Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2) increases in speed; and 3) increases in severity. Modern computer worms simply propagate too quickly for human detection. Since attacks are now occurring at a speed which prevents direct human intervention, there is a need to develop automated defenses. Since the financial, social and political stakes are so high, we need defenses which are provably good against worst case attacks and are not too costly to deploy. In this dissertation we present two approaches to tackle these problems. For the first part of the dissertation we consider a game between an alert and a worm over a large network. We show, for this game, that it is possib...
As computer and communication networks become prevalent, the Internet has been a battlefield for att...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
In a constantly and intricately connected world that is going digital, cybersecurity is imperative t...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2...
In today\u27s network-dependent society, cyber attacks with network worms have become the predominan...
In very dynamic Information and Communication Technology (ICT) infrastructures, with rapidly growing...
Nowadays, the Internet and computer networks play an increasing role in our modern society. However,...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
Abstract. Over the last decade we have witnessed the rapid prolifera-tion of online networks and Int...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
Currently, networks and networked systems are essential media for us to communicate with other peopl...
Peer-to-peer real-time communication and media streaming applications optimize their performance by ...
Security breaches and attacks are critical problems in today’s networking. A key-point is that the s...
This research involves the design, development, and theoretical demonstration of models resulting in...
The security systems built to secure the computer network systems have to addressdynamically changin...
As computer and communication networks become prevalent, the Internet has been a battlefield for att...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
In a constantly and intricately connected world that is going digital, cybersecurity is imperative t...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2...
In today\u27s network-dependent society, cyber attacks with network worms have become the predominan...
In very dynamic Information and Communication Technology (ICT) infrastructures, with rapidly growing...
Nowadays, the Internet and computer networks play an increasing role in our modern society. However,...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
Abstract. Over the last decade we have witnessed the rapid prolifera-tion of online networks and Int...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
Currently, networks and networked systems are essential media for us to communicate with other peopl...
Peer-to-peer real-time communication and media streaming applications optimize their performance by ...
Security breaches and attacks are critical problems in today’s networking. A key-point is that the s...
This research involves the design, development, and theoretical demonstration of models resulting in...
The security systems built to secure the computer network systems have to addressdynamically changin...
As computer and communication networks become prevalent, the Internet has been a battlefield for att...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
In a constantly and intricately connected world that is going digital, cybersecurity is imperative t...