-
Course Curriculum Development for the Future Cyberwarrior
Cyberspace is one of the latest buzzwords to gain widespread fame and acceptance throughout the wor
-
Routing of Time-Sensitive Data in Mobile Ad Hoc Networks
Mobile networks take the communication concept one step further than wireless networks. In these ne
-
Stochastic Estimation and Control of Queues Within a Computer Network
An extended Kalman filter is used to estimate size and packet arrival rate of network queues. These
-
Mission Assurance
Military organizations have embedded information technology (IT) into mission processes to increase
-
Cyber Capabilities for Global Strike in 2035
This paper examines global strike, a core Air Force capacity to quickly and precisely attack any ta
-
Digital Warfare
Digital Data Warfare (DDW) is an emerging field that has great potential as a means to meet militar
-
A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator
This research effort identifies attributes of distributed event correlation which make it desirable
-
A Study to Determine Damage Assessment Methods or Models on Air Force Networks
Damage assessment for computer networks is a new area of interest for the Air Force. Previously, th
-
Software Obfuscation With Symmetric Cryptography
Software protection is of great interest to commercial industry. Millions of dollars and years of r
-
Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions
Given the increasingly prominent cyber-based threat, there are substantial research and development
-
Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling
Due to the growing sophisticated capabilities of advanced persistent cyber threats, it is necessary
-
Uscybercom
Even though the Department of Defense has named cyberspace as the newest domain of warfare, the Uni
-
Establishing the Human Firewall
Hackers frequently use social engineering attacks to gain a foothold into a target network. This ty
-
Passwords
The purpose of this research was to see how individuals use and remember passwords. Specifically, t
-
Developing a Gualia-Based Multi-Agent Architecture for use in Malware Detection
Detecting network intruders and malicious software is a significant problem for network administrat
-
Formal Mitigation Strategies for the Insider Threat
The advancement of technology and reliance on information systems have fostered an environment of s
-
Bubble World a Novel Visual Information Retrieval Technique
With the tremendous growth of published electronic information sources in the last decade and the u
-
Scalable and Fault Tolerant Group Key Management
To address the group key management problem for modern networks this research proposes a lightweigh
-
Enemy at the Gateways
Every day, hackers use the Internet to "virtually" invade the borders of the United States and its
-
Historical Analysis of the Awareness and Key Issues of the Insider Threat to Information Systems
Since information systems have become smaller, faster, cheaper and more interconnected many organiz
-
Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack
The art of warfare in cyberspace is evolving. Cyberspace, as the newest warfighting domain, require
-
Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function
Today's society has become more dependent on the integrity and protection of digital information us
-
Spear Phishing Attack Detection
This thesis addresses the problem of identifying email spear phishing attacks, which are indicative
-
Cryptanalysis of Pseudorandom Number Generators in Wireless Sensor Networks
This work presents a brute-force attack on an elliptic curve cryptosystemimplemented on UC Berkley'
-
Geographic Location of a Computer Node Examining a Time-to-Location Algorithm and Multiple Autonomous System Networks
To determine the location of a computer on the Internet without resorting to outside information or
-
Developing a Corpus Specific Stop-List Using Quantitative Comparison
We have become overwhelmed with electronic information and it seems our situation is not going to i
-
Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository
The Air Force has multiple initiatives to develop data repositories for high-speed network intrusio
-
An Application of Automated Theorem Provers to Computer System Security
The Schematic Protection Model is specified in SAL and theorems about Take-Grant and New Technology
-
Cybersecurity Essentials for Small Businesses
Acrasolution 出版Cybersecurity Essentials for SMBs: The Complete Guide to Protecting Your Small Business in the Digi
-
A Distributed Agent Architecture for a Computer Virus Immune System
Information superiority is identified as an Air Force core competency and is recognized as a key en
-
Metamorphic Program Fragmentation as a Software Protection
Unauthorized reverse-engineering of programs and algorithms is a major problem for the software ind
-
Metamorphism as a Software Protection for Non-Malicious Code
The software protection community is always seeking new methods for defending their products from u
-
Microsoft Security Copilot
Packt 出版Become a Security Copilot expert and harness the power of AI to stay ahead in the evolving landscap
-
SEO Training 2017
Independentl 出版SEO Training 2017: Search Engine Optimization for Small BusinessLearn practical SEO principles, tac
-
-
Forest Health Monitoring Using AI and Remote Sensing
Ingram 出版Scientific Study from the year 2025 in the subject Computer Sciences - Artificial Intelligence, lan
-
Energy and Throughput Optimization in NB-IoT Networks
This book focuses on enhancing energy efficiency and network throughput in Narrowband IoT (NB-IoT)
-
Intelligent Systems
Neural networks and fuzzy logic are two key areas of artificial intelligence that replicate aspects
-
Multipath Minds
Video streaming has become a dominant form of digital content consumption, with user expectations f
-
Emerging Technologies in Computing
Springer 出版This book LNICST 623 constitutes the refereed conference proceedings of the 7th International Confe
-
Privacy Enhancing Techniques
Springer 出版This book provides a comprehensive exploration of advanced privacy-preserving methods, ensuring sec
-
Computer Security for ASSIST
This thesis examines the multilevel security problem of simultaneous processing of compartmented an
-
Web 3.0 Unleashed
Discover how the internet's next evolution is reshaping the world of business. The first of two vol
-
Cyber Warfare
China's INEW doctrine combining network attack with electronic warfare supports the use of cyber wa
-
Information Assurance and the Defense in Depth
This study investigates the Army's ability to provide information assurance for the NIPRNET. Inform
-
Information Assurance and the Defense in Depth
This study investigates the Army's ability to provide information assurance for the NIPRNET. Inform
-
Cyber Warfare
China's INEW doctrine combining network attack with electronic warfare supports the use of cyber wa
-
Smart Grid and Internet of Things
Springer 出版This book constitutes the refereed proceedings of the 8th EAI International Conference on Smart Gri