## Research
Thrusts and Projects in the Laboratory for Cybersecurity
Dynamics

## Research Thrusts

1.
**Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity (click the link to see the exciting "x-y-z-t
coordinate system")**

2.
Cybersecurity Mechanisms:
Moving-Target Defense; Defense Against Malware/Botnets/APT;
Trustworthy Cloud Computing (Cryptographic Multi-Party Computing, Storage,
Systems); Assured Information Sharing and Provenance

## Funded Research Projects

- PI. MTD
Dynamics: A Quantitative Framework for Modeling and Orchestrating
Moving-Target Defense. Funded by ARO (August 2017 -- July 2020)
- PI.
Modeling, Analyzing and Predicting Cyber Attacks. Funded by ARL (July 2017
-- July 2022)
- Senior
Personnel. NSF CREST Center. Funded by NSF (2017-2022)
- PI.
Metrics Framework of Trustworthy Systems: Systematization, Ontologies, Measurements, Properties and Theory.
Funded by ARO/ARL (May 2016 -- August 2017; Phase I)
- PI. Cybersecurity Dynamics. Funded by ARO (Sept. 2013 --
June 2014; this is a conceptualization project)
- PI. A
Statistical Framework for Analyzing Cyber Threats. Funded by ARO (June
2013 -- May 2016)
- PI. A Theoretical Framework for Cyber
Defense Operations. Funded by ARO (July 2012 -- June 2015)
- Co-PI.
TC: Large: Collaborative Research: Privacy-Enhanced Secure Data
Provenance. Funded by NSF (Sept. 2011 -- Aug. 2016)
- PI.
IAPD: Integrated Adaptive and Proactive Defense against Stealthy Botnets. Funded by AFOSR (March 2009 -- Oct. 2012)
- Co-PI.
AFOSR MURI: A Framework for Managing the Assured Information Sharing
Lifecycle (July 2008 -- June 2013)
- PI.
Securing the Smart Power Grid. Funded by UTSA (Sept. 2010 -- Aug. 2011)
- Co-PI.
A Systematic Defense Framework for Combating Botnets.
Funded by ONR (April 2009 -- Dec. 2010)
- PI. Modeling Cyber Attacks. Funded by UTSA (Nov.
2008 -- Nov. 2009)
- PI.
Collaborative Research: Secure Knowledge Management: Models and
Mechanisms, funded by NSF CyberTrust (9/1/2005
-- 8/31/2009)
- PI. SuE: A Framework for Survivable Tactical Information
Systems, Funded by Army Research (4/15/2005 -- 1/14/2008)
- PI.
Survivability Analysis for Cryptographic Key Infrastructures in MANETS,
Funded by UTSA (9/1/2006 -- 12/31/2007)
- PI.
Countering Malicious and Fast-Spreading Malicious Codes, Funded by UTSA
Center for Infrastructure Assurance and Security (6/1/2004 -- 8/31/2006)