-
-
-
-
Air Force and the Cyberspace Mission
Ingram 出版A little over year ago, in November 2005, the Secretary of the Air Force Michael W. Wynne and Air F
-
Netwars Based Study of a Joint STARS Link-16 Network
Ingram 出版Both secure and anti-jam resistant, the Link-16 is the primary communications channel used by the J
-
Offensive Cyber Capability
Ingram 出版The subject of cyberterrorism has become a topic of increasing importance to both the U.S. governme
-
Android Protection System
Ingram 出版This research develops the Android Protection System (APS), a hardware-implemented application secu
-
Scalable and Fault Tolerant Group Key Management
Ingram 出版To address the group key management problem for modern networks this research proposes a lightweigh
-
Psychological Operations Within the Cyberspace Domain
Ingram 出版The importance of cyberspace and the utility of networked computer systems have grown exponentially
-
Cloud-Driven Defense
Ingram 出版The cloud has transformed how we build and scale technology but security remains its most overlooke
-
Computer and Information Security
Springer 出版This book constitutes the proceedings of the first World Conference of Computer and Information Sec
-
Throughput Performance Evaluation and Analysis of Unmodified Bluetooth Devices
Ingram 出版The Air Force relies on the application of new technologies to support and execute its mission. As
-
Packet Analysis of Unmodified Bluetooth Communication Devices
Ingram 出版Bluetooth technology has potential for widespread use within the Department of Defense and the Air
-
Evaluation of the Ad Hoc On-Demand Distance Vector Routing Protocol for Mobile Ad Hoc Networks
Routing protocols designed for wired networks cannot be used in mobile ad hoc networks (MANETs) due
-
Uscybercom
Even though the Department of Defense has named cyberspace as the newest domain of warfare, the Uni
-
Mission Assurance
Military organizations have embedded information technology (IT) into mission processes to increase
-
Insider Threat Detection Using Microsoft Log Files
Many threats to a network are not detected in a timely manner. Some are found hours or even days af
-
Enemy at the Gateways
Every day, hackers use the Internet to "virtually" invade the borders of the United States and its
-
-
Ten Propositions Regarding Cyberpower
This thesis is an initial attempt to clarify and further conceptualize cyberspace as an Air Force w
-
Multi-Class Classification for Identifying JPEG Steganography Embedding Methods
Over 725 steganography tools are available over the Internet, each providing a method for covert tr
-
A Study of Rootkit Stealth Techniques and Associated Detection Methods
In today's world of advanced computing power at the fingertips of any user, we must constantly thin
-
Strategic Deterrence in Cyberspace
This research outlines practical steps that the United States can take to improve strategic deterre
-
Internet Protocol Over Link-16
The purpose of Link-16 is to exchange real-time tactical data among units of the United States and
-
Analysis of Routing Worm Infection Rates on an IPV4 Network
Malicious logic, specifically worms cost network users an enormous amount of time and money. Worms,
-
A Taxonomy for and Analysis of Anonymous Communications Networks
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks inten
-
Using Prospect Theory to Investigate Decision-Making Bias Within an Information Security Context
Information security is an issue that has increased greatly in importance to bothindustry executive
-
From Web1 to Web3
CRC Press 出版From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ol
-
Active Computer Network Defense
A Presidential Commission, several writers, and numerous network security incidents have called att
-
Visually Managing IPsec
The United States Air Force relies heavily on computer networks to transmit vast amounts of informa
-
Internet2
In 2005 Air Force leadership added cyberspace to the USAF mission statement. Shortly thereafter, 8t
-
Mitigating Reversing Vulnerabilities in .NET Applications Using Virtualized Software Protection
Protecting intellectual property contained in application source code and preventing tampering with
-
Patching the Wetware
In the practice of information security, it is increasingly observed that the weakest link in the s
-
Bubble World a Novel Visual Information Retrieval Technique
With the tremendous growth of published electronic information sources in the last decade and the u
-
A Taxonomy for and Analysis of Anonymous Communications Networks
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks inten
-
Establishing the Human Firewall
Hackers frequently use social engineering attacks to gain a foothold into a target network. This ty
-
Software and Critical Technology Protection Against Side-Channel Analysis Through Dynamic Hardware Obfuscation
Side Channel Analysis (SCA) is a method by which an adversary can gather information about a proces
-
WLAN CSMA/CA Performance in a Bluetooth Interference Environment
IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medi
-
Flexible Options for Cyber Deterrence
The idea of deterrence has existed since the beginning of humanity. The concept of deterrence becam
-
Simple Public Key Infrastructure Analysis Protocol Analysis and Design
Secure electronic communication is based on secrecy, authentication and authorization. One means of
-
Spear Phishing Attack Detection
This thesis addresses the problem of identifying email spear phishing attacks, which are indicative
-
Megabyte Will Always get Through
The purpose of this monograph is to describe the future road ahead for the US Cyber community in li
-
-
-
-
-
-