-
A Taxonomy for and Analysis of Anonymous Communications Networks
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks inten
-
Using Prospect Theory to Investigate Decision-Making Bias Within an Information Security Context
Information security is an issue that has increased greatly in importance to bothindustry executive
-
From Web1 to Web3
CRC Press 出版From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ol
-
Active Computer Network Defense
A Presidential Commission, several writers, and numerous network security incidents have called att
-
Visually Managing IPsec
The United States Air Force relies heavily on computer networks to transmit vast amounts of informa
-
Internet2
In 2005 Air Force leadership added cyberspace to the USAF mission statement. Shortly thereafter, 8t
-
Mitigating Reversing Vulnerabilities in .NET Applications Using Virtualized Software Protection
Protecting intellectual property contained in application source code and preventing tampering with
-
Patching the Wetware
In the practice of information security, it is increasingly observed that the weakest link in the s
-
Bubble World a Novel Visual Information Retrieval Technique
With the tremendous growth of published electronic information sources in the last decade and the u
-
A Taxonomy for and Analysis of Anonymous Communications Networks
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks inten
-
Establishing the Human Firewall
Hackers frequently use social engineering attacks to gain a foothold into a target network. This ty
-
Software and Critical Technology Protection Against Side-Channel Analysis Through Dynamic Hardware Obfuscation
Side Channel Analysis (SCA) is a method by which an adversary can gather information about a proces
-
WLAN CSMA/CA Performance in a Bluetooth Interference Environment
IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medi
-
Flexible Options for Cyber Deterrence
The idea of deterrence has existed since the beginning of humanity. The concept of deterrence becam
-
Simple Public Key Infrastructure Analysis Protocol Analysis and Design
Secure electronic communication is based on secrecy, authentication and authorization. One means of
-
Spear Phishing Attack Detection
This thesis addresses the problem of identifying email spear phishing attacks, which are indicative
-
Megabyte Will Always get Through
The purpose of this monograph is to describe the future road ahead for the US Cyber community in li
-
Graph Theoretical Analysis of Network-centric Operations Using Multi-layer Models
As the Department of Defense continues its transformations to a network centric force, evaluating D
-
Packet Analysis of Unmodified Bluetooth Communication Devices
Bluetooth technology has potential for widespread use within the Department of Defense and the Air
-
Spectral Domain RF Fingerprinting for 802.11 Wireless Devices
The increase in availability and reduction in cost of commercial communication devices (IEEE compli
-
Strategic Deterrence in Cyberspace
This research outlines practical steps that the United States can take to improve strategic deterre
-
Stastistical Machine Translation of Japanese
Statistical machine translation (SMT) uses large amounts of language training data to statistically
-
WLAN CSMA/CA Performance in a Bluetooth Interference Environment
IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medi
-
Internet2
In 2005 Air Force leadership added cyberspace to the USAF mission statement. Shortly thereafter, 8t
-
Emerging Roles of Combat Communication Squadrons in Cyber Warfare As Related to Computer Network Attack, Defense And Exploitation
The warfighter has become increasingly dependent of the cyber domain and the computer network that
-
Software and Critical Technology Protection Against Side-Channel Analysis Through Dynamic Hardware Obfuscation
Side Channel Analysis (SCA) is a method by which an adversary can gather information about a proces
-
Megabyte Will Always get Through
The purpose of this monograph is to describe the future road ahead for the US Cyber community in li
-
Using Prospect Theory to Investigate Decision-Making Bias Within an Information Security Context
Information security is an issue that has increased greatly in importance to bothindustry executive
-
Netwars Based Study of a Joint STARS Link-16 Network
Both secure and anti-jam resistant, the Link-16 is the primary communications channel used by the J
-
A Study of Rootkit Stealth Techniques and Associated Detection Methods
In today's world of advanced computing power at the fingertips of any user, we must constantly thin
-
Mitigating Distributed Denial of Service Attacks in an Anonymous Routing Environment
Network-centric intelligence collection operations use computers and the Internet to identify threa
-
An Analysis of Biometric Technology as an Enabler to Information Assurance
The use of and dependence on Information technology (IT) has grown tremendously in the lasttwo deca
-
Flexible Options for Cyber Deterrence
The idea of deterrence has existed since the beginning of humanity. The concept of deterrence becam
-
Speech Recognition Using the Mellin Transform
The purpose of this research was to improve performance in speech recognition. Specifically, a new
-
Suspicion Modeling in Support of Cyber-Influence Operations/Tactics
Understanding the cognitive process of IT user suspicion may assist organizations in development of
-
Machine Learning Techniques for Characterizing IEEE 802.11b Encrypted Data Streams
As wireless networks become an increasingly common part of the infrastructure in industrialized nat
-
Automated Analysis of ARM Binaries Using the Low-Level Virtual Machine Compiler Framework
Binary program analysis is a critical capability for offensive and defensive operations in Cyberspa
-
Air Force and the Cyberspace Mission
A little over year ago, in November 2005, the Secretary of the Air Force Michael W. Wynne and Air F
-
Evaluation of the Ad Hoc On-Demand Distance Vector Routing Protocol for Mobile Ad Hoc Networks
Routing protocols designed for wired networks cannot be used in mobile ad hoc networks (MANETs) due
-
Visually Managing IPsec
The United States Air Force relies heavily on computer networks to transmit vast amounts of informa
-
Insider Threat Detection Using Microsoft Log Files
Many threats to a network are not detected in a timely manner. Some are found hours or even days af
-
Throughput Performance Evaluation and Analysis of Unmodified Bluetooth Devices
The Air Force relies on the application of new technologies to support and execute its mission. As
-
Defeating Adversary Network Intelligence Efforts With Active Cyber Defense Techniques
The purpose of this research was to assess the potential of dynamic network reconfiguration and dec
-
Ten Propositions Regarding Cyberpower
This thesis is an initial attempt to clarify and further conceptualize cyberspace as an Air Force w
-
Internet Protocol Over Link-16
The purpose of Link-16 is to exchange real-time tactical data among units of the United States and
-
Analysis of Routing Worm Infection Rates on an IPV4 Network
Malicious logic, specifically worms cost network users an enormous amount of time and money. Worms,
-
Take Back Control
V. Pathak 出版Take Back Control: Reclaiming Your Privacy in the Digital AgeThe Practical, No-Nonsense Guide to Pr
-
An Analysis of Botnet Vulnerabilities
Botnets are a significant threat to computer networks and data stored on networked computers. The a