News
The Center for Education and Research in Information Assurance and Security (CERIAS) is currently viewed as one of the world’s leading centers for research and education in areas of information and ...
GEMINA aims to develop digital twin technology for advanced nuclear reactors and transform operations and maintenance (O&M) systems in the next generation of nuclear power plants. There is a need for ...
As more personal data is collected, analyzed, and published by tech companies, academic researchers, and government agencies, the concern for privacy protection increases. To address these concerns, ...
Recordings from the past symposium are below. Adobe Flash is required to view. The sound quality is not what we hoped to capture and we are unable to alter it to a better quality.
The debate over how identifying information is used online has a focus in the decisions over identity policies employed in online communities. The now-common decision -- between anonymous, ...
Calling contexts are very important for a wide range of applications such as intrusion detection, event logging, profiling, and debugging. Most applications perform expensive stack walking to recover ...
Software signing is a critical mechanism for ensuring the integrity and authenticity of software components in the supply chain. Despite its importance and regulatory recommendations, adoption remains ...
Insecure aircraft communications pose a significant threat to aviation security, as unauthorized actors can spoof and intercept transmissions between pilots and air traffic controllers (ATC). This ...
The rapid increase in digital devices has generated an enormous amount of forensic data that challenges traditional analysis methods. In response, this study introduces FOREST (Forensic Search Tool), ...
The Cyber Adversary Likelihood project has the goal of identifying methods for modeling adversaries in attacks on critical infrastructure, using those models to help determine the likelihood of ...
We study the problem of sensor scheduling for an intrusion detection task. We model this as a 2-player zero-sum game over a graph, where the defender (Player 1) seeks to identify the optimal strategy ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results