Showing 1 - 9 results of 9 for search '"National Security Agency"', query time: 0.11s Refine Results
  1. 1

    Cybersecurity Education: The need for a top-driven, multidisciplinary, school-wide approach by Lucy Tsado

    Published 2019-06-01
    “…The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not sufficient to meet the shortfall in the industry. …”
    Get full text
    Article
  2. 2

    Like Treating the Symptom Rather than the Cause - the Omission of Courses over Terrorism in NSA Designated Institutions by Ida L. Oesteraas

    Published 2023-10-01
    “…The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. …”
    Get full text
    Article
  3. 3

    To have or not to have: the true privacy question by Paula Kift

    Published 2013-12-01
    “…In light of the recent US National Security Agency (NSA) surveillance scandals, the article reflects on the continued importance of privacy in the information age. …”
    Get full text
    Article
  4. 4

    Side-Channel Attack on ARADI in Non-Profiling Scenarios by Donggeun Kwon, Seokhie Hong

    Published 2025-01-01
    “…ARADI is a low-latency block cipher introduced by the NSA (National Security Agency), designed with consideration for applications in memory encryption. …”
    Get full text
    Article
  5. 5

    Planning and Implementing a Successful NSA-NSF GenCyber Summer Cyber Academy by Bryson R. Payne, Tamirat Abegaz, Keith Antonia

    Published 2016-12-01
    “…The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. …”
    Get full text
    Article
  6. 6

    On the upper bound of squared correlation of SIMON‐like functions and its applications by Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang

    Published 2022-05-01
    “…Abstract SIMON is one of the lightweight block ciphers designed by the National Security Agency in 2013, and a technical report including security analysis was published by the design team nearly 4 years later. …”
    Get full text
    Article
  7. 7

    Deep learning-based profiling side-channel attacks in SPECK cipher by Faisal Hameed, Hoda Alkhzaimi

    Published 2025-07-01
    “…SPECK, a lightweight cipher developed by the National Security Agency, is designed specifically for resource-constrained devices. …”
    Get full text
    Article
  8. 8

    Personal Doses of Cocaine and Coca Paste are Adulterated in Cartagena de Indias (Colombia) by Jefferson Urzola-Ortega, Luis Mendoza-Goez, Diofanor Acevedo

    Published 2021-01-01
    “…The wide range of cocaine content in samples sold in the illicit market could cause undesirable effects on cocaine users who do not know the exact intended dose for consumption; so, this study intends to make these results available not only to academic, public health, and national security agencies but also to tourists entering Cartagena de Indias, so that they are aware of what they are consuming and the risks to which they are exposed.…”
    Get full text
    Article
  9. 9

    Risk communication to vulnerable populations on crimes in the Economic Community of West Africa: case-study of Ghana by Ishmael D. Norman, Emmanuel D. Kpeglo, Saralees Nadarajah, Blandina Awiah-Norman

    Published 2025-08-01
    “…In addition to field data, a literature review was conducted to examine whether Ghana’s national security agencies apply key risk communication components, such as risk identification, population impact assessment, communication effectiveness, mitigation strategies, and feedback mechanisms. …”
    Get full text
    Article