Cyber Security

page

Visible to the public Remind me Tomorrow: Human Behaviors and Cyber Vulnerabilities

Human Behaviors and Cyber Vulnerabilities


Remind me Tomorrow: Human Behaviors and Cyber Vulnerabilities

Marshini Chetty, Tudor Dumitras, and V.S. Subrahmanian, University of Maryland; Aditya Prakash (Virginia Tech)

This research consisted of four interrelated projects addressing users and software updates. The research questions addressed included:

page

Visible to the public Insights into Composability from Lablet Research

Composability


Insights into Composability from Lablet Research

Jonathan Aldrich, William L. Scherlis, Anupam Datta, David Garlan, Bradley Schmerl, Joshua Sunshine, Christian Kaestner, Andre Platzer , Limin Jia, Robert Harper, Travis Breaux, Witawas Srisa-an, and Arbob Ahman, Carnegie Mellon University.

page

Visible to the public Science of Security Quarterly Lablet Meeting (UMD - Oct 2014)

Quarterly Lablet Meeting


College Park, MD October 30, 2014

Lablet Researchers meet at Maryland, share current research and ideas about Science of Security

page

Visible to the public Science of Security (SoS) Newsletter (2014 - Issue 5)

SoS Newsletter (2014-04)

2014 - Issue #05

page

Visible to the public Locking

Locking


In computer science, a lock is a timing mechanism designed to enforce a control policy. Locks have some advantages and many disadvantages. To be efficient, they typically require hardware support. The articles cited here look at cache locking, injection locking, phase locking, and a lock-free approach to addressing multicore computing. These articles appeared in the first half of 2014.

page

Visible to the public Machine Learning

Machine Learning


Machine learning offers potential efficiencies and is an important tool in data mining. However, the "learned" or derived data must maintain integrity. Machine learning can also be used to identify threats and attacks. Research in this field is of particular interest in sensitive industries, including healthcare. The works cited here appeared in the first half of 2014.

page

Visible to the public Multidimensional Signal Processing

Multidimensional Signal Processing

page

Visible to the public Network Accountability

Network Accountability

page

Visible to the public Network Coding

Network Coding


Network coding methods are used to improve a network's throughput, efficiency and scalability. It can also be a method for dealing with attacks and eavesdropping. Research into network coding deals with finding optimal solutions to the general network problems that remain open. The articles cited here were presented or published between January and September 2014.

page

Visible to the public Network Intrusion Detection

Network Intrusion Detection


Network intrusion detection is one of the chronic problems in cybersecurity. The growth of cellular and ad hoc networks has increased the threat and risks. Research into this area of concern reflects its importance. The articles cited here were presented or published between January and August of 2014.