CS Store Search
Displaying 1-6 out of 6 total
Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice
IEEE Security & Privacy
By Douglas Maughan,David Balenson,Ulf Lindqvist,Zachary Tudor
Issue Date:March 2013
New and innovative technologies will only make a difference if they're deployed and used. It doesn't matter how visionary a technology is unless it meets user needs and requirements and is available as a product via user-acceptable channels. One of the cyb...
Security and Privacy, IEEE Symposium on
By W. Douglas Maughan
Issue Date:May 2010
Many researchers with innovative ideas just never seem to be able to bring those ideas to market. One of the biggest problems with the cyber security research community is transitioning technology into commercial product. This paper discusses these technol...
PREDICT: a trusted framework for sharing data for cyber security research
Found in: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS '11)
By Charlotte Scheper, Douglas Maughan, Susanna Cantor
Issue Date:April 2011
In this paper, we describe the formatting guidelines for ACM SIG The Protected Repository for Defense of Infrastructure against Cyber Threats (PREDICT) has established a trusted framework for sharing real-world security-related datasets for cyber security ...
The need for a national cybersecurity research and development agenda
Found in: Communications of the ACM
By Douglas Maughan
Issue Date:February 2010
Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.
Securing network access in wireless sensor networks
Found in: Proceedings of the second ACM conference on Wireless network security (WiSec '09)
By An Liu, Douglas Maughan, Kun Sun, Peng Ning, Roger Xu
Issue Date:March 2009
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In this paper, we present the design, implementation, and evaluation of a secure ...
Homeland security: cyber security R&D initiatives
Found in: Proceedings of the 12th ACM conference on Computer and communications security (CCS '05)
By Douglas Maughan
Issue Date:November 2005
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insecure operations in machine instructions at microinstruction level. Microinstru...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.