Always get Through
The purpose of this monograph is to describe the future road ahead for the US Cyber community in li
-
Using Prospect Theory to Investigate Decision-Making Bias Within an Information Security Context
Information security is an issue that has increased greatly in importance to bothindustry executive
-
Netwars Based Study of a Joint STARS Link-16 Network
Both secure and anti-jam resistant, the Link-16 is the primary communications channel used by the J
-
A Study of Rootkit Stealth Techniques and Associated Detection Methods
In today's world of advanced computing power at the fingertips of any user, we must constantly thin
-
Mitigating Distributed Denial of Service Attacks in an Anonymous Routing Environment
Network-centric intelligence collection operations use computers and the Internet to identify threa
-
An Analysis of Biometric Technology as an Enabler to Information Assurance
The use of and dependence on Information technology (IT) has grown tremendously in the lasttwo deca
-
Flexible Options for Cyber Deterrence
The idea of deterrence has existed since the beginning of humanity. The concept of deterrence becam
-
Speech Recognition Using the Mellin Transform
The purpose of this research was to improve performance in speech recognition. Specifically, a new
-
Suspicion Modeling in Support of Cyber-Influence Operations/Tactics
Understanding the cognitive process of IT user suspicion may assist organizations in development of
-
Machine Learning Techniques for Characterizing IEEE 802.11b Encrypted Data Streams
As wireless networks become an increasingly common part of the infrastructure in industrialized nat
-
Automated Analysis of ARM Binaries Using the Low-Level Virtual Machine Compiler Framework
Binary program analysis is a critical capability for offensive and defensive operations in Cyberspa
-
Air Force and the Cyberspace Mission
A little over year ago, in November 2005, the Secretary of the Air Force Michael W. Wynne and Air F
-
An Analysis of Botnet Vulnerabilities
Botnets are a significant threat to computer networks and data stored on networked computers. The a
-
Development of an Malicious Insider Composite Vulnerability Assessment Methodology
Trusted employees pose a major threat to information systems. Despite ad-vances in prevention, dete
-
Take Back Control
V. Pathak 出版Take Back Control: Reclaiming Your Privacy in the Digital AgeThe Practical, No-Nonsense Guide to Pr
-
Advancements In Smart Card And Biometric Technology
Ingram 出版The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Modeling and Analyzing Security Protocols with Tamarin
Springer 出版The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specificati
-
AWS for Solutions Architects - Third Edition
Packt 出版Master AWS architecture and design secure, scalable, production-ready cloud systems. This practical
-
Inclusive Design for Accessibility
Packt 出版Through insights from twelve industry voices, learn how to create truly accessible and inclusive di
-
Federal It Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Cyber Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Research and Innovation Forum 2024
Springer 出版This book features research presented and discussed during the Research & Innovation Forum (Rii For
-
Cyber Threat Hunters Handbook
Cyber threat hunting is the advanced practice that empowers security teams to actively unearth hidd
-
Internet of Things, Smart Spaces, and Next Generation Networks and Systems
Springer 出版This two-volume set LNCS 15554 and LNCS 15555 constitutes the refereed proceedings of the 24th Inte
-
Advanced Intelligent Computing Technology and Applications
Springer 出版The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, const