Zobrazeno 1 - 10
of 65
pro vyhledávání: '"Edward Colbert"'
Autor:
Susan E. Duncan, Robert Reinhard, Robert C. Williams, Ford Ramsey, Wade Thomason, Kiho Lee, Nancy Dudek, Saied Mostaghimi, Edward Colbert, Randall Murch
Publikováno v:
Frontiers in Bioengineering and Biotechnology, Vol 7 (2019)
Our national data and infrastructure security issues affecting the “bioeconomy” are evolving rapidly. Simultaneously, the conversation about cyber security of the U.S. food and agricultural system (cyber biosecurity) is incomplete and disjointed.
Externí odkaz:
https://doaj.org/article/360d42d94b1f495099c26e4095fd219b
Publikováno v:
Proceedings of the International Astronomical Union. 15:247-251
The role of starburst winds versus active galactic nuclei (AGN) jets/winds in the formation of the kiloparsec scale radio emission seen in Seyferts is not yet well understood. In order to be able to disentangle the role of various components, we have
Publikováno v:
2020 IEEE Cloud Summit.
Edge computing provides a new platform to support real-time connected vehicle applications. One of the challenges is to ensure communication security among vehicles, roadside devices, and edge servers, while addressing group communication nature and
Publikováno v:
Small Satellite Conference
AIAA/USU Conference on Small Satellites
AIAA/USU Conference on Small Satellites
Long-Wave Infrared (LWIR, wavelength > 8 um) polarimetric measurements can be used to characterize space objects under certain conditions. Both visible and LWIR polarimetry have been demonstrated extensively in terrestrial applications for characteri
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::70c0515991e3addd898768b440d527cb
https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=4651&context=smallsat
https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=4651&context=smallsat
Publikováno v:
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology. 17:21-38
We demonstrate that game-theoretic calculations serve as a useful tool for assisting cyber wargaming teams in identifying effective strategies. We note a significant similarity between formulating cyber wargaming strategies and the methodology known
Publikováno v:
2019 IEEE Cloud Summit.
Man-in-the-Middle (MITM) attacks can significantly compromise the security of the Internet and cloud computing applications, where an attacker intercepts the packets transmitted between the clients and servers over the network to steal confidential i
Publikováno v:
VTC Spring
Spectrum regulators and stakeholders from the wireless industry and Intelligent Transportation System (ITS) communities are exploring the use of the 5.9 GHz band for the dissemination of basic safety messages. Dedicated Short Range Communications (DS
Autor:
Zhiyun Qian, Patrick McDaniel, Edward Colbert, Srikanth V. Krishnamurthy, Chengyu Song, Dang Tu Nguyen
Publikováno v:
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies.
Today's IoT systems include event-driven smart applications (apps) that interact with sensors and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app interactions, or device/communication failures, can cause unsafe and
Publikováno v:
2018 Resilience Week (RWS).
Cyber-physical systems are an integral component of weapons, sensors, and autonomous vehicles, as well as cyber assets directly supporting tactical forces. Mission resilience of tactical networks affects command and control, which is important for su