News

The debate over how identifying information is used online has a focus in the decisions over identity policies employed in online communities. The now-common decision -- between anonymous, ...
Insecure aircraft communications pose a significant threat to aviation security, as unauthorized actors can spoof and intercept transmissions between pilots and air traffic controllers (ATC). This ...
Dr. Richard Love is currently a professor at NDU's College of Information and Cyberspace and recently served as a professor of strategic studies at U.S. Army War College's (USAWC) School of Strategic ...
*Secure communication in HARMS (Human, Agent, Robot, Machine, and Sensor) for Heterogeneous Robotic Teams *Our aim is to be able to command and control the Robot by natural language *Issues on ...
The rapid proliferation of online discourse, particularly within social networks, has increased the spread of information at unprecedented rates. Although viral content often captures public attention ...
Unified Extensible Firmware Interface (UEFI) specification describes a platform-independent pre-boot interface for an Operating System (OS). EDK-2 Vulnerabilities in UEFI interface functions have ...
Phishing remains a critical cyber threat, with traditional ML-based detection models relying on grammatical errors and word anomalies as key indicators. However, LLM-generated phishing emails are well ...
Blockchain relies on State Machine Replication (SMR) to enable trustless nodes to uphold a consistent ledger while tolerating Byzantine faults. With the rapid growth of decentralized web3 platforms ...
The rapid growth of mobile devices has changed the field of digital forensics and calls for new methods to analyze evidence comprehensively. Traditional forensic tools treat data sources separately, ...
A Memory-Hard Proof of Work (MHPoW) allows a prover to convince an efficient verifier that the prover invested substantial time and memory on a particular computation. Proofs of Work (PoW) in general ...
Intent based networking (IBN) is a high-level network configuration concept that allows network operators to use high-level intents instead of complex low-level details. We found there are ...
The development of cyber network operations centers has created new needs to support human sense-making and situation awareness in a cyber network common operating picture (CNCOP). The goal of this ...