News

The Center for Education and Research in Information Assurance and Security (CERIAS) is currently viewed as one of the world’s leading centers for research and education in areas of information and ...
Marcus Rogers, professor and associate dean for faculty at Purdue Polytechnic, has been elected treasurer of the American Academy of Forensic Sciences (AAFS). This position puts Rogers onto AAFS’ ...
Dr. Richard Love is currently a professor at NDU's College of Information and Cyberspace and recently served as a professor of strategic studies at U.S. Army War College's (USAWC) School of Strategic ...
CERIAS Fellow, Edward Delp, the Charles William Harrison Distinguished Professor of Electrical and Computer Engineering and professor of biomedical engineering was awarded the 2014 Morrill Award. The ...
Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!
*Secure communication in HARMS (Human, Agent, Robot, Machine, and Sensor) for Heterogeneous Robotic Teams *Our aim is to be able to command and control the Robot by natural language *Issues on ...
The development of cyber network operations centers has created new needs to support human sense-making and situation awareness in a cyber network common operating picture (CNCOP). The goal of this ...
As more personal data is collected, analyzed, and published by tech companies, academic researchers, and government agencies, the concern for privacy protection increases. To address these concerns, ...
GEMINA aims to develop digital twin technology for advanced nuclear reactors and transform operations and maintenance (O&M) systems in the next generation of nuclear power plants. There is a need for ...
Blockchain relies on State Machine Replication (SMR) to enable trustless nodes to uphold a consistent ledger while tolerating Byzantine faults. With the rapid growth of decentralized web3 platforms ...
Calling contexts are very important for a wide range of applications such as intrusion detection, event logging, profiling, and debugging. Most applications perform expensive stack walking to recover ...