Advanced search Help
Searching for terms: EXACT: "The Next Wave" in: series
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Next Wave: Machine Learning (Vol. 22 No. 2, 2019)
This 2019 issue of "The Next Wave," titled "Machine Learning," features the following articles: "Toward a deep learning system for making sense of unlabeled multimodal data" by Barry Chen, T. Nathan Mundhenk, and Karl Ni; "Adversarial issues in machine learning" by W. Philip Kegelmeyer; "Advances in recommender-system theory" by Mark T. Jacobson; "Applying deep learning to implement a wideband radio frequency classifier for dynamic spectrum access" by Rob Miller, Marc Lichtman, and Edward Laird; "Smart digital assistance for intelligence analysis" by Paul Jones, S. Lynch, and Kathleen M. Vogel; "In-Q-Tel and Algorithmia partner to make ML [machine learning] algorithms and tools more accessible"; and "NSA [National Security Agency] and University of Texas: Joining forces in machine learning."
United States. National Security Agency/Central Security Service
2019
-
Next Wave: Machine Learning (Vol. 22 No. 1, 2018)
This is the 2018 issue of "The Next Wave," titled "Machine Learning," featuring the following articles: "Some Basic Ideas and Vocabulary in Machine Learning" by Steven Knox; "Machine Learning for Autonomous Cyber Defense" by Ahmad Ridley; "Rethinking Neuromorphic Computation: Why a New Paradigm is Needed" by Mark R. McLean and Christopher D. Krieger; "How Deep Learning Changed Computer Vision" by Bridget Kennedy and Brad Skaggs; "Deep Learning for Scientific Discovery" by Courtney Corley and Nathan Hodas, et al.; "Extremely Rare Phenomena and Sawtooths in La Jolla" by Anthony Gamst and Skip Garibaldi; "Machine Learning Programs Across the Government"; and "AlgorithmHub Provides Robust Environment for NSA Machine Learning Research."
United States. National Security Agency/Central Security Service
2018
-
Next Wave: 5G (Vol. 21 No. 3, 2017)
This is the 2017 issue of "The Next Wave," titled "5G [fifth generation]," featuring the following articles: "Introducing 5G" by Sam Farroha, Jared S. Everett, Jason J. Uher, Jason R. Harper, Jessica K. Bridgland, and Pamela M. Patton; "Virtualizing the 5G Architecture"; "5G and the Automotive Industry"; and "From Lab to Market."
United States. National Security Agency/Central Security Service
2017
-
Next Wave: 5G Security & Privacy (Vol. 21 No. 4, 2017)
This is the 2017 issue of "The Next Wave," titled "5G [fifth generation] Security & Privacy," featuring the following articles: "Investigating End-to-End Security in 5G Capabilities and IoT [Internet of Things] Extensions" by Jason J. Uher, Jason R. Harper, R. G. Mennecke III, Pamela M. Patton, and Sam Farroha; "Models for Organizing the Quantification of Privacy Risk" by Duane Einfeld; "Device-to-Device Communication: LTE [Long-Term Evolution] Direct"; and "Improving Encryption via an NSA [National Security Agency] PLA [patent license agreement]."
United States. National Security Agency/Central Security Service
2017
-
Next Wave: Internet of Things: It's a Wonderfully Integrated Life (Vol. 21 No. 2, 2016)
This is the 2016 issue of "The Next Wave," titled "Internet of Things: It's a Wonderfully Integrated Life," featuring the following articles: "The Internet of Things: It's a wonderfully integrated life"; "Privacy in the Internet of Things" by Roy Dong and Lillian J. Ratliff; "Security and the Internet of Things: When your refrigerator steals your identity"; "Simon and Speck: Agile block ciphers for the Internet of Things" by Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, and Louis Wingers; "Smart Cities"; and "NSA's [National Security Agency] NiFi [Niagrafiles] available via open source, improves flow of Big Data."
United States. National Security Agency
2016
-
Next Wave: Building a Science of Cybersecurity: The Next Move (Vol. 21 No. 1, 2015)
This is the 2015 issue of "The Next Wave," titled "Building a Science of Cybersecurity: The Next Move," featuring the following articles: "Resilient and secure cyber-physical systems" by William Emfinger, Pranav Srinavas Kumar, and Gabor Karsai; "Improving power grid cybersecurity"; "Analyzing the cost of securing control systems" by Zhenqi Huang, Yu Wang, Sayan Mitra, and Geir Dullerud; "Build it, break it, fix it: Competing to build secure systems" by Michael Hicks and Andrew Ruef; "The social engineering behind phishing" by Christopher B. Mayhorn, Emerson Murphy-Hill, Olga A. Zielinska, and Allaire K. Welk; "NSA [National Security Agency] Science of Security research network"; "Science of Security research and events highlights"; "NSA shares cyber software via open source."
United States. National Security Agency/Central Security Service
2015
-
Next Wave: Technology Forecasting (Vol. 20 No. 3, 2014)
This is the 2014 issue of "The Next Wave," titled "Technology Forecasting," featuring the following articles: "Forecasting superconductive electronics technology"; "Plasmonics: A promising path for future interconnects"; Innovation in materials science: Electromagnetic metamaterials" by Jane E. Heyes, Nathaniel K. Grady, Diego A. R. Dalvit, and Antionette J. Taylor; "Securing the cloud with homomorphic encryption"; "Today's Tiny Transistors"; and "Searching the future enterprise."
United States. National Security Agency
2014
-
Next Wave: Big Data (Vol. 20 No. 4, 2014)
This is the 2014 issue of "The Next Wave," titled "Big Data," featuring the following articles: "An Overview of Big Data" and "Big Graphs" by Paul Burkhardt; "Visual analytics for Big Data" by Randall Rohrer, Celeste Lyn Paul, and Bohdan Nebesh; "The Graph500 top 11 supercomputers"; "NSA [National Security Agency] nurtures growth of a science of security community"; and "Finding and correcting errors in Big Data."
United States. National Security Agency
2014
-
Next Wave: 20th Anniversary Issue of The Next Wave (TNW) (Vol. 20 No. 1, 2013)
This is the 2013 issue of "The Next Wave," titled "20th Anniversary Issue of The Next Wave (TNW)," featuring the following articles: "Twenty years of technology: What's changed, what hasn't?"; "The next user interface"; "Forecasting single-photon detector technology"; and "Radio noise: Global economic and political impact."
United States. National Security Agency
2013
-
Next Wave: High Performance Computing (HPC) (Vol. 20 No. 2, 2013)
This is the 2013 issue of "The Next Wave," titled "High Performance Computing (HPC)," featuring the following articles: "Defining the future with modeling, simulation, and emulation" by Benjamin Payne and Noel Wheeler; "Predicting the performance of extreme-scale supercomputer networks" by Scott Pakin, Xin Yuan, and Michael Lang; "Doing more with less: Cooling computers with oil pays off" by David Prucnal; "Energy-efficient superconducting computing coming up to speed" by Marc A. Manheimer; and "Beyond digital: A brief introduction to quantum computing" by Paul Lopata.
United States. National Security Agency
2013
-
Next Wave: NSA's Technology Transfer Program (Vol. 19 No. 3, 2012)
This is the 2012 issue of "The Next Wave," titled "NSA's [National Security Agency] Technology Transfer Program," featuring the following articles: "NSA technology transfer: Access to innovation"; "Federal technology transfer legislation highlights"; "Intellectual property: What it is and how it benefits NSA"; "From Fort Meade to the marketplace: Successes in technology transfer"; "Technology transfer with the University of Maryland -regional partner, national implications"; and "Bringing technology inside NSA."
United States. National Security Agency
2012
-
Next Wave: National Program for Cybersecurity Science (Vol. 19 No. 4, 2012)
This is the 2012 issue of "The Next Wave," titled "National Program for Cybersecurity Science," featuring the following articles: "Introducing the federal cybersecurity R&D [research and development] strategic plan"; "NSA [National Security Agency] initiatives in cybersecurity science"; "Barriers to achieving a science of cybersecurity"; "Funding research for a science of cybersecurity: The Air Force makes it a mission"; "Advancing the science of cybersecurity with a virtual organization"; "UK's new Research Institute investigates the science of cybersecurity"; "Securing America's digital infrastructure through education"; and "Toward a secure and trustworthy cyberspace."
United States. National Security Agency
2012
-
Next Wave: Cybersecurity (Vol. 19 No. 2, 2012)
This is the 2012 issue of "The Next Wave," titled "Cybersecurity," featuring the following articles: "Cybersecurity: From engineering to science" by Carl Landwehr; "The evolution of information security" by Adam Shostack; "Making experiments dependable" by Roy Maxion; "On bugs and elephants: Mining for a science of security" by Dusko Pavlovic; "Programming language methods for compositional security" by Anupam Datta and John Mitchell; "Proof-carrying data: Secure computation on untrusted platforms" by Alessandro Chiesa and Eran Tromer; and "Blueprint for a science of cybersecurity" by Fred Schneider.
United States. National Security Agency
2012
-
Next Wave: High Confidence Software and Systems (HCSS) (Vol. 19 No. 1, 2011)
This is the 2011 issue of "The Next Wave," titled "High Confidence Software and Systems (HCSS)," featuring the following articles: "A Letter from Sir Tony Hoare"; "Empowering the Experts: High-Assurance, High-Performance, High-Level Design with Cryptol"; "A High-Assurance Methodology for the Development of Security Software"; "Correct by Construction: Advanced Software Engineering"; "Verified Software in the World"; "Software for Dependable Systems: Sufficient Evidence?"; "Critical Code: Software Producibility for Defense"; and "50 Cyber-Physical Systems."
United States. National Security Agency
2011
-
Next Wave: Technology Forecasting (Vol. 18 No. 4, 2011)
This is the 2011 issue of "The Next Wave," titled "Technology Forecasting," featuring the following articles: "The Art of Forecasting and Futures Planning"; "Will Carbon Be the New Silicon?"; "The Security Impact of System Virtualization"; and "Thin Film/Miniature Power Sources."
United States. National Security Agency
2011
-
Next Wave: Network Tomography (Vol. 18 No. 3, 2010)
This is the 2010 issue of "The Next Wave," titled "Network Tomography," featuring the following articles: "Mapping Out Faster, Safer Networks"; "How Akamai Maps the Net: 'An Industry Perspective'"; "Compressed Sensing and Network Monitoring"; "Revealing Social Networks of Spammers"; "Challenges in Internet Geolocation, or 'Where's Waldo Online?'"; and "Clumps, Hoops, and Bubbles--Moving Beyond Clustering in the Analysis of Data."
United States. National Security Agency
2010
-
Next Wave: Open Source (Vol. 18 No. 2, 2009)
This is the 2009 issue of "The Next Wave," titled "Open Source," featuring the following articles: "Taking the Open Source Road"; "Raising the Bar in Operating System Security: SELinux [Security-Enhanced Linux] and OpenSolaris FMAC [Flexible Mandatory Access Control]"; Providing a Secure Foundation for Applications with the Certifiable Linux Intergration Platform"; "Cryptographic Binding of Metadata"; and "Open Source--Setting Software Free."
United States. National Security Agency
2009
-
Next Wave: Cloud Computing (Vol. 17 No. 4, 2009)
This is the 2009 issue of "The Next Wave," titled "Cloud Computing," featuring the following articles: "An Overview of Cloud Computing" and "The Future is 'Virtually' Here."
United States. National Security Agency
2009
-
Next Wave: Center for Advanced Study of Language (CASL) (Vol. 18 No. 1, 2009)
This is the 2009 issue of "The Next Wave," titled "Center for Advanced Study of Language (CASL)," featuring the following articles: "The Mind of the Language Analyst: A Peek Inside the Black Box"; "A Working Memory Workout for Language Practitioners"; "'Thinking Out of the Box' Through Cognitive Neuroscience"; "For a Better Dictionary, Build a Better Parser"; "A Talent for Language"; and "What's the Bottom Line?"
United States. National Security Agency
2009
-
Next Wave: Security & Change (Vol. 17 No. 1, 2008)
This is the 2008 issue of "The Next Wave," titled "Security & Change," featuring the following articles: "Veiled Biometrics"; "Telephone Security"; "February 17, 2009: A Second Date That Will Live in Infamy?"; "For the Record: How Format Wars Have Shaped Recording History"; and "Cognitive Radio: Tuning In The Future."
United States. National Security Agency
2008
-
Next Wave: Revolutionary Technologies (Vol. 17 No. 3, 2008)
This is the 2008 issue of "The Next Wave," titled "Revolutionary Technologies," featuring the following articles: "The Myth of Revolutionary Technologies"; "NetTop Eight Years Later"; "Text Extraction from Color Images"; and "Web 3.0 -- 'Are We There Yet?'"
United States. National Security Agency
2008
-
Next Wave: Information Visualization (Vol. 17 No. 2, 2008)
This is the 2008 issue of "The Next Wave," titled "Information Visualization," featuring the following articles: "An Information Visualization Primer and Field Trip"; "Visual Analytics: Adventures in Exploring Information"; "Do You Know What's Happening - Just Beyond Your View?"; "Knowledge Visualization with
Concept Mapping Tool"; and "Visualizing Data in the Metaverse."
United States. National Security Agency
2008
1