Thrusts and Projects in the Laboratory for Cybersecurity
Cybersecurity Foundation: The Cybersecurity
Dynamics Approach (click the link to see
the exciting "x-y-z-t coordinate system")
Modeling and Analysis (the x-axis)
Cybersecurity Data Analytics (the y-axis)
Cybersecurity Metrics (the z-axis; broadly defined to include trust, security,
resilience, and agility metrics)
2. Cybersecurity Architecture and Mechanisms
Moving-Target Defense and Deception and Human Factors
Adversarial Machine Learning, especially Adversarial Malware
Bio- and Immune System-inspired Cyber Defense
Security for, and by, Blockchain
IoT and CPS Security
Trustworthy Cloud and Edge Computing (Cryptographic Multi-Party
Computing, Storage, Systems)
Funded Research Projects
- PI. B2CSM:
Blockchain-Based Cyber Security Management.
Funded by AFRL.
- PI. SaTC: CORE: Small: A Framework for Enhancing the
Resilience of Cyber Attack Classification and Clustering Mechanisms.
Funded by NSF SaTC (October 2018 -- September
- PI. MTD
Dynamics: A Quantitative Framework for Modeling and Orchestrating
Moving-Target Defense. Funded by ARO (August 2017 -- July 2020)
Modeling, Analyzing and Predicting Cyber Attacks. Funded by ARL (July 2017
-- July 2022)
Enhancing Safety and Security of Clinical Alarm Systems: An
interdisciplinary Cyber-Physical-Human Analysis (6/1/2018--5/31/2019).
UTSA PI: Dr. G. Chen.
Personnel. NSF CREST Center. Funded by NSF (2017-2022)
Metrics Framework of Trustworthy Systems: Systematization, Ontologies, Measurements, Properties and Theory.
Funded by ARO/ARL (May 2016 -- August 2017; Phase I)
- PI. Cybersecurity Dynamics. Funded by ARO (Sept. 2013 --
June 2014; this is a conceptualization project)
- PI. A Statistical
Framework for Analyzing Cyber Threats. Funded by ARO (June 2013 -- May
- PI. A Theoretical Framework for Cyber
Defense Operations. Funded by ARO (July 2012 -- June 2015)
- Co-PI. TC:
Large: Collaborative Research: Privacy-Enhanced Secure Data Provenance.
Funded by NSF (Sept. 2011 -- Aug. 2016)
IAPD: Integrated Adaptive and Proactive Defense against Stealthy Botnets. Funded by AFOSR (March 2009 -- Oct. 2012)
AFOSR MURI: A Framework for Managing the Assured Information Sharing
Lifecycle (July 2008 -- June 2013)
Securing the Smart Power Grid. Funded by UTSA (Sept. 2010 -- Aug. 2011)
A Systematic Defense Framework for Combating Botnets.
Funded by ONR (April 2009 -- Dec. 2010)
- PI. Modeling Cyber Attacks. Funded by UTSA (Nov.
2008 -- Nov. 2009)
Collaborative Research: Secure Knowledge Management: Models and
Mechanisms, funded by NSF CyberTrust (9/1/2005
- PI. SuE: A Framework for Survivable Tactical Information
Systems, Funded by Army Research (4/15/2005 -- 1/14/2008)
Survivability Analysis for Cryptographic Key Infrastructures in MANETS,
Funded by UTSA (9/1/2006 -- 12/31/2007)
Countering Malicious and Fast-Spreading Malicious Codes, Funded by UTSA
Center for Infrastructure Assurance and Security (6/1/2004 -- 8/31/2006)