Research

Research Interests and Projects in the Laboratory for Cybersecurity Dynamics

Research Interests

  1. Cybersecurity Foundation: The Cybersecurity Dynamics Approach (click the link to see the exciting “x-y-z-t coordinate system”)
    1. First-Principle Cybersecurity Modeling and Analysis (the x-axis)
    2. Cybersecurity Data Analytics (the y-axis)
    3. Cybersecurity Metrics (the z-axis; broadly defined to include trust, security, resilience, and agility metrics)
  2. Cybersecurity Architecture and Mechanisms
    1. Moving-Target Defense and Deception and Human Factors
    2. Adversarial Machine Learning, especially Adversarial Malware Detection
    3. Bio- and Immune System-inspired Cyber Defense
    4. Security for, and by, Blockchain
    5. IoT and CPS Security
    6. Trustworthy Cloud and Edge Computing (Cryptographic Multi-Party Computing, Storage, Systems)

Funded Research Projects

  1. PI.CICI: UCSS: ACSP4HR: Assuring Cyber Security and Privacy for Human Resilience Research: Requirements, Framework, Architecture, Mechanisms and Prototype. Funded by NSF (July 2021 — June 2024). Co-PIs: Charles Benight and Yanyan Zhuang.
  2. Co-PI. SDN/NFV VACUUM: Value-based Access Control Using Untrusted Media. Funded by NSA (August 2021 — July 2023). PI: Gedare Bloom. Other Co-PI: Philip Brown.
  3. Lead PI. Application of Artificial Intelligence to Cybersecurity for Protecting National Critical Infrastructure. 2021-2025, DOE.                            o  Since I will be joining UCCS starting 1/1/2021, Dr. Q. Chen (co-PI when the proposal is notified to fund) takes over the Lead PIship (per DOE policy).
  4. PI. NSA OnRampII Grant, 2021                                                                                                                                                                                                              o  I relinquish this one-year project because I will be joining UCCS starting 1/1/2021 (per NSA policy).
  5. PI. B2CSM: Blockchain-Based Cyber Security Management. 2019. Funded by AFRL.
  6. PI. SaTC: CORE: Small: A Framework for Enhancing the Resilience of Cyber Attack Classification and Clustering Mechanisms. Funded by NSF SaTC (October 2018 — September 2021)
  7. PI. MTD Dynamics: A Quantitative Framework for Modeling and Orchestrating Moving-Target Defense. Funded by ARO (August 2017 — February 2021)
  8. PI. Modeling, Analyzing and Predicting Cyber Attacks. Funded by ARL (July 2017 — July 2022)
  9. Co-PI. Enhancing Safety and Security of Clinical Alarm Systems: An interdisciplinary Cyber-Physical-Human Analysis (6/1/2018–5/31/2019). UTSA PI: Dr. G. Chen.
  10. Senior Personnel. NSF CREST Center. Funded by NSF (2017-2022)
  11. PI. Metrics Framework of Trustworthy Systems: Systematization, Ontologies, Measurements, Properties and Theory. Funded by ARO/ARL (May 2016 — August 2017; Phase I)
  12. PI. Cybersecurity Dynamics. Funded by ARO (Sept. 2013 — June 2014; this is a conceptualization project)
  13. PI. A Statistical Framework for Analyzing Cyber Threats. Funded by ARO (June 2013 — May 2016)
  14. PI. A Theoretical Framework for Cyber Defense Operations. Funded by ARO (July 2012 — June 2015)
  15. Co-PI. TC: Large: Collaborative Research: Privacy-Enhanced Secure Data Provenance. Funded by NSF (Sept. 2011 — Aug. 2016)
  16. PI. IAPD: Integrated Adaptive and Proactive Defense against Stealthy Botnets. Funded by AFOSR (March 2009 — Oct. 2012)
  17. Co-PI. AFOSR MURI: A Framework for Managing the Assured Information Sharing Lifecycle (July 2008 — June 2013)
  18. PI. Securing the Smart Power Grid. Funded by UTSA (Sept. 2010 — Aug. 2011)
  19. Co-PI. A Systematic Defense Framework for Combating Botnets. Funded by ONR (April 2009 — Dec. 2010)
  20. PI. Modeling Cyber Attacks. Funded by UTSA (Nov. 2008 — Nov. 2009)
  21. PI. Collaborative Research: Secure Knowledge Management: Models and Mechanisms, funded by NSF CyberTrust (9/1/2005 — 8/31/2009)
  22. PI. SuE: A Framework for Survivable Tactical Information Systems, Funded by Army Research (4/15/2005 — 1/14/2008)
  23. PI. Survivability Analysis for Cryptographic Key Infrastructures in MANETS, Funded by UTSA (9/1/2006 — 12/31/2007)
  24. PI. Countering Malicious and Fast-Spreading Malicious Codes, Funded by UTSA Center for Infrastructure Assurance and Security (6/1/2004 — 8/31/2006)