-
Defeating 802.11 Wireless Networks
Homeland Security of the United States is constantly under threat of attack from terrorist organiza
-
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm With Application to the Detection of Distributed Computer Network Intrusions
Today's predominantly-employed signature-based intrusion detection systems are reactive in nature a
-
Performance Analysis of Protocol Independent Multicasting-Dense Mode in Low Earth Orbit Satellite Networks
This research explored the implementation of Protocol Independent Multicasting - Dense Mode (PIM-DM
-
Enabling Intrusion Detection in IPSec Protected IPv6 Networks Through Secret-Key Sharing
As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (
-
An Analysis of Information Asset Valuation Quantification Methodology for Application With Cyber Information Mission Impact Assessment
The purpose of this research is to develop a standardized Information Asset Valuation (IAV) methodo
-
In Pursuit of an Aptitude Test for Potential Cyberspace Warriors
The Air Force has officially assumed the cyberspace mission. In order to perform the mission to the
-
Cryptanalysis of Pseudorandom Number Generators in Wireless Sensor Networks
This work presents a brute-force attack on an elliptic curve cryptosystemimplemented on UC Berkley'
-
Speech Recognition Using the Mellin Transform
The purpose of this research was to improve performance in speech recognition. Specifically, a new
-
Interagency Organization for Cyberwar
Many people take for granted things they cannot see, smell, or touch. For most people, security in
-
Defining Our National Cyberspace Boundaries
In February 2009, the Obama Administration commissioned a 60-day review of the United States' cyber
-
A Study of Quality of Service Communication for High-Speed Packet-Switching Computer Sub-Networks
In this thesis, we analyze various factors that affect quality of service (QoS) communication in hi
-
Performance Analysis of Protocol Independent Multicasting-Dense Mode in Low Earth Orbit Satellite Networks
This research explored the implementation of Protocol Independent Multicasting - Dense Mode (PIM-DM
-
Enabling Intrusion Detection in IPSec Protected IPv6 Networks Through Secret-Key Sharing
As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (
-
In Pursuit of an Aptitude Test for Potential Cyberspace Warriors
The Air Force has officially assumed the cyberspace mission. In order to perform the mission to the
-
U.S. Policy Recommendation for Responding to Cyber Attacks Against the United States
U.S. Response Strategy for Cyber Attacks The United States has traditionally looked to its military
-
Virtualization Technology Applied to Rootkit Defense
This research effort examines the idea of applying virtualization hardware to enhance operating sys
-
Cyberspace and the New Age of Influence
The importance of cyberspace and the utility of networked computer systems have grown exponentially
-
Developing Cyberspace Data Understanding
Current intrusion detection systems generate a large number of specific alerts, but do not provide
-
Performance Evaluation and Benchmarking
Springer 出版This book constitutes the refereed proceedings of the 16th TPC Technology Conference on Performance
-
Automating Security Protocol Analysis
When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol [24], it took
-
Supplementing an Ad Hoc Wireless Network Routing Protocol With Radio Frequency Identification Tags
Wireless sensor networks (WSNs) have a broad and varied range of applications, yet all of these are
-
Evaluation of the Effects of Predicted Associativity on the Reliability and Performance of Mobile Ad Hoc Networks
Routing in Mobile Ad Hoc Networks (MANETs) presents unique challenges not encountered in convention
-
Internet of Things, Smart Spaces, and Next Generation Networks and Systems
Springer 出版This two-volume set LNCS 15554 and LNCS 15555 constitutes the refereed proceedings of the 24th Inte
-
Secureqemu
This research presents an original emulation-based software protection scheme providing protection
-
What Senior Leaders Need to Know About Cyberspace
What must senior security leaders know about cyberspace to transform their organizations and make w
-
Cyberspace
In the last century, the United States was protected from a direct physical attack by its adversari
-
Multicast Algorithms for Mobile Satellite Communication Networks
With the rise of mobile computing and an increasing need for ubiquitous high speed data connections
-
Air Force and the Cyberspace Mission
Ingram 出版A little over year ago, in November 2005, the Secretary of the Air Force Michael W. Wynne and Air F
-
Netwars Based Study of a Joint STARS Link-16 Network
Ingram 出版Both secure and anti-jam resistant, the Link-16 is the primary communications channel used by the J
-
Offensive Cyber Capability
Ingram 出版The subject of cyberterrorism has become a topic of increasing importance to both the U.S. governme
-
Android Protection System
Ingram 出版This research develops the Android Protection System (APS), a hardware-implemented application secu
-
Scalable and Fault Tolerant Group Key Management
Ingram 出版To address the group key management problem for modern networks this research proposes a lightweigh
-
Psychological Operations Within the Cyberspace Domain
Ingram 出版The importance of cyberspace and the utility of networked computer systems have grown exponentially
-
Cloud-Driven Defense
Ingram 出版The cloud has transformed how we build and scale technology but security remains its most overlooke
-
Computer and Information Security
Springer 出版This book constitutes the proceedings of the first World Conference of Computer and Information Sec
-
Throughput Performance Evaluation and Analysis of Unmodified Bluetooth Devices
Ingram 出版The Air Force relies on the application of new technologies to support and execute its mission. As
-
Packet Analysis of Unmodified Bluetooth Communication Devices
Ingram 出版Bluetooth technology has potential for widespread use within the Department of Defense and the Air
-
Evaluation of the Ad Hoc On-Demand Distance Vector Routing Protocol for Mobile Ad Hoc Networks
Routing protocols designed for wired networks cannot be used in mobile ad hoc networks (MANETs) due
-
Uscybercom
Even though the Department of Defense has named cyberspace as the newest domain of warfare, the Uni
-
Mission Assurance
Military organizations have embedded information technology (IT) into mission processes to increase
-
Insider Threat Detection Using Microsoft Log Files
Many threats to a network are not detected in a timely manner. Some are found hours or even days af
-
Enemy at the Gateways
Every day, hackers use the Internet to "virtually" invade the borders of the United States and its
-
-
Ten Propositions Regarding Cyberpower
This thesis is an initial attempt to clarify and further conceptualize cyberspace as an Air Force w
-
Multi-Class Classification for Identifying JPEG Steganography Embedding Methods
Over 725 steganography tools are available over the Internet, each providing a method for covert tr
-
A Study of Rootkit Stealth Techniques and Associated Detection Methods
In today's world of advanced computing power at the fingertips of any user, we must constantly thin
-
Strategic Deterrence in Cyberspace
This research outlines practical steps that the United States can take to improve strategic deterre
-
Internet Protocol Over Link-16
The purpose of Link-16 is to exchange real-time tactical data among units of the United States and