Skip to Main Content U.S. Department of Energy
Asymmetric Resilient Cybersecurity

Publications

2017

Shekar V, L Fiondella, S Chatterjee, and M Halappanavar. 2017. "Quantitative Assessment of Transportation Network Vulnerability with Dynamic Traffic Simulation Methods." In 2017 IEEE International Symposium onTechnologies for Homeland Security.doi: 10.1109/THS.2017.7943454

Shekar V, L Fiondella, S Chatterjee, and M Halappanavar. 2017. "Quantifying Economic and Environmental Impacts of Transportation Network Disruptions with Dynamic Traffic Simulation." In 2017 IEEE International Symposium onTechnologies for Homeland Security.doi: 10.1109/THS.2017.7943472

2016

Bruillard PJ, KE Nowak, and EAH Purvine. 2016. "Anomaly Detection Using Persistent Homology." In Special Edited Volume of Cyber Security Research.

Chatterjee S, M Halappanavar, R Tipiteddy, and MR Oster. 2016. "Game Theory and Uncertainty Quantification for Cyber Defense Applications" SIAM Journal on Scientific Computing 49(6).

Chatterjee S, R Tipireddy, MR Oster, and M Halappanavar. 2016. "Propagating Mixed Uncertainties in Cyber Attacker Payoffs: Exploration of Two-Phase Monte Carlo Sampling and Probability Bounds Analysis." In IEEE Symposium on Technologies for Homeland Security (HST 2016), May 10-11, 2016, Waltham, MA. doi:10. 1109/THS. 2016. 7568967

Chen P, S Choudhury, and A Hero. "Multi-Centrality Graph Spectral Decompositions and Their Application to Cyber Intrusion Detection". In 41st International Conference on Acoustics, Speech and Signal Processing (ICASSP), March 20-25, 2016 Shanghai, China, pp.4553-4557. IEEE, Piscataway, New Jersey. doi: 10.1109/milcom.2015.7357631

Chikkagoudar S, S Chatterjee, DG Thomas, TE Carroll, and G Muller. 2016. "Machine Learning for Cybersecurity." In Research Methods for Cyber Security.

Fink GA, TW Edgar, TR Rice, DG MacDonald, and CE Crawford. 2016. "Security and Privacy in Cyber-Physical Systems." Chapter 9 in Cyber-Physical Systems: Foundations, Principles and Applications, vol. 1, Houbing Song, Danda B. Rawat, Sabina Jeschke, and Christian Brecher, pp. 129-141. Elsevier, SAN DIEGO, California

Joslyn CA, C Pogel, and EA Purvine. 2016. "Interval-Valued Rank in Finite Ordered Sets." In Order, doi:10.1007/s11083-016-9411-2

Mane P, S Shanbhag, T Kamath, PS Mackey, and J Springer. 2016. "Analysis of Community Detection Algorithms for Large Scale Cyber Networks." In Proceedings of the 2016 Information Security Research and Education (INSuRE) Conference (INSuRECon-16), September 30, 2016. Information Security Research and Education (INSuRE), WEST LAFAYETTE, IN.

Nandi A, H Medal, and M Halappanavar. 2016. "Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success." In 2016 IEEE International Symposium onTechnologies for Homeland Security. doi: 10.1109/THS.2016.7568892 .

Oehmen CS, Multari NJ. 2016. "Report on the Second Meeting on Asymmetry in Resilience for Complex Cyber Systems" AiR 2.0: Asymmetry in Resilience, September 16-17, 2015, Crystal City, VA Download PDF.

Rauf U, F Gillani, E Al-Shaer, M Halappanavar, S Chatterjee, and CS Oehmen. 2016. "Formal Approach For Resilient Reachability based on End-System Route Agility." In Third ACM Workshop on Moving Target Defense (MTD 2016), October 24-28, 2016, Vienna, Austria, pp. 117-127. doi:10.1145/2995272.2995275.

Saha S, AK Vullinati, M Halappanavar, and S Chatterjee. 2016. "Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems." In IEEE Symposium on Technologies for Homeland Security (HST 2016), May 10-11, 2016, Waltham, MA. doi:10. 1109/THS. 2016. 7568884 .

Tardiff MF, GT Bonheyo, KA Cort, TW Edgar, NJ Hess, WJ Hutton, III, EA Miller, KE Nowak, CS Oehmen, EAH Purvine, GK Schenter, and PD Whitney. 2016. "Applying the Scientific Method of Cybersecurity Research." In IEEE Symposium on Technologies for Homeland Security (HST 2016), May 10-11, 2016, Waltham, MA. doi:10. 1109/THS. 2016. 7568886.

Tipireddy R, S Chatterjee, PR Paulson, MR Oster, and M Halappanavar. 2016. "Agent-Centric Approach for Cybersecurity Decision-Support with Partial Observability." In 2017 IEEE International Symposium on Technologies for Homeland Securitydoi: 10.1109/THS.2017.7943478

2015

Carroll TE, S Chikkagoudar, and KM Arthur-Durett. 2015. "Impact of Network Activity Levels on the Performance of Passive Network Service Dependency Discovery." In IEEE MILCOM 2015.doi: 10.1109/milcom.2015.7357631

Chatterjee S, M Halappanavar, R Tipireddy, M Oster, and S Saha. 2015. "Quantifying Mixed Uncertainties in Cyber Attacker Payoffs." In 2015 IEEE Symposium on Technologies for Homeland Security (HST '15). April 14-16, 2015, Waltham, Massachusetts. doi:10.1109/ths.2015.7225287

Chatterjee S, R Tipireddy, MR Oster, and M Halappanavar. 2015. "A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs." National Cybersecurity Institute Journal 2(3)

Choudhury S, PY Chen, LR Rodriguez, DS Curtis, PL Nordquist, I Ray, and KJ Oler. 2015. "Action Recommendation for Cyber Resilience." In SafeConfig 2015: Automated Decision Making for Active Cyber Defense. doi: 10.1145/2809826.2809837

Choudhury S, L Holder, G Chin, Jr, K Agarwal, and JT Feo. "A Selectivity based approach to Continuous Pattern Detection in Streaming Graphs.", 18th International Conference on Extending Database Technology (EDBT), Brussels, 2015.

Fink GA, DV Zarzhitsky, TE Carroll, and ED Farquhar. 2015. "Security and Privacy Grand Challenges for the Internet of Things." In The Third International Workshop on Internet of Things, Machine to Machine and Smart Services Applications (IoT 2015) doi: 10.1109/cts.2015.7210391

Henderson DL, and MJ Lancaster. 2015. "Value Modeling for Enterprise Resilience." In 25th Annual INCOSE International Symposium (IS2015), July 13-16, 2015, Seattle, Washington, vol. 25, no. 1, pp. 1417-1426. John Wiley & Sons, Hoboken, NJ. doi:10.1002/j.2334-5837.2015.00139.x

Hogan EA, and CA Joslyn. 2015. "Information Measures of Degree Distributions in Labeled Graphs." In AWM Research Symposium Proceedings, April 11-12, 2015, College Park, Maryland. Advances in the Mathematical Sciences, Association for Women in Mathematics Research Symposium, College Park, MD. doi.org/10.1007/978-3-319-34139-2_19.

Oehmen CS, TE Carroll, PC Paulsen, DM Best, CF Noonan, SR Thompson, JL Jensen, GA Fink, and ES Peterson. 2015. "Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost Measures." In SafeConfig 2015: Automated Decision Making for Active Cyber Defense. doi: 10.1145/2809826.2809835

Rodriguez LR, DS Curtis, PY Chen, S Choudhury, PL Nordquist, KJ Oler, and I Ray. 2015. "DEMO: Action Recommendation for Cyber Resilience." In 22nd ACM Conference on Computer and Communications Security (Demonstration Track). doi: 10.1145/2810103.2810104

Yin, J. 2015. "Data Confidentiality Challenges in Big Data Applications." In 2015 IEEE International conference on Big Data.doi: 10.1109/bigdata.2015.7364111

2014

Carroll TE, FL Greitzer, and AD Roberts. 2014. Security Informatics Research Challenges for Mitigating Cyber Friendly Fire. doi:10.1186/s13388-014-0013-5

Carroll TE, MB Crouse, EW Fulp, and KS Berenhaut. 2014. "Analysis of Network Address Shuffling as a Moving Target Defense." In 2014 IEEE International Conference on Communications, June 10-14, 2014, Sydney, Australia, pp. 701-706. IEEE, Piscataway, NJ. doi:10.1109/ICC.2014.6883401

Fink GA, ZW Beech, and RL Griswold. 2014. "Quantifying Cyber-Resilience Against Resource-Exhaustion Attacks." In 1st International Symposium on Resilient Cyber Systems. IEEE Press, Denver, CO. doi:10.1109/isrcs.2014.6900093

Joslyn CA, WE Cowley, EA Hogan, and BK Olsen. 2014. "Discrete Mathematical Approaches to Graph-Based Traffic Analysis." In The 2nd ASE International Conference on Big Data Science & Computing, the 6th ASE International Conference on Social Computing and the 3rd ASE International Conference on Cyber Security, May 27-31, 2014, Stanford, California.. Academy of Science & Engineering, Greensboro, NC. Download PDF

Kuntze N, R Carsten , S Leivesley, and DO Manz. 2014. "Resilient Core Networks for Energy Distribution." In IEEE PES 2014 General Meeting. "IEEE Press", International. doi:10.1109/pesgm.2014.6939164

Oehmen CS, Multari NJ. 2014. "Report on the First Meeting on Asymmetry in Resilience for Complex Cyber Systems" Asymmetry in Resilience, September 17-18, 2014, Crystal City, VA Download PDF.

Olama MM, SM Killough, T Kuruganti, and TE Carroll. 2014. "Design, Implementation, and Evaluation of a Hybrid DS/FFH Spread-Spectrum Radio Transceiver." In IEEE Military Communications Conference (MILCOMM 2014), October 6-8, 2014, Baltimore, Maryland, pp. 1368-1373. IEEE, Piscataway, NJ. doi:10.1109/MILCOM.2014.227

Ray A, L Holder, and S Choudhury. 2014. ""Frequent Subgraph Discovery in Large Attributed Streaming Graphs." Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications / Special Issue of Journal of Machine Learning Research, vol. 36, pp. 166-181. JMLR, New York, NY.

2013

Choudhury S, L Holder, G Chin, Jr, and JT Feo. 2013. "Fast Search for Dynamic Multi-Relational Graphs." In ACM SIGMOD Workshop on Dynamic Networks Management and Mining (DyNetMM 2013). Association for Computing Machinery (ACM), New York, NY. arXiv:1306.2459

Choudhury S, L Holder, G Chin, Jr, A Ray, SJ Beus, and JT Feo. 2013. "StreamWorks - A system for Dynamic Graph Search." In Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data (SIGMOD 2013), June 22-27, 2013, New York, pp. 1101-1104. ACM, New York, NY. doi: 10.1145/2463676.2463697

Fink GA, DM Best, DO Manz, VM Popovsky, and BE Endicott-Popovsky. 2013. "Gamification for Measuring Cyber Security Situational Awareness." In Foundations of Augmented Cognition, 7th International Conference on Augmented Cognition, July 21-26, 2013, Las Vegas, Nevada. Lecture Notes in Computer Science, vol. 8027, ed. DD Schmorrow and CM Fidopiastis, pp. 656-665. Springer, Berlin Heidelberg, Germany. doi:10.1007/978-3-642-39454-6_70

Greitzer FL, TE Carroll, and AD Roberts. 2013. "Cyber Friendly Fire: Research Challenges for Security Informatics." In IEEE International Conference on Intelligence and Security Informatics (ISI), June 4-7, 2013, Seattle, Washington, pp. 94-99. IEEE, Piscataway, NJ. doi:10.1109/ISI.2013.6578794 Download PDF

Halappanavar M, S Choudhury, EA Hogan, PSY Hui, JR Johnson, III, I Ray, and LB Holder. 2013. "Towards A Networks-of-Networks Framework for Cyber Security." In IEEE Intelligence and Security Informatics (ISI) 2013, June 4-7, 2013, Seattle, Washington, pp. 106-108. Institute of Electrical and Electronics Engineers, Piscataway, NJ. arXiv: 1304.6761

Hogan EA, and JR Johnson, III. 2013. "A Graph Analytic Metric for Mitigating APT." In IEEE Intelligence and Security Informatics 2013. Pacific Northwest National Laboratory, Richland, WA. doi:10.1109/ISI.2013.6578801 Download PDF.

Hogan EA, PSY Hui, S Choudhury, M Halappanavar, KJ Oler, and CA Joslyn. 2013. "Towards a Multiscale Approach to Cybersecurity Modeling." In 13th annual IEEE Conference on Technologies for Homeland Security (HST '13). Pacific Northwest National Laboratory, Richland, WA. doi:10.1109/THS.2013.6698980 Download PDF.

Hui PSY, S Choudhury, EA Hogan, M Halappanavar, and KJ Oler. 2013. "Towards a Multiscale Approach to Cybersecurity Modeling." Presented by Peter Hui (Invited Speaker) at IEEE Conference on Technologies for Homeland Security (HST '13), Waltham, MA, on November 13, 2013. doi: 10.1109/THS.2013.6698980.

Johnson JR, III and EA Hogan. 2013. "A Graph Analytic Metric for Mitigating Advanced Persistent Threat." In IEEE International Conference on Intelligence and Security Informatics (ISI 2013), June 4-7, 2013, Seattle, Washington, pp. 129-133. IEEE, Piscataway, New Jersey. doi:10.1109/ISI.2013.6578801 Download PDF.

Joslyn CA, S Choudhury, DJ Haglin, B Howe, WK Nickless, and BK Olsen. 2013. "Massive Scale Cyber Traffic Analysis: A Driver for Graph Database Research." In First International Workshop on Graph Data Management Experiences and Systems (GRADES 2013), held in conjunction with the ACM SIGMOD/PODS Conference, June 22-27, 2013, New York, p. Article No. 3. ACM, New York, NY. doi: 10.1145/2484425.2484428

Multari NJ. 2013. "Modeling for Cyber Security and Cyber Resiliency." In 32nd International Conference on Conceptual Modeling (ER 2013), November 11-13, 2013, Hong Kong. Springer, Hong Kong, China. doi: 10.1007/978-3-642-41924-9

Multari NJ and CS Oehmen. 2013. Building the Theory of Resilience. Pacific Northwest National Laboratory, Richland, Washington.Download PDF

Ramuhalli P, M Halappanavar, JB Coble, and M Dixit. 2013. "Towards A Theory of Autonomous Reconstitution of Compromised Cyber-Systems." In IEEE International Conference on Technologies for Homeland Security (HST 2013), November 12-14, 2013, Waltham, MA, pp. 577-583/ Institute of Electrical and Electronics Engineers Inc., Piscataway, NJ. doi:10.1109/THS.2013.6699067 Download PDF.

Smith JL, WJ Hutton, III, and G Muller. 2013. "Preliminaries for Resilient Cyber Systems." Presented at 2013 IEEE Intelligence and Security Informatics (ISI 2013). June 4-7, 2013, Seattle, Washington, USA.

2012

Chin G, Jr, A Marquez, S Choudhury, and JT Feo. 2012. "Scalable Triadic Analysis of Large-Scale Graphs: Multi-Core vs. Multi-Processor vs. Multi-Threaded Shared Memory Architectures." In Proceedings of the 2012 IEEE 24th International Symposium on Computer Architecture and High Performance Computing, October 24-26, 2012, New York, NY,, pp. 163-170. IEEE Computer Society, Los Alamitos, CA. doi:DOI 10.1109/SBAC-PAD.2012.39.

Oehmen CS, ES Peterson, and JR Teuton. 2012. "Evolutionary Drift Models for Moving Target Defense." In CSIIRW '12: Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop, October 30-November 2, 2012, Oak RIdge, Tennessee. ACM, New York, NY. doi: 10.1145/2459976.2460018.

Zhang GQ, L Luo, C Ogbuji, CA Joslyn, J Mejino, and SS Sahoo. 2012. "An Analysis of Multi-type Relational Interactions in FMA Using Graph Motifs with Disjointness Constraints." In American Medical Information Association Annual Symposium, November 3-7, 2012, Chicago, Illinois, pp. 1060-1069. AMIA, Bethesda, MD. PMID: Read here.

Asymmetric Resilient Cybersecurity

The ARC Team