An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Jian Wang, Neeraj Varshney, Camillo Gentile, Steve Blandino, Jack Chuang, Nada T. Golmie
The design of integrated sensing and communication (ISAC) systems has drawn recent attention for its capacity to solve a number of challenges. Indeed, ISAC can enable numerous benefits, such as the sharing of spectrum resources, hardware, and software, and
Kunlun Wang, Jiong Jin, Yang Yang, Arumugam Nallanathan, Chintha Tellambura, Bijan Jabbari, Tao Zhang
With the development of next-generation wireless networks, the Internet of Things (IoT) is evolving towards the intelligent IoT (iIoT), where intelligent applications usually have stringent delay and jitter requirements. In order to provide lowlatency
The COrona VIrus Disease – 2019 (COVID-19) pandemic has had a profound effect on the entire world. With the onset of the pandemic in 2020, also started various efforts around the world to automate the contact tracing process to increase its efficacy. Most
The Nationwide Public Safety Broadband Network (NPSBN) is being developed to provide a dedicated network for the use of first responders during incident response. A wave of new communication technologies compatible with the NPSBN is on the horizon, as
Irena Bojanova, Carlos Eduardo Cardoso Galhardo, Sara Moshtari
In this work, we present an orthogonal classification of data type bugs, allowing precise structured descriptions of related software vulnerabilities. We utilize the Bugs Framework (BF) approach to define four language-independent classes that cover all
Simulation is a useful and effective way to analyze and study complex, real-world systems. It allows researchers, practitioners, and decision makers to make sense of the inner working of a system that involves many factors often resulting in some sort of
While the existence of many security elements can be measured (e.g., vulnerabilities, security controls, or privacy controls), it is challenging to measure their relative security impact. In the physical world we can often measure the impact of individual
Access to multiple cloud services, the geographic spread of enterprise Information Technology (IT) resources (including multiple data centers), and the emergence of microservices-based applications (as opposed to monolithic ones) have significantly altered
Stephen Quinn, Nahla Ivy, Julie Chua, Matthew Barrett, Greg Witte, Larry Feldman, Daniel Topper, Robert Gardner
While business impact analysis (BIA) has historically been used to determine availability requirements for business continuity, the process can be extended to provide a broad understanding of the potential impacts of any type of loss on the enterprise
This publication describes a basis for establishing principles, concepts, activities, and tasks for engineering trustworthy secure systems. Such principles, concepts, activities, and tasks can be effectively applied within systems engineering efforts to
Khandakar Ashrafi Akbar, Yigong Wang, Gbadebo Ayoade, Yang Gao, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham, kangkook Jee
Advanced persistent threats (APT) have increased in recent times as a result of the rise in interest by nation states and sophisticated corporations to obtain high-profile information. Typically, APT attacks are more challenging to detect since they
Min Chen, Jia Liu, Pan Li, Hamid Gharavi, Yixue Hao, Jingyu Ouyang, Long Hu, Chong Hou, Iztok Humar, Lei Wei, Guang-Zhong Yang, Guangming Tao
With the advent of the Internet of Everything, people can easily interact with their environments immersively. The idea of pervasive computing is becoming a reality, but due to the inconvenience of carrying silicon-based entities and a lack of fine-grained
Kids are engaged in technology and online activities at younger ages than ever before. They are the "digital natives" – an always online and connected generation. Much cyber security research has focused on adults' perceptions and practices. But, what