National Defense University

Displaying 1-4 of 4 results

  • White Papers // Jan 2012

    Acceleration of AES Encryption on CUDA GPU

    The Graphics Processing Unit (GPU) is hardware that is specialized in 3D graphics processing. At the generation of DirectX9, 16 - bit floating point as a surface format was contrived as the dynamic range to record enormous amounts of data, just as in the real world. GPU exhibits the capability...

    Provided By National Defense University

  • White Papers // May 2011

    System Dynamics Based Insider Threats Modeling

    Insider threat has been recognized as one of the most dangerous security threats and become a much more complex issue. Insider threat is resulted from the legitimate users abusing their privileges and cause tremendous damage or losses. Not always being friends, insiders can be main threats to the organization. Currently,...

    Provided By National Defense University

  • White Papers // Mar 2011

    Insider Threat Analysis of Case Based System Dynamics

    One of the most dangerous security threats today is insider threat, and it is such a much more complex issue. But till now, there is no equivalent to a vulnerability scanner for insider threat. The authors survey and discuss the history of research on insider threat analysis to know system...

    Provided By National Defense University

  • White Papers // Jan 2011

    Reversible Data Hiding Based on Two-Level HDWT Coefficient Histograms

    In recent years, reversible data hiding has attracted much more attention than before. Reversibility signifies that the original media can be recovered without any loss from the marked media after extracting the embedded message. This paper presents a new method that adopts two-level wavelet transform and exploits the feature of...

    Provided By National Defense University

  • White Papers // Jan 2011

    Reversible Data Hiding Based on Two-Level HDWT Coefficient Histograms

    In recent years, reversible data hiding has attracted much more attention than before. Reversibility signifies that the original media can be recovered without any loss from the marked media after extracting the embedded message. This paper presents a new method that adopts two-level wavelet transform and exploits the feature of...

    Provided By National Defense University

  • White Papers // Mar 2011

    Insider Threat Analysis of Case Based System Dynamics

    One of the most dangerous security threats today is insider threat, and it is such a much more complex issue. But till now, there is no equivalent to a vulnerability scanner for insider threat. The authors survey and discuss the history of research on insider threat analysis to know system...

    Provided By National Defense University

  • White Papers // May 2011

    System Dynamics Based Insider Threats Modeling

    Insider threat has been recognized as one of the most dangerous security threats and become a much more complex issue. Insider threat is resulted from the legitimate users abusing their privileges and cause tremendous damage or losses. Not always being friends, insiders can be main threats to the organization. Currently,...

    Provided By National Defense University

  • White Papers // Jan 2012

    Acceleration of AES Encryption on CUDA GPU

    The Graphics Processing Unit (GPU) is hardware that is specialized in 3D graphics processing. At the generation of DirectX9, 16 - bit floating point as a surface format was contrived as the dynamic range to record enormous amounts of data, just as in the real world. GPU exhibits the capability...

    Provided By National Defense University