News
The Center for Education and Research in Information Assurance and Security (CERIAS) is currently viewed as one of the world’s leading centers for research and education in areas of information and ...
GEMINA aims to develop digital twin technology for advanced nuclear reactors and transform operations and maintenance (O&M) systems in the next generation of nuclear power plants. There is a need for ...
As more personal data is collected, analyzed, and published by tech companies, academic researchers, and government agencies, the concern for privacy protection increases. To address these concerns, ...
CERIAS Fellow, Edward Delp, the Charles William Harrison Distinguished Professor of Electrical and Computer Engineering and professor of biomedical engineering was awarded the 2014 Morrill Award. The ...
Recordings from the past symposium are below. Adobe Flash is required to view. The sound quality is not what we hoped to capture and we are unable to alter it to a better quality.
The debate over how identifying information is used online has a focus in the decisions over identity policies employed in online communities. The now-common decision -- between anonymous, ...
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!
*Secure communication in HARMS (Human, Agent, Robot, Machine, and Sensor) for Heterogeneous Robotic Teams *Our aim is to be able to command and control the Robot by natural language *Issues on ...
Dr. Richard Love is currently a professor at NDU's College of Information and Cyberspace and recently served as a professor of strategic studies at U.S. Army War College's (USAWC) School of Strategic ...
The development of cyber network operations centers has created new needs to support human sense-making and situation awareness in a cyber network common operating picture (CNCOP). The goal of this ...
Computer Security Institute, Buyer's Guide 1996, 1998? Computer and Security journal following the references in papers, authors' websites Text books, most importantly: "Information Security Policies ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results