-
Insider Threat Detection Using Microsoft Log Files
Many threats to a network are not detected in a timely manner. Some are found hours or even days af
-
Enemy at the Gateways
Every day, hackers use the Internet to "virtually" invade the borders of the United States and its
-
-
Ten Propositions Regarding Cyberpower
This thesis is an initial attempt to clarify and further conceptualize cyberspace as an Air Force w
-
Multi-Class Classification for Identifying JPEG Steganography Embedding Methods
Over 725 steganography tools are available over the Internet, each providing a method for covert tr
-
A Study of Rootkit Stealth Techniques and Associated Detection Methods
In today's world of advanced computing power at the fingertips of any user, we must constantly thin
-
Strategic Deterrence in Cyberspace
This research outlines practical steps that the United States can take to improve strategic deterre
-
Internet Protocol Over Link-16
The purpose of Link-16 is to exchange real-time tactical data among units of the United States and
-
Analysis of Routing Worm Infection Rates on an IPV4 Network
Malicious logic, specifically worms cost network users an enormous amount of time and money. Worms,
-
A Taxonomy for and Analysis of Anonymous Communications Networks
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks inten
-
Using Prospect Theory to Investigate Decision-Making Bias Within an Information Security Context
Information security is an issue that has increased greatly in importance to bothindustry executive
-
From Web1 to Web3
CRC Press 出版From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ol
-
Active Computer Network Defense
A Presidential Commission, several writers, and numerous network security incidents have called att
-
Visually Managing IPsec
The United States Air Force relies heavily on computer networks to transmit vast amounts of informa
-
Internet2
In 2005 Air Force leadership added cyberspace to the USAF mission statement. Shortly thereafter, 8t
-
Mitigating Reversing Vulnerabilities in .NET Applications Using Virtualized Software Protection
Protecting intellectual property contained in application source code and preventing tampering with
-
Patching the Wetware
In the practice of information security, it is increasingly observed that the weakest link in the s
-
Bubble World a Novel Visual Information Retrieval Technique
With the tremendous growth of published electronic information sources in the last decade and the u
-
A Taxonomy for and Analysis of Anonymous Communications Networks
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks inten
-
Establishing the Human Firewall
Hackers frequently use social engineering attacks to gain a foothold into a target network. This ty
-
Software and Critical Technology Protection Against Side-Channel Analysis Through Dynamic Hardware Obfuscation
Side Channel Analysis (SCA) is a method by which an adversary can gather information about a proces
-
WLAN CSMA/CA Performance in a Bluetooth Interference Environment
IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medi
-
Flexible Options for Cyber Deterrence
The idea of deterrence has existed since the beginning of humanity. The concept of deterrence becam
-
Simple Public Key Infrastructure Analysis Protocol Analysis and Design
Secure electronic communication is based on secrecy, authentication and authorization. One means of
-
Spear Phishing Attack Detection
This thesis addresses the problem of identifying email spear phishing attacks, which are indicative
-
Megabyte Will Always get Through
The purpose of this monograph is to describe the future road ahead for the US Cyber community in li
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-