Search For:

Displaying 1-6 out of 6 total
Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice
Found in: IEEE Security & Privacy
By Douglas Maughan,David Balenson,Ulf Lindqvist,Zachary Tudor
Issue Date:March 2013
pp. 14-23
New and innovative technologies will only make a difference if they're deployed and used. It doesn't matter how visionary a technology is unless it meets user needs and requirements and is available as a product via user-acceptable channels. One of the cyb...
Crossing the
Found in: Security and Privacy, IEEE Symposium on
By W. Douglas Maughan
Issue Date:May 2010
pp. 21-26
Many researchers with innovative ideas just never seem to be able to bring those ideas to market. One of the biggest problems with the cyber security research community is transitioning technology into commercial product. This paper discusses these technol...
PREDICT: a trusted framework for sharing data for cyber security research
Found in: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS '11)
By Charlotte Scheper, Douglas Maughan, Susanna Cantor
Issue Date:April 2011
pp. 105-106
In this paper, we describe the formatting guidelines for ACM SIG The Protected Repository for Defense of Infrastructure against Cyber Threats (PREDICT) has established a trusted framework for sharing real-world security-related datasets for cyber security ...
The need for a national cybersecurity research and development agenda
Found in: Communications of the ACM
By Douglas Maughan
Issue Date:February 2010
pp. 29-31
Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.
Securing network access in wireless sensor networks
Found in: Proceedings of the second ACM conference on Wireless network security (WiSec '09)
By An Liu, Douglas Maughan, Kun Sun, Peng Ning, Roger Xu
Issue Date:March 2009
pp. 1-24
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In this paper, we present the design, implementation, and evaluation of a secure ...
Homeland security: cyber security R&D initiatives
Found in: Proceedings of the 12th ACM conference on Computer and communications security (CCS '05)
By Douglas Maughan
Issue Date:November 2005
pp. 1-1
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insecure operations in machine instructions at microinstruction level. Microinstru...