-
Interagency Organization for Cyberwar
Many people take for granted things they cannot see, smell, or touch. For most people, security in
-
Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack
The art of warfare in cyberspace is evolving. Cyberspace, as the newest warfighting domain, require
-
What Senior Leaders Need to Know About Cyberspace
What must senior security leaders know about cyberspace to transform their organizations and make w
-
A Study to Determine Damage Assessment Methods or Models on Air Force Networks
Damage assessment for computer networks is a new area of interest for the Air Force. Previously, th
-
Course Curriculum Development for the Future Cyberwarrior
Cyberspace is one of the latest buzzwords to gain widespread fame and acceptance throughout the wor
-
An Analysis of Biometric Technology as an Enabler to Information Assurance
The use of and dependence on Information technology (IT) has grown tremendously in the lasttwo deca
-
Digital Warfare
Digital Data Warfare (DDW) is an emerging field that has great potential as a means to meet militar
-
Suspicion Modeling in Support of Cyber-Influence Operations/Tactics
Understanding the cognitive process of IT user suspicion may assist organizations in development of
-
A Distributed Agent Architecture for a Computer Virus Immune System
Information superiority is identified as an Air Force core competency and is recognized as a key en
-
Routing of Time-Sensitive Data in Mobile Ad Hoc Networks
Mobile networks take the communication concept one step further than wireless networks. In these ne
-
Defining Our National Cyberspace Boundaries
In February 2009, the Obama Administration commissioned a 60-day review of the United States' cyber
-
U.S. Policy Recommendation for Responding to Cyber Attacks Against the United States
U.S. Response Strategy for Cyber Attacks The United States has traditionally looked to its military
-
Geographic Location of a Computer Node Examining a Time-to-Location Algorithm and Multiple Autonomous System Networks
To determine the location of a computer on the Internet without resorting to outside information or
-
Metamorphism as a Software Protection for Non-Malicious Code
The software protection community is always seeking new methods for defending their products from u
-
Graph Theoretical Analysis of Network-centric Operations Using Multi-layer Models
As the Department of Defense continues its transformations to a network centric force, evaluating D
-
Multicast Algorithms for Mobile Satellite Communication Networks
With the rise of mobile computing and an increasing need for ubiquitous high speed data connections
-
Software Obfuscation With Symmetric Cryptography
Software protection is of great interest to commercial industry. Millions of dollars and years of r
-
Software Protection Against Reverse Engineering Tools
Advances in technology have led to the use of simple to use automated debugging tools which can be
-
Passwords
The purpose of this research was to see how individuals use and remember passwords. Specifically, t
-
Developing a Gualia-Based Multi-Agent Architecture for use in Malware Detection
Detecting network intruders and malicious software is a significant problem for network administrat
-
Formal Mitigation Strategies for the Insider Threat
The advancement of technology and reliance on information systems have fostered an environment of s
-
Bubble World a Novel Visual Information Retrieval Technique
With the tremendous growth of published electronic information sources in the last decade and the u
-
Scalable and Fault Tolerant Group Key Management
To address the group key management problem for modern networks this research proposes a lightweigh
-
Enemy at the Gateways
Every day, hackers use the Internet to "virtually" invade the borders of the United States and its
-
Historical Analysis of the Awareness and Key Issues of the Insider Threat to Information Systems
Since information systems have become smaller, faster, cheaper and more interconnected many organiz
-
Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack
The art of warfare in cyberspace is evolving. Cyberspace, as the newest warfighting domain, require
-
Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function
Today's society has become more dependent on the integrity and protection of digital information us
-
Spear Phishing Attack Detection
This thesis addresses the problem of identifying email spear phishing attacks, which are indicative
-
Cryptanalysis of Pseudorandom Number Generators in Wireless Sensor Networks
This work presents a brute-force attack on an elliptic curve cryptosystemimplemented on UC Berkley'
-
Geographic Location of a Computer Node Examining a Time-to-Location Algorithm and Multiple Autonomous System Networks
To determine the location of a computer on the Internet without resorting to outside information or
-
Developing a Corpus Specific Stop-List Using Quantitative Comparison
We have become overwhelmed with electronic information and it seems our situation is not going to i
-
Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository
The Air Force has multiple initiatives to develop data repositories for high-speed network intrusio
-
An Application of Automated Theorem Provers to Computer System Security
The Schematic Protection Model is specified in SAL and theorems about Take-Grant and New Technology
-
Cybersecurity Essentials for Small Businesses
Acrasolution 出版Cybersecurity Essentials for SMBs: The Complete Guide to Protecting Your Small Business in the Digi
-
Accelerating Malware Detection via a Graphics Processing Unit
Real-time malware analysis requires processing large amounts of data storage to look for suspicious
-
Geolocation of a Node on a Local Area Network
Geolocation is the process of identifying a node using only its Internet Protocol (IP) address. Loc
-
Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System
Insider threats can pose a great risk to organizations and by their very nature are difficult to pr
-
Simple Public Key Infrastructure Analysis Protocol Analysis and Design
Secure electronic communication is based on secrecy, authentication and authorization. One means of
-
Android Protection System
This research develops the Android Protection System (APS), a hardware-implemented application secu
-
Mitigating Reversing Vulnerabilities in .NET Applications Using Virtualized Software Protection
Protecting intellectual property contained in application source code and preventing tampering with
-
Active Computer Network Defense
A Presidential Commission, several writers, and numerous network security incidents have called att
-
Offensive Cyber Capability
The subject of cyberterrorism has become a topic of increasing importance to both the U.S. governme
-
Multi-Class Classification for Identifying JPEG Steganography Embedding Methods
Over 725 steganography tools are available over the Internet, each providing a method for covert tr
-
To Click or Not to Click
Today's Air Force networks are under frequent attack. One of the most pernicious threats is a sophi
-
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm With Application to the Detection of Distributed Computer Network Intrusions
Today's predominantly-employed signature-based intrusion detection systems are reactive in nature a
-
Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework
The Air Force and other Department of Defense (DoD) computer systems typically rely on traditional
-
Software Protection Against Reverse Engineering Tools
Advances in technology have led to the use of simple to use automated debugging tools which can be
-
Performance Analysis and Comparison of Multiple Routing Protocols in a Large-Area, High-Speed Mobile Node Ad Hoc Network
The U.S. Air Force is interested in developing a standard ad hoc framework using "heavy" aircraft t