Dean's Directorates & Divisions
Permanent URI for this community
Browse
Browsing Dean's Directorates & Divisions by Title
Now showing 1 - 20 of 129
Results Per Page
Sort Options
- Item1000 Cuts(Army Cyber Institute, 2018) Johnson, Brian DavidScience Fiction Prototypes are science fiction stories based on future trends, technologies, economics, and cultural change. The story you are about to read is based on threatcasting research from the Army Cyber Institute at West Point and Arizona State University’s Threatcasting Lab. Our story does not shy away from a dystopian vision of tomorrow. Exploring these dark regions inspires us to build a better, stronger, and more secure future for our Armed Forces.
- Item11-25-2027(Army Cyber Institute, 2018) Johnson, Brian DavidScience Fiction Prototypes are science fiction stories based on future trends, technologies, economics, and cultural change. The story you are about to read is based on threatcasting research from the Army Cyber Institute at West Point and Arizona State University’s Threatcasting Lab. Our story does not shy away from a dystopian vision of tomorrow. Exploring these dark regions inspires us to build a better, stronger, and more secure future for our Armed Forces. Once a year, Americans sit down to a Thanksgiving meal that unites us in gratitude for our safety and security. As many follow the celebration with a football game or an after-dinner nap, our defense automated supply chain never sleeps. Our economy is becoming more and more automated. Between global supply chains and high frequency trading, our national and economic security is increasingly dependent on automation and AI. But what safeguards monitor the machines that we depend upon? On Thanksgiving Day 2027, robots and algorithms will hyper-efficiently run our supply chains, but are these systems themselves secure?
- Item6G Systems and the Future of Multidimensional Attack Planes(Army Cyber Institute, 2023) Palochak, Joshua; Brown, Jason C.; Johnson, Brian David; Marx, John; Aranda, AnnetteIn the coming decade, future threats from attacks on 6G communications systems appear in four categories or groups. The threats are specific to government, military, and critical infrastructure. In many ways, 6G promises to serve as the catalyst to the utopian world that science fiction has conditioned western society to envision and pursue. As such, we describe futures in 2030 where 6G has fully permeated human lives. However, a paradox emerges where the journey to achieve this connected state further isolated humans, and comes at a cost of privacy and increased vulnerabilities. More astoundingly is society’s apparent ignorance of these risks. In short, while 6G may not generate unimaginable technologies, there is a toxic side of humanity that is not being recognized, while it is simultaneously surrendering its power.
- ItemA Case of Collaboration: USMA Library's Tiny Art Show “Magnificent Miniatures”(N/A, 2023-04-23) Chess, Jennifer; Gomez, Lisa; Mullooly, LoriIn academic libraries, departments can be siloed and unaware of each other's activities. However, when colleagues stretch beyond these "walled gardens" the results can yield creative projects and a rewarding experience for students, faculty, and staff. This case study will present a successful initiative at the USMA Library: The Tiny Art Show “Magnificent Miniatures.” Several librarians with different and discrete roles worked together to create a passive library program, market that program across campus and then produce a major art exhibit. This collaboration allowed cadets to create original artwork and engage with one another, the exhibit, and the library collection in a unique and scholarly way. Ultimately, this art exhibit was digitized, which provided further engagement outside of the library and across the wider campus community. Participants will learn ways to adapt this program to their library, including scaling this program up or down.
- ItemA Case of Collaboration: USMA Library's Tiny Art Show “Magnificent Miniatures”(N/A, 2023-04-23) Chess, Jennifer; Gomez, Lisa; Mullooly, LoriIn academic libraries, departments can be siloed and unaware of each other's activities. However, when colleagues stretch beyond these "walled gardens" the results can yield creative projects and a rewarding experience for students, faculty, and staff. This case study will present a successful initiative at the USMA Library: The Tiny Art Show “Magnificent Miniatures.” Several librarians with different and discrete roles worked together to create a passive library program, market that program across campus and then produce a major art exhibit. This collaboration allowed cadets to create original artwork and engage with one another, the exhibit, and the library collection in a unique and scholarly way. Ultimately, this art exhibit was digitized, which provided further engagement outside of the library and across the wider campus community. Participants will learn ways to adapt this program to their library, including scaling this program up or down.
- ItemA Celebration of West Point Authors: January- June 2018(USMA Library, 2018) Seminelli, HeatherToday we celebrate the more than 250 works of scholarship produced by the Academy between January and June 2018. The theme of this event is Academy research into health.
- ItemA Celebration of West Point Authors: January-June 2017(USMA Library, 2017) Seminelli, HeatherToday we celebrate the more than 200 works of scholarship produced at the Academy between January and June 2017. Our featured work is “Intolerance: Political Animals and Their Prey,” a book which grew from a year-long multidisciplinary collaboration between faculty members of Bard College and West Point.
- ItemA Celebration of West Point Authors: January-June 2019(United States Military Academy Library, 2019) Seminelli, HeatherToday we celebrate the more than 300 works of scholarship produced at the Academy between January and June 2019. This event highlights published and ongoing research into character and character development.
- ItemA Celebration of West Point Authors: January-June 2020(USMA Library, 2020) Seminelli, HeatherToday we celebrate the more than 200 works of scholarship produced at the Academy between January and June 2020. Of note, this time period also encompasses the start of the COVID-19 pandemic whish which resulted in the cancelation or postponement of many conferences and the move to remote learning after Spring Break 2020. The virtual program features speakers whose work centered around assessing and shaping public opinion.
- ItemA Celebration of West Point Authors: January-June 2022(USMA Library, 2022) Mullooly, LoriToday we celebrate the 480 works of scholarship produced at the Academy between January and June 2022. The program features speakers whose work centered around civil-military relations.
- ItemA Celebration of West Point Authors: July- December 2016(USMA Library, 2016) Seminelli, HeatherToday, we celebrate the more than 100 works of scholarship produced at the Academy between July and December 2016. In addition, we will hear four short excerpts of publications or presentations around the topic of security.
- ItemA Celebration of West Point Authors: July- December 2017(USMA Library, 2018) Seminelli, HeatherToday we celebrate the more than 200 works of scholarship produced at the Academy between July and December 2017. The theme of this event is the intersection of civilian and military technology, policy, and innovation.
- ItemA Celebration of West Point Authors: July- December 2018(USMA Library, 2019) Seminelli, HeatherToday we celebrate the more than 300 works of scholarship produced at the Academy between July and December 2018. This event is celebrating the "Semester of Grant" with Dr. Elizabeth Samet, Department of English and Philosophy, The Annotated Memoirs of Ulysses S. Grant & USMA Special Collections and Archives presenting unique items from and relating to Ulysses S. Grant.
- ItemA Celebration of West Point Authors: July- December 2020(USMA Library, 2020) Seminelli, HeatherToday we celebrate the more than 300 works of scholarship produced at the Academy between July and December 2020. The program features speakers whose work centered around developing leaders.
- ItemA Celebration of West Point Authors: July- December 2021(USMA Library, 2021) Chess, JenniferHighlighting the 328 collected works of scholarship published and presented between July - December 2021.
- ItemA Celebration of West Point Authors: July-December 2019(USMA Library, 2019) Seminelli, HeatherHighlighting the 456 collected works of scholarship published and presented between July - December 2019.
- ItemA Modeling Framework for Studying Quantum Key Distribution System Implementation Nonidealities(IEEE Access, 2015) Mailloux, Logan O.; Morris, Jeffrey D.; Grimaila, Michael R.; Hodson, Douglas D.; Jacques, David R.; Colombi, John M.; Mclaughlin, Colin V.; Holes, Jennifer A.Quantum key distribution (QKD) is an innovative technology that exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared key for use in cryptographic applications. However, QKD is a relatively nascent technology where real-world system implementations differ significantly from their ideal theoretical representations. In this paper, we introduce a modeling framework built upon the OMNeT++ discrete event simulation framework to study the impact of implementation nonidealities on QKD system performance and security. Specifically, we demonstrate the capability to study the device imperfections and practical engineering limitations through the modeling and simulation of a polarization-based, prepare and measure BB84 QKD reference architecture. The reference architecture allows users to model and study complex interactions between physical phenomenon and system-level behaviors representative of real-world design and implementation tradeoffs. Our results demonstrate the flexibility of the framework to simulate and evaluate current, future, and notional QKD protocols and components.
- ItemA ranked solution for social media fact checking using epidemic spread modeling(2022-01) Smith, John H. ; Bastian, Nathaniel D.Within the past decade, social media has become a primary platform for consumption of information and current events. Unlike with traditional news sources, however, social media posts do not have to go through a rigorous validation process prior to publication. The 2019 Mueller Report illustrates how malicious actors have taken advantage of these lax requirements to sway public opinion on topics from the #blacklivesmatter movement to the 2016 U.S. Presidential election. Currently, social media companies rely primarily on communal-policing of misinformation; it is unlikely that this will happen with regularity. To counteract this, other literature on the topic is focused on using deep learning models to separate accurate from misleading content; however, the rapidly evolving nature of misinformation means that they will have to be retrained and redeployed on an iterative and time-consuming basis. This work, therefore, proposes a novel approach to the problem: treating misinformation as a virus. Specifically, we propose a ranking system that third-party fact checkers can utilize to prioritize posts for checking. This algorithm is then tested against multiple data sets with strong positive results, decreasing viral spread in a matter of minutes.
- ItemA Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models(2021-12-30) Talty, Kevin ; Stockdale, John ; Bastian, Nathaniel D.As the demand for data has increased, we have witnessed a surge in the use of machine learning to help aid industry and government in making sense of massive amounts of data and, subsequently, making predictions and decisions. For the military, this surge has manifested itself in the Internet of Battlefield Things. The pervasive nature of data on today's battlefield will allow machine learning models to increase soldier lethality and survivability. However, machine learning models are predicated upon the assumptions that the data upon which these machine learning models are being trained is truthful and the machine learning models are not compromised. These assumptions surrounding the quality of data and models cannot be the status-quo going forward as attackers establish novel methods to exploit machine learning models for their benefit. These novel attack methods can be described as adversarial machine learning (AML). These attacks allow an attacker to unsuspectingly alter a machine learning model before and after model training in order to degrade a model's ability to detect malicious activity. In this paper, we show how AML, by poisoning data sets and evading well trained models, affect machine learning models' ability to function as Network Intrusion Detection Systems (NIDS). Finally, we highlight why evasion attacks are especially effective in this setting and discuss some of the causes for this degradation of model effectiveness.
- ItemA Widening Attack Plain(Army Cyber Institute, 2016) Johnson, Brian DavidThe Army Cyber Institute at West Point is the Army’s and the nation’s think tank for cyber warfare and the cyber domain. The ACI creates knowledge, builds public and private sector partnerships, and creates an entrepreneurial and innovation laboratory to focus investments. Positioned to establish and maintain relationships with the nation’s economic center of gravity in New York City, the ACI directs and synchronizes efforts across the U.S. Military Academy in the cyber domain. The ACI collaborates with the U.S. Army Cyber Command and U.S. Army Cyber Center of Excellence to prevent strategic surprise and ensure the Army’s dominance of the cyber domain.