page
Submitted by Daniel Wolf on Mon, 11/03/2014 - 11:48pm
Remind me Tomorrow: Human Behaviors and Cyber Vulnerabilities
Marshini Chetty, Tudor Dumitras, and V.S. Subrahmanian, University of Maryland; Aditya Prakash (Virginia Tech)
This research consisted of four interrelated projects addressing users and software updates. The research questions addressed included:
page
Submitted by Daniel Wolf on Mon, 11/03/2014 - 11:44pm
Insights into Composability from Lablet Research
Jonathan Aldrich, William L. Scherlis, Anupam Datta, David Garlan, Bradley Schmerl, Joshua Sunshine, Christian Kaestner, Andre Platzer , Limin Jia, Robert Harper, Travis Breaux, Witawas Srisa-an, and Arbob Ahman, Carnegie Mellon University.
page
Submitted by Daniel Wolf on Mon, 11/03/2014 - 4:20pm
College Park, MD October 30, 2014
Lablet Researchers meet at Maryland, share current research and ideas about Science of Security
page
Submitted by Daniel Wolf on Mon, 11/03/2014 - 3:42pm
2014 - Issue #05
page
Submitted by Daniel Wolf on Sun, 10/12/2014 - 4:44pm
In computer science, a lock is a timing mechanism designed to enforce a control policy. Locks have some advantages and many disadvantages. To be efficient, they typically require hardware support. The articles cited here look at cache locking, injection locking, phase locking, and a lock-free approach to addressing multicore computing. These articles appeared in the first half of 2014.
page
Submitted by Daniel Wolf on Sun, 10/12/2014 - 4:42pm
Machine learning offers potential efficiencies and is an important tool in data mining. However, the "learned" or derived data must maintain integrity. Machine learning can also be used to identify threats and attacks. Research in this field is of particular interest in sensitive industries, including healthcare. The works cited here appeared in the first half of 2014.
page
Submitted by Daniel Wolf on Sun, 10/12/2014 - 4:40pm
page
Submitted by Daniel Wolf on Sun, 10/12/2014 - 4:37pm
page
Submitted by Daniel Wolf on Sun, 10/12/2014 - 4:34pm
Network coding methods are used to improve a network's throughput, efficiency and scalability. It can also be a method for dealing with attacks and eavesdropping. Research into network coding deals with finding optimal solutions to the general network problems that remain open. The articles cited here were presented or published between January and September 2014.
page
Submitted by Daniel Wolf on Sun, 10/12/2014 - 4:32pm
Network intrusion detection is one of the chronic problems in cybersecurity. The growth of cellular and ad hoc networks has increased the threat and risks. Research into this area of concern reflects its importance. The articles cited here were presented or published between January and August of 2014.