National Defense University

Displaying 1-6 of 6 results

  • White Papers // Jan 2012

    Acceleration of AES Encryption on CUDA GPU

    The Graphics Processing Unit (GPU) is hardware that is specialized in 3D graphics processing. At the generation of DirectX9, 16 - bit floating point as a surface format was contrived as the dynamic range to record enormous amounts of data, just as in the real world. GPU exhibits the capability...

    Provided By National Defense University

  • White Papers // May 2011

    System Dynamics Based Insider Threats Modeling

    Insider threat has been recognized as one of the most dangerous security threats and become a much more complex issue. Insider threat is resulted from the legitimate users abusing their privileges and cause tremendous damage or losses. Not always being friends, insiders can be main threats to the organization. Currently,...

    Provided By National Defense University

  • White Papers // Mar 2011

    Insider Threat Analysis of Case Based System Dynamics

    One of the most dangerous security threats today is insider threat, and it is such a much more complex issue. But till now, there is no equivalent to a vulnerability scanner for insider threat. The authors survey and discuss the history of research on insider threat analysis to know system...

    Provided By National Defense University

  • White Papers // Jan 2011

    Reversible Data Hiding Based on Two-Level HDWT Coefficient Histograms

    In recent years, reversible data hiding has attracted much more attention than before. Reversibility signifies that the original media can be recovered without any loss from the marked media after extracting the embedded message. This paper presents a new method that adopts two-level wavelet transform and exploits the feature of...

    Provided By National Defense University

  • White Papers // Jul 2009

    Towards an Evolving Theory of Cyberpower

    In the 2006 Quadrennial Defense Review, a request was made to have the Center for Technology and National Security Policy (CTNSP), National Defense University (NDU), develop a theory of cyberpower. It was noted that there was a need to develop a holistic framework that would enable policy makers to address...

    Provided By National Defense University

  • White Papers // Jul 2009

    Performance Improvement of Double-Layer Networks with Holographic Optical Switches

    The Double-Layer Network (DLN) has some advantages, such as being strictly nonblocking and having a simpler routing algorithm, the lowest system insertion loss, a zero differential loss, and the best Signal-to-Noise Ratio (SNR) compared with any nondilated network. However, they require a large number of switches, interconnection lines and crossovers....

    Provided By National Defense University

  • White Papers // Jul 2009

    Towards an Evolving Theory of Cyberpower

    In the 2006 Quadrennial Defense Review, a request was made to have the Center for Technology and National Security Policy (CTNSP), National Defense University (NDU), develop a theory of cyberpower. It was noted that there was a need to develop a holistic framework that would enable policy makers to address...

    Provided By National Defense University

  • White Papers // Jan 2011

    Reversible Data Hiding Based on Two-Level HDWT Coefficient Histograms

    In recent years, reversible data hiding has attracted much more attention than before. Reversibility signifies that the original media can be recovered without any loss from the marked media after extracting the embedded message. This paper presents a new method that adopts two-level wavelet transform and exploits the feature of...

    Provided By National Defense University

  • White Papers // Mar 2011

    Insider Threat Analysis of Case Based System Dynamics

    One of the most dangerous security threats today is insider threat, and it is such a much more complex issue. But till now, there is no equivalent to a vulnerability scanner for insider threat. The authors survey and discuss the history of research on insider threat analysis to know system...

    Provided By National Defense University

  • White Papers // May 2011

    System Dynamics Based Insider Threats Modeling

    Insider threat has been recognized as one of the most dangerous security threats and become a much more complex issue. Insider threat is resulted from the legitimate users abusing their privileges and cause tremendous damage or losses. Not always being friends, insiders can be main threats to the organization. Currently,...

    Provided By National Defense University

  • White Papers // Jul 2009

    Performance Improvement of Double-Layer Networks with Holographic Optical Switches

    The Double-Layer Network (DLN) has some advantages, such as being strictly nonblocking and having a simpler routing algorithm, the lowest system insertion loss, a zero differential loss, and the best Signal-to-Noise Ratio (SNR) compared with any nondilated network. However, they require a large number of switches, interconnection lines and crossovers....

    Provided By National Defense University

  • White Papers // Jan 2012

    Acceleration of AES Encryption on CUDA GPU

    The Graphics Processing Unit (GPU) is hardware that is specialized in 3D graphics processing. At the generation of DirectX9, 16 - bit floating point as a surface format was contrived as the dynamic range to record enormous amounts of data, just as in the real world. GPU exhibits the capability...

    Provided By National Defense University