-
Information Systems Security and Privacy
Springer 出版This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on
-
Cognitive Computation and Systems
Springer 出版This book constitutes the refereed proceedings of the Third International Conference on Cognitive C
-
Supplementing an Ad Hoc Wireless Network Routing Protocol With Radio Frequency Identification Tags
Wireless sensor networks (WSNs) have a broad and varied range of applications, yet all of these are
-
Mitigating Distributed Denial of Service Attacks in an Anonymous Routing Environment
Network-centric intelligence collection operations use computers and the Internet to identify threa
-
Stastistical Machine Translation of Japanese
Statistical machine translation (SMT) uses large amounts of language training data to statistically
-
Spectral Domain RF Fingerprinting for 802.11 Wireless Devices
The increase in availability and reduction in cost of commercial communication devices (IEEE compli
-
Virtualization Technology Applied to Rootkit Defense
This research effort examines the idea of applying virtualization hardware to enhance operating sys
-
-
-
-
-
Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework
The Air Force and other Department of Defense (DoD) computer systems typically rely on traditional
-
Metamorphic Program Fragmentation as a Software Protection
Unauthorized reverse-engineering of programs and algorithms is a major problem for the software ind
-
Cyber Capabilities for Global Strike in 2035
This paper examines global strike, a core Air Force capacity to quickly and precisely attack any ta
-
Detecting Man-in-the-Middle Attacks Against Transport Layer Security Connections With Timing Analysis
The Transport Layer Security (TLS) protocol is a vital component to the protection of data as it tr
-
An Application of Automated Theorem Provers to Computer System Security
The Schematic Protection Model is specified in SAL and theorems about Take-Grant and New Technology
-
Developing a Corpus Specific Stop-List Using Quantitative Comparison
We have become overwhelmed with electronic information and it seems our situation is not going to i
-
An Analysis of the Performance and Security of J2SDK 1.4 JSSE Implementation of SSL/TLS
The Java SSL/TLS package distributed with the J2SE 1.4.2 runtime is a Java implementation of the SS
-
Developing a Gualia-Based Multi-Agent Architecture for use in Malware Detection
Detecting network intruders and malicious software is a significant problem for network administrat
-
Accelerating Malware Detection via a Graphics Processing Unit
Real-time malware analysis requires processing large amounts of data storage to look for suspicious
-
Performance Analysis and Comparison of Multiple Routing Protocols in a Large-Area, High-Speed Mobile Node Ad Hoc Network
The U.S. Air Force is interested in developing a standard ad hoc framework using "heavy" aircraft t
-
Cybermad
"Cyberspace has grown in importance to the United States (US), as well as the rest of the word. As
-
Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions
Given the increasingly prominent cyber-based threat, there are substantial research and development
-
Geolocation of a Node on a Local Area Network
Geolocation is the process of identifying a node using only its Internet Protocol (IP) address. Loc
-
Toward Cyber Omniscience
It is widely accepted that cyberspace is a vulnerable and highly contested environment. The United
-
Emerging Roles of Combat Communication Squadrons in Cyber Warfare As Related to Computer Network Attack, Defense And Exploitation
The warfighter has become increasingly dependent of the cyber domain and the computer network that
-
Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling
Due to the growing sophisticated capabilities of advanced persistent cyber threats, it is necessary
-
Development of an Malicious Insider Composite Vulnerability Assessment Methodology
Trusted employees pose a major threat to information systems. Despite ad-vances in prevention, dete
-
Passwords
The purpose of this research was to see how individuals use and remember passwords. Specifically, t
-
Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository
The Air Force has multiple initiatives to develop data repositories for high-speed network intrusio
-
A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator
This research effort identifies attributes of distributed event correlation which make it desirable
-
Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems
Because the cyberspace environment is changing so quickly, the slow, methodical Department of Defen
-
An Analysis of Botnet Vulnerabilities
Botnets are a significant threat to computer networks and data stored on networked computers. The a
-
Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System
Insider threats can pose a great risk to organizations and by their very nature are difficult to pr
-
Stochastic Estimation and Control of Queues Within a Computer Network
An extended Kalman filter is used to estimate size and packet arrival rate of network queues. These
-
Formal Mitigation Strategies for the Insider Threat
The advancement of technology and reliance on information systems have fostered an environment of s
-
Automated Analysis of ARM Binaries Using the Low-Level Virtual Machine Compiler Framework
Binary program analysis is a critical capability for offensive and defensive operations in Cyberspa
-
To Click or Not to Click
Today's Air Force networks are under frequent attack. One of the most pernicious threats is a sophi
-
Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function
Today's society has become more dependent on the integrity and protection of digital information us
-
Interagency Organization for Cyberwar
Many people take for granted things they cannot see, smell, or touch. For most people, security in
-
Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack
The art of warfare in cyberspace is evolving. Cyberspace, as the newest warfighting domain, require
-
What Senior Leaders Need to Know About Cyberspace
What must senior security leaders know about cyberspace to transform their organizations and make w
-
A Study to Determine Damage Assessment Methods or Models on Air Force Networks
Damage assessment for computer networks is a new area of interest for the Air Force. Previously, th
-
Course Curriculum Development for the Future Cyberwarrior
Cyberspace is one of the latest buzzwords to gain widespread fame and acceptance throughout the wor
-
An Analysis of Biometric Technology as an Enabler to Information Assurance
The use of and dependence on Information technology (IT) has grown tremendously in the lasttwo deca
-
Digital Warfare
Digital Data Warfare (DDW) is an emerging field that has great potential as a means to meet militar
-
Suspicion Modeling in Support of Cyber-Influence Operations/Tactics
Understanding the cognitive process of IT user suspicion may assist organizations in development of
-
A Distributed Agent Architecture for a Computer Virus Immune System
Information superiority is identified as an Air Force core competency and is recognized as a key en