-
Advanced Intelligent Computing Technology and Applications
Springer 出版The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, const
-
Advanced Intelligent Computing Technology and Applications
Springer 出版The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, const
-
Moderator-topics
"Moderator-topics, Volume 16" delves into the crucial aspects of online community management and co
-
Cloud Computing
Springer 出版This book LNICST 617 constitutes the refereed proceedings of the 12th EAI International Conference
-
Hacking Voice-Controllable Devices
Springer 出版Voice-controllable devices allow hands-free interactions, offering a modern user experience and hel
-
Empowering Iot: Reliability, Network Management, Sensing, and Probabilistic Charging in Wireless Sensor Networks
Springer 出版This book provides a comprehensive exploration of both fundamental principles and practical enginee
-
Information Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
The Cybernetic Society
Basic Books 出版"An optimistic, shimmering image of a world where AI operates in service to humankind" (Kirkus) arg
-
CompTIA(R) SecurityX(R) CAS-005 Certification Guide - Second Edition
Packt 出版Become a cybersecurity expert with comprehensive CAS-005 preparation using this detailed guide pack
-
Information Systems Security and Privacy
Springer 出版This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on
-
Cognitive Computation and Systems
Springer 出版This book constitutes the refereed proceedings of the Third International Conference on Cognitive C
-
Supplementing an Ad Hoc Wireless Network Routing Protocol With Radio Frequency Identification Tags
Wireless sensor networks (WSNs) have a broad and varied range of applications, yet all of these are
-
Mitigating Distributed Denial of Service Attacks in an Anonymous Routing Environment
Network-centric intelligence collection operations use computers and the Internet to identify threa
-
Stastistical Machine Translation of Japanese
Statistical machine translation (SMT) uses large amounts of language training data to statistically
-
Spectral Domain RF Fingerprinting for 802.11 Wireless Devices
The increase in availability and reduction in cost of commercial communication devices (IEEE compli
-
Virtualization Technology Applied to Rootkit Defense
This research effort examines the idea of applying virtualization hardware to enhance operating sys
-
Toward Cyber Omniscience
It is widely accepted that cyberspace is a vulnerable and highly contested environment. The United
-
Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems
Because the cyberspace environment is changing so quickly, the slow, methodical Department of Defen
-
An Analysis of Information Asset Valuation Quantification Methodology for Application With Cyber Information Mission Impact Assessment
The purpose of this research is to develop a standardized Information Asset Valuation (IAV) methodo
-
Cognitive Computation and Systems
Springer 出版This book constitutes the refereed proceedings of the Third International Conference on Cognitive C
-
Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework
The Air Force and other Department of Defense (DoD) computer systems typically rely on traditional
-
Metamorphic Program Fragmentation as a Software Protection
Unauthorized reverse-engineering of programs and algorithms is a major problem for the software ind
-
Cyber Capabilities for Global Strike in 2035
This paper examines global strike, a core Air Force capacity to quickly and precisely attack any ta
-
Detecting Man-in-the-Middle Attacks Against Transport Layer Security Connections With Timing Analysis
The Transport Layer Security (TLS) protocol is a vital component to the protection of data as it tr
-
An Application of Automated Theorem Provers to Computer System Security
The Schematic Protection Model is specified in SAL and theorems about Take-Grant and New Technology
-
Developing a Corpus Specific Stop-List Using Quantitative Comparison
We have become overwhelmed with electronic information and it seems our situation is not going to i
-
An Analysis of the Performance and Security of J2SDK 1.4 JSSE Implementation of SSL/TLS
The Java SSL/TLS package distributed with the J2SE 1.4.2 runtime is a Java implementation of the SS
-
Developing a Gualia-Based Multi-Agent Architecture for use in Malware Detection
Detecting network intruders and malicious software is a significant problem for network administrat
-
Accelerating Malware Detection via a Graphics Processing Unit
Real-time malware analysis requires processing large amounts of data storage to look for suspicious
-
Performance Analysis and Comparison of Multiple Routing Protocols in a Large-Area, High-Speed Mobile Node Ad Hoc Network
The U.S. Air Force is interested in developing a standard ad hoc framework using "heavy" aircraft t
-
Cybermad
"Cyberspace has grown in importance to the United States (US), as well as the rest of the word. As
-
Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions
Given the increasingly prominent cyber-based threat, there are substantial research and development
-
Geolocation of a Node on a Local Area Network
Geolocation is the process of identifying a node using only its Internet Protocol (IP) address. Loc
-
Toward Cyber Omniscience
It is widely accepted that cyberspace is a vulnerable and highly contested environment. The United
-
Emerging Roles of Combat Communication Squadrons in Cyber Warfare As Related to Computer Network Attack, Defense And Exploitation
The warfighter has become increasingly dependent of the cyber domain and the computer network that
-
Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling
Due to the growing sophisticated capabilities of advanced persistent cyber threats, it is necessary
-
Development of an Malicious Insider Composite Vulnerability Assessment Methodology
Trusted employees pose a major threat to information systems. Despite ad-vances in prevention, dete
-
Passwords
The purpose of this research was to see how individuals use and remember passwords. Specifically, t
-
Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository
The Air Force has multiple initiatives to develop data repositories for high-speed network intrusio
-
A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator
This research effort identifies attributes of distributed event correlation which make it desirable
-
Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems
Because the cyberspace environment is changing so quickly, the slow, methodical Department of Defen
-
An Analysis of Botnet Vulnerabilities
Botnets are a significant threat to computer networks and data stored on networked computers. The a
-
Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System
Insider threats can pose a great risk to organizations and by their very nature are difficult to pr
-
Stochastic Estimation and Control of Queues Within a Computer Network
An extended Kalman filter is used to estimate size and packet arrival rate of network queues. These
-
Formal Mitigation Strategies for the Insider Threat
The advancement of technology and reliance on information systems have fostered an environment of s
-
Automated Analysis of ARM Binaries Using the Low-Level Virtual Machine Compiler Framework
Binary program analysis is a critical capability for offensive and defensive operations in Cyberspa
-
To Click or Not to Click
Today's Air Force networks are under frequent attack. One of the most pernicious threats is a sophi
-
Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function
Today's society has become more dependent on the integrity and protection of digital information us