Cyber Security

page

Visible to the public Cooperative SoS Activities

Cooperative SoS Activities


page

Visible to the public Cyber-Physical Systems

Cyber-Physical Systems


page

Visible to the public In the News

In the News


page

Visible to the public Signals Processing

Signals Processing


Broadly speaking, signal processing covers signal acquisition and reconstruction, quality improvement, signal compression and feature extraction. Each of these processes introduces vulnerabilities into communications and other systems. The research articles cited here explore trust between networks, steganalysis, tracing passwords across networks, and certificates.

page

Visible to the public Software Assurance

Software Assurance


page

Visible to the public IPv6 and Other Protocols

IPv6 and Other Protocols


page

Visible to the public Authentication and Authorization

Authentication and Authorization


Authorization and authentication are cornerstones of computer security. As systems become larger, faster and more complex, authorization and authentication methods and protocols are proving to have limits and challenges. The research cited here explores new methods and techniques for improving security in cloud environments, efficient cryptographic computations, and exascale storage systems.

page

Visible to the public Interdisciplinary SoS Activities

page

Visible to the public Spotlight on Research Activities Outside of the US


SoS Research Outside of the US

page

Visible to the public Operating Systems

The Operating Systems citations cover publications and presentations since fall of 2013. Specific works include studies on such as an empirical study showing that the performance difference between double hashing and fully random hashing appears negligible, how to structure parallel peeling algorithms, and about uniform quantization, Software-as-a-Service (SaaS)