- Full text PDF available (4)
- This year (0)
- Last 5 years (3)
- Last 10 years (10)
—New and innovative technologies will only make a difference if they are deployed and used. It does not matter how visionary a technology is unless it meets the needs and requirements of customers/users and it is available as a product via channels that are acceptable to the customers/users. One of the biggest ongoing challenges within the cybersecurity… (More)
Current information and communications technology poses a variety of ethical challenges for researchers. In this paper, we present an intellectual framework for understanding and applying ethical principles in networking and security research rooted in the guidance suggested by an ongoing Department of Homeland Security working group on ethics. By providing… (More)
DNSSEC is properly understood as a component in an ecology of security protocols and measures.
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In this paper, we present the design, implementation, and evaluation of a secure network access system for wireless sensor networks. This paper makes three contributions: First, it… (More)
Government-funded initiatives, in cooperation with private-sector partners in key technology areas, are fundamental to cybersecurity technical transformation.
On 28 December 2011, the US Department of Homeland Security, Science and Technology, Cyber Security Division released "The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research" to the Federal Register to elicit the public's feedback. In this article, the authors briefly describe the road to this milestone, summarize the… (More)
Many researchers with innovative ideas just never seem to be able to bring those ideas to market. One of the biggest problems with the cyber security research community is transitioning technology into commercial product. This paper discusses these technology transition activities from the view of a program manager and offers several examples of successful… (More)