News

The Center for Education and Research in Information Assurance and Security (CERIAS) is currently viewed as one of the world’s leading centers for research and education in areas of information and ...
As more personal data is collected, analyzed, and published by tech companies, academic researchers, and government agencies, the concern for privacy protection increases. To address these concerns, ...
Calling contexts are very important for a wide range of applications such as intrusion detection, event logging, profiling, and debugging. Most applications perform expensive stack walking to recover ...
Recordings from the past symposium are below. Adobe Flash is required to view. The sound quality is not what we hoped to capture and we are unable to alter it to a better quality.
The debate over how identifying information is used online has a focus in the decisions over identity policies employed in online communities. The now-common decision -- between anonymous, ...
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!
*Secure communication in HARMS (Human, Agent, Robot, Machine, and Sensor) for Heterogeneous Robotic Teams *Our aim is to be able to command and control the Robot by natural language *Issues on ...
Blockchain relies on State Machine Replication (SMR) to enable trustless nodes to uphold a consistent ledger while tolerating Byzantine faults. With the rapid growth of decentralized web3 platforms ...
Dr. Richard Love is currently a professor at NDU's College of Information and Cyberspace and recently served as a professor of strategic studies at U.S. Army War College's (USAWC) School of Strategic ...
The development of cyber network operations centers has created new needs to support human sense-making and situation awareness in a cyber network common operating picture (CNCOP). The goal of this ...
Computer Security Institute, Buyer's Guide 1996, 1998? Computer and Security journal following the references in papers, authors' websites Text books, most importantly: "Information Security Policies ...
To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports. @Proceedings{ rand, title = ...