Threat intervention with limited security resources is a chal-lenging problem. An optimal strategy is to effectively pre-dict attackers ’ targets (or goals) based on current avail-able information, and use such predictions to disrupt their planned attacks. In this paper, we propose a game-theoretic framework to address this challenge which encompasses the following three elements. First, we design a method to ana-lyze an attacker’s types in order to determine the most plau-sible type of an attacker. Second, we propose an approach to predict possible targets of an attack and the course of actions that the attackers may take even when the attackers ’ type-s are ambiguous. Third, a game-theoretic based strategy is developed to determine the be...
The area investigated by this project is cyber attack prediction. With a focus on correlation-based ...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
My research addresses the problem faced by a defender who must screen objects for potential threats ...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
Abstract. Recently, there has been an increase in interest in applying game the-oretic approaches to...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...
Abstract. Game-theoretic security resource allocation problems have generated significant interest i...
Cyber systems that serve government and military organizations must cope with unique threats and pow...
An effective way of preventing attacks in secure areas is to screen for threats (people, objects) be...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
This dissertation presents efficient, on-line, convergent methods to find defense strategies against...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
Stackelberg security games are a critical tool for maximizing the utility of limited defense resourc...
The area investigated by this project is cyber attack prediction. With a focus on correlation-based ...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
My research addresses the problem faced by a defender who must screen objects for potential threats ...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
Abstract. Recently, there has been an increase in interest in applying game the-oretic approaches to...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...
Abstract. Game-theoretic security resource allocation problems have generated significant interest i...
Cyber systems that serve government and military organizations must cope with unique threats and pow...
An effective way of preventing attacks in secure areas is to screen for threats (people, objects) be...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
This dissertation presents efficient, on-line, convergent methods to find defense strategies against...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
Stackelberg security games are a critical tool for maximizing the utility of limited defense resourc...
The area investigated by this project is cyber attack prediction. With a focus on correlation-based ...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...