page
Submitted by Daniel Wolf on Tue, 11/11/2014 - 3:03pm
Immersion systems, commonly known as "virtual reality", are used for a variety of functions such as gaming, rehabilitation, and training. These systems mix the virtual with the actual, and have implications for cybersecurity because they may make the jump from virtual to actual systems. The research cited here was presented between January and August of 2014.
page
Submitted by Daniel Wolf on Tue, 11/11/2014 - 3:00pm
Intellectual Property protection continues to be a matter of major research interest. The articles cited here look at hardware security and provenance and piracy prevention. They were published between May and August of 2014.
page
Submitted by Daniel Wolf on Tue, 11/11/2014 - 2:56pm
Application-level security is a key to defending against application-level attacks. Because these applications are typically specified and implemented in programming languages, this area is generally known as "language-based security". Research into language -based security focuses on a range of languages and approaches. The works cited here were presented between January and August of 2014.
page
Submitted by Daniel Wolf on Tue, 11/11/2014 - 2:53pm
Microelectronics are at the center of the IT world. Their security--provenance, integrity of their manufacture, and capacity for providing embedded security--is both an opportunity and a problem for cybersecurity research. The works cited here were presented between January and August of 2014 and cover a wide range of microelectronics security issues.
page
Submitted by Daniel Wolf on Tue, 11/11/2014 - 2:49pm
Network security is one of the main areas for cybersecurity research. The works cited here cover a range of transmission media, architectures, and data in transit. These works were presented or published in the first half of 2014.
page
Submitted by Daniel Wolf on Tue, 11/11/2014 - 2:45pm
Policy-based access controls and security policies are intertwined in most commercial systems. Analytics use abstraction and reduction to improve policy-based security. The work cited here was presented in the first half of 2014.
page
Submitted by Daniel Wolf on Tue, 11/11/2014 - 2:40pm
page
Submitted by Daniel Wolf on Tue, 11/11/2014 - 2:37pm
Provenance refers to information about the origin and activities of system data and processes. With the growth of shared services and systems, including social media, cloud computing, and service-oriented architectures, finding tamperproof methods for tracking files is a major challenge. Research into the security of software of unknown provenance (SOUP) is also included. The works cited here were presented between January and August 2014.
page
Submitted by Daniel Wolf on Tue, 11/11/2014 - 2:31pm
Web browsers are vulnerable to a range of threats. The challenge of securing browsers against them is the subject of these research efforts. The works cited here were presented between January and August of 2014.
page
Submitted by Daniel Wolf on Fri, 11/07/2014 - 10:17am
Keystrokes are the basis for behavioral biometrics. The rhythms and patterns of the individual user can become the basis for a unique biological identification. Research into this area of computer security is growing. The work cited here appeared between January and August of 2014.