-
Patching the Wetware
In the practice of information security, it is increasingly observed that the weakest link in the s
-
Psychological Operations Within the Cyberspace Domain
The importance of cyberspace and the utility of networked computer systems have grown exponentially
-
Metamorphic Program Fragmentation as a Software Protection
Unauthorized reverse-engineering of programs and algorithms is a major problem for the software ind
-
Metamorphism as a Software Protection for Non-Malicious Code
The software protection community is always seeking new methods for defending their products from u
-
A Distributed Agent Architecture for a Computer Virus Immune System
Information superiority is identified as an Air Force core competency and is recognized as a key en
-
Cyber Capabilities for Global Strike in 2035
This paper examines global strike, a core Air Force capacity to quickly and precisely attack any ta
-
Digital Warfare
Digital Data Warfare (DDW) is an emerging field that has great potential as a means to meet militar
-
A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator
This research effort identifies attributes of distributed event correlation which make it desirable
-
A Study to Determine Damage Assessment Methods or Models on Air Force Networks
Damage assessment for computer networks is a new area of interest for the Air Force. Previously, th
-
Software Obfuscation With Symmetric Cryptography
Software protection is of great interest to commercial industry. Millions of dollars and years of r
-
Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions
Given the increasingly prominent cyber-based threat, there are substantial research and development
-
Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling
Due to the growing sophisticated capabilities of advanced persistent cyber threats, it is necessary
-
Course Curriculum Development for the Future Cyberwarrior
Cyberspace is one of the latest buzzwords to gain widespread fame and acceptance throughout the wor
-
Routing of Time-Sensitive Data in Mobile Ad Hoc Networks
Mobile networks take the communication concept one step further than wireless networks. In these ne
-
Stochastic Estimation and Control of Queues Within a Computer Network
An extended Kalman filter is used to estimate size and packet arrival rate of network queues. These
-
Mission Assurance
Military organizations have embedded information technology (IT) into mission processes to increase
-
Uscybercom
Even though the Department of Defense has named cyberspace as the newest domain of warfare, the Uni
-
Establishing the Human Firewall
Hackers frequently use social engineering attacks to gain a foothold into a target network. This ty
-
Microsoft Security Copilot
Packt 出版Become a Security Copilot expert and harness the power of AI to stay ahead in the evolving landscap
-
SEO Training 2017
Independentl 出版SEO Training 2017: Search Engine Optimization for Small BusinessLearn practical SEO principles, tac
-
-
Forest Health Monitoring Using AI and Remote Sensing
Ingram 出版Scientific Study from the year 2025 in the subject Computer Sciences - Artificial Intelligence, lan
-
Energy and Throughput Optimization in NB-IoT Networks
This book focuses on enhancing energy efficiency and network throughput in Narrowband IoT (NB-IoT)
-
Intelligent Systems
Neural networks and fuzzy logic are two key areas of artificial intelligence that replicate aspects
-
Multipath Minds
Video streaming has become a dominant form of digital content consumption, with user expectations f
-
Emerging Technologies in Computing
Springer 出版This book LNICST 623 constitutes the refereed conference proceedings of the 7th International Confe
-
Privacy Enhancing Techniques
Springer 出版This book provides a comprehensive exploration of advanced privacy-preserving methods, ensuring sec
-
Computer Security for ASSIST
This thesis examines the multilevel security problem of simultaneous processing of compartmented an
-
Web 3.0 Unleashed
Discover how the internet's next evolution is reshaping the world of business. The first of two vol
-
Cyber Warfare
China's INEW doctrine combining network attack with electronic warfare supports the use of cyber wa
-
Information Assurance and the Defense in Depth
This study investigates the Army's ability to provide information assurance for the NIPRNET. Inform
-
Cybermad
"Cyberspace has grown in importance to the United States (US), as well as the rest of the word. As
-
Computer Security for ASSIST
This thesis examines the multilevel security problem of simultaneous processing of compartmented an
-
Smart Grid and Internet of Things
Springer 出版This book constitutes the refereed proceedings of the 8th EAI International Conference on Smart Gri
-
Cyber Warfare
China's INEW doctrine combining network attack with electronic warfare supports the use of cyber wa
-
Information Assurance and the Defense in Depth
This study investigates the Army's ability to provide information assurance for the NIPRNET. Inform
-
Progress in Cryptology - Africacrypt 2025
Springer 出版This book constitutes the refereed proceedings of the 16th International Conference on Cryptology i
-
Models, Metaphors, and Intuition
My goal in this writing is to promote social consciousness and increase awareness and understanding
-
Emerging Patterns in Cybersecurity
In a digital era where cyber threats are evolving faster than ever, understanding the complexities
-
Moderator-topics
"Moderator-topics, Volume 16" delves into the crucial aspects of online community management and co
-
Hacking Tricks, Methods, and Offensive Strategies
Understanding how systems are secured and how they can be breached is critical for robust cybersecu
-
How Large Language Models Work
Learn how large language models like GPT and Gemini work under the hood in plain English. How Large
-
-
The New Generative AI with LangChain Playbook
Publishdrive 出版STOP Building Fragile AI Prototypes That Break in Production While your competitors struggle with b
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Computational Science and Its Applications - Iccsa 2025 Workshops
Springer 出版The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were hel
-
Next Generation Data Science and Blockchain Technology for Industry 5.0
A groundbreaking view of the industrial models of the future Industry 5.0 is an increasingly widesp
-
Wireless Communication and Remote Control in Drone Delivery Networks
Delivery drones, also known as unmanned aerial vehicles (UAVs), are revolutionizing the logistics a