Thesis (Ph.D.)--University of Washington, 2016-08Cyber systems form the backbone of our society, serving infrastructures for health, energy, transportation, and finance to name a few. As the reliance on cyber systems grows, the impact of cyber attacks also increases. Recent cyber incidents demonstrate that cyber attacks result in not only financial cost, but also compromise the safety of critical infrastructures. Emerging cyber threats including advanced persistent threats (APT) show growing sophistication of attackers. Attackers exploit large number of entry points with different vulnerabilities and adaptively change attack strategies based on observed information of the targeted system. These features are captured by existing adversary mo...
The area investigated by this project is cyber attack prediction. With a focus on correlation-based ...
While there are significant advances in information technology and infrastructure which offer new op...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
Abstract — Networked control systems present an inviting target for adversaries seeking to attack ph...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
Abstract. Cyber-physical systems rely on distributed embedded wire-less nodes for sensing, computati...
As cyber attacks continue to grow in number, scope, and severity, the cyber security problem has bec...
The field of cybersecurity plays a crucial role for building safer societies and more resilient comm...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...
While there are significant advances in information technology and infrastructure which offer new op...
In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic...
Computer security in deployed systems is a dynamic interaction between attackers and defenders. Thes...
Abstract—A significant limitation of current cyber security research and techniques is its reactive ...
The growth of information and communication technology is constantly revolutionizing various domains...
The area investigated by this project is cyber attack prediction. With a focus on correlation-based ...
While there are significant advances in information technology and infrastructure which offer new op...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
Abstract — Networked control systems present an inviting target for adversaries seeking to attack ph...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
Abstract. Cyber-physical systems rely on distributed embedded wire-less nodes for sensing, computati...
As cyber attacks continue to grow in number, scope, and severity, the cyber security problem has bec...
The field of cybersecurity plays a crucial role for building safer societies and more resilient comm...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...
While there are significant advances in information technology and infrastructure which offer new op...
In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic...
Computer security in deployed systems is a dynamic interaction between attackers and defenders. Thes...
Abstract—A significant limitation of current cyber security research and techniques is its reactive ...
The growth of information and communication technology is constantly revolutionizing various domains...
The area investigated by this project is cyber attack prediction. With a focus on correlation-based ...
While there are significant advances in information technology and infrastructure which offer new op...
This article investigates the secure control problem for cyber-physical systems when the malicious d...