Zobrazeno 1 - 10
of 156
pro vyhledávání: '"Kevin Kwiat"'
Publikováno v:
EURASIP Journal on Information Security, Vol 2019, Iss 1, Pp 1-13 (2019)
Abstract Network attacks are serious concerns in today’s increasingly interconnected society. Recent studies have applied conventional machine learning to network attack detection by learning the patterns of the network behaviors and training a cla
Externí odkaz:
https://doaj.org/article/3004f631e22e4a34a191a0025fe51284
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 17:1257-1268
Web-based advertising systems have been exploited by cybercriminals to disseminate malware to an enormous number of end-users and their vulnerable machines. To protect their malicious ads and malware from detection by the ad network, malvertisers app
Publikováno v:
Blockchain for Distributed Systems Security
Autor:
Laurent Njilla, Deepak K. Tosh, Xueping Liang, Charles A. Kamhoua, Sachin Shetty, Kevin Kwiat
Publikováno v:
Blockchain for Distributed Systems Security
Autor:
Sachin Shetty, Charles A. Kamhoua, Xueping Liang, Deepak K. Tosh, Laurent Njilla, Kevin Kwiat
Publikováno v:
Blockchain for Distributed Systems Security
Publikováno v:
Blockchain for Distributed Systems Security
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 26:2007-2015
Globalization of microchip fabrication opens the possibility for an attacker to insert hardware Trojans into a chip during the manufacturing process. While most defensive methods focus on detection or prevention, a recent method, called Randomized En
Publikováno v:
IEEE Transactions on Big Data. 4:191-202
The Single Instruction Multiple Data (SIMD) architecture of Graphic Processing Units (GPUs) makes them perfect for parallel processing of big data. In this paper, we present the design, implementation and evaluation of G-Storm , a GPU-enabled paralle
Autor:
Kevin Kwiat, Laurent Njilla, Michael K. McShane, Jay P. Kesan, Charles A. Kamhoua, Linfeng Zhang, Sachin Shetty
Publikováno v:
The Geneva Papers on Risk and Insurance - Issues and Practice. 43:224-238
Effective cyber risk management should include the use of insurance not only to transfer cyber risk but also to provide incentives for insured enterprises to invest in cyber self-protection. Research indicates that asymmetric information, correlated
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 37:123-132
Security is one of the top considerations in hardware designs for Internet-of-Things (IoT), where embedded cryptosystems are extensively used. Traditionally, random dynamic voltage scaling technology has been shown to be very effective in improving t