News
The debate over how identifying information is used online has a focus in the decisions over identity policies employed in online communities. The now-common decision -- between anonymous, ...
*Secure communication in HARMS (Human, Agent, Robot, Machine, and Sensor) for Heterogeneous Robotic Teams *Our aim is to be able to command and control the Robot by natural language *Issues on ...
Dr. Richard Love is currently a professor at NDU's College of Information and Cyberspace and recently served as a professor of strategic studies at U.S. Army War College's (USAWC) School of Strategic ...
The development of cyber network operations centers has created new needs to support human sense-making and situation awareness in a cyber network common operating picture (CNCOP). The goal of this ...
Blockchain relies on State Machine Replication (SMR) to enable trustless nodes to uphold a consistent ledger while tolerating Byzantine faults. With the rapid growth of decentralized web3 platforms ...
Research question – Does fingerprint images classified based on the Henry system of fingerprint classification have statistically significant difference in the amount of entropy? This is a follow on ...
Calling contexts are very important for a wide range of applications such as intrusion detection, event logging, profiling, and debugging. Most applications perform expensive stack walking to recover ...
WEST LAFAYETTE, Ind. — Dongyan Xu, the Samuel D. Conte Professor of Computer Science in the College of Science and director of the Center for Education and Research in Information Assurance and ...
Advances in AI and big data analytics rely on data sharing, which can be impeded by privacy concerns. Most challenging in privacy protection is protection of data-in-use, since even encrypted data ...
Insecure aircraft communications pose a significant threat to aviation security, as unauthorized actors can spoof and intercept transmissions between pilots and air traffic controllers (ATC). This ...
The rapid proliferation of online discourse, particularly within social networks, has increased the spread of information at unprecedented rates. Although viral content often captures public attention ...
Unified Extensible Firmware Interface (UEFI) specification describes a platform-independent pre-boot interface for an Operating System (OS). EDK-2 Vulnerabilities in UEFI interface functions have ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results