Learn More
Through adulthood, the rodent subventricular zone (SVZ) stem cell niche generates new olfactory bulb interneurons. We had previously reported that the number of new neurons produced in the SVZ declines through aging; however, age-related changes attributable specifically to the SVZ neural stem cell (NSC) population have not been fully characterized. Here,(More)
This paper describes the rationale, design and implementation of a Reconfigurable Attack-Defend Instructional Computing Laboratory (RADICL). Topics covered include the ethical and pedagogical considerations for creating and using a lab that instructs and develops not only student's abilities to secure a system, but also their ability to attack a system. An(More)
The management of secure communication among groups of participants requires a set of secure and efficient operations. In this paper we extend existing work to present a Communication–Computation Efficient Group Key Algorithm (CCEGK) designed to provide both efficient communication and computation, addressing performance, security and authentication issues(More)
To preserve critical energy control functions while under attack, it is necessary to perform comprehensive analysis on the root cause and impact of an ongoing cyber intrusion without sacrificing the availability of energy delivery. In this position paper, we present a proof of concept of an intrinsically resilient energy control system, with the ultimate(More)
NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information,(More)
In order to provide a safe and separate system on which to train, test, and teach computer and network security, The reconfigurable network system is relatively inexpensive to build even through it supports several operating systems in a myriad of network topographies. University faculty and students can use the laboratory to understand attack scripts and(More)
Problem statement: As group key management extended into the area of large dynamic networks, complex issues emerged involving the many operations that run over several network topologies. The issues that occurred due to multiple topologies were also compounded by differing views of the network, taken at different time slices or positions within the network.(More)
  • 1