The field of cybersecurity plays a crucial role for building safer societies and more resilient communities. Known attacks against cyber systems are of two important kinds, viz. internal attacks and external attacks. Internal attacks are those that are launched by malicious components from within a system while external attacks are those that are launched by malicious entities from outside a system. This dissertation presents novel game theoretic techniques for defending cyber systems against both internal and external attacks. Hardware Trojans can launch attacks from within a system. To defend against such threats, this dissertation first presents the design of a novel auction-based market structure that can act as a reliable platform for ...
In this chapter, we present techniques to defeat Denial of Service (DoS) and Distributed Denial of S...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
While there are significant advances in information technology and infrastructure which offer new op...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...
Computer security in deployed systems is a dynamic interaction between attackers and defenders. Thes...
My research addresses the problem faced by a defender who must screen objects for potential threats ...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
Game theory offers a promising approach toward modeling cyber attacks and countermeasures as games p...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
As cyber attacks continue to grow in number, scope, and severity, the cyber security problem has bec...
As Internet has become ubiquitous, the risk posed by network attacks has greatly increased. Network ...
This paper investigates the secrecy and reliability of a communication where the user is assisting a...
While there are significant advances in information technology and infrastructure which offer new op...
In this chapter, we present techniques to defeat Denial of Service (DoS) and Distributed Denial of S...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
While there are significant advances in information technology and infrastructure which offer new op...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...
Computer security in deployed systems is a dynamic interaction between attackers and defenders. Thes...
My research addresses the problem faced by a defender who must screen objects for potential threats ...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
Game theory offers a promising approach toward modeling cyber attacks and countermeasures as games p...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
As cyber attacks continue to grow in number, scope, and severity, the cyber security problem has bec...
As Internet has become ubiquitous, the risk posed by network attacks has greatly increased. Network ...
This paper investigates the secrecy and reliability of a communication where the user is assisting a...
While there are significant advances in information technology and infrastructure which offer new op...
In this chapter, we present techniques to defeat Denial of Service (DoS) and Distributed Denial of S...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
While there are significant advances in information technology and infrastructure which offer new op...