Research Thrusts and Projects in the Laboratory for Cybersecurity Dynamics

Research Thrusts

1.       Cybersecurity Foundation: The Cybersecurity Dynamics Approach (click the link to see the exciting "x-y-z-t coordinate system")

a)     First-Principle Cybersecurity Modeling and Analysis (the x-axis)

b)    Cybersecurity Data Analytics (the y-axis)

c)     Cybersecurity Metrics (the z-axis; broadly defined to include trust, security, resilience, and agility metrics)

2.       Cybersecurity Architecture and Mechanisms

a)     Moving-Target Defense and Deception and Human Factors

b)    Adversarial Machine Learning, especially Adversarial Malware Detection

c)     Bio- and Immune System-inspired Cyber Defense

d)    Security for, and by, Blockchain

e)     IoT and CPS Security

f)      Trustworthy Cloud and Edge Computing (Cryptographic Multi-Party Computing, Storage, Systems)

Funded Research Projects

  1. PI. SaTC: CORE: Small: A Framework for Enhancing the Resilience of Cyber Attack Classification and Clustering Mechanisms. Funded by NSF SaTC (October 2018 -- September 2021)
  2. PI. MTD Dynamics: A Quantitative Framework for Modeling and Orchestrating Moving-Target Defense. Funded by ARO (August 2017 -- July 2020)
  3. PI. Modeling, Analyzing and Predicting Cyber Attacks. Funded by ARL (July 2017 -- July 2022)
  4. Co-PI. Enhancing Safety and Security of Clinical Alarm Systems: An interdisciplinary Cyber-Physical-Human Analysis (6/1/2018--5/31/2019). UTSA PI: Dr. G. Chen.
  5. Senior Personnel. NSF CREST Center. Funded by NSF (2017-2022)
  6. PI. Metrics Framework of Trustworthy Systems: Systematization, Ontologies, Measurements, Properties and Theory. Funded by ARO/ARL (May 2016 -- August 2017; Phase I)
  7. PI. Cybersecurity Dynamics. Funded by ARO (Sept. 2013 -- June 2014; this is a conceptualization project)
  8. PI. A Statistical Framework for Analyzing Cyber Threats. Funded by ARO (June 2013 -- May 2016)
  9. PI. A Theoretical Framework for Cyber Defense Operations. Funded by ARO (July 2012 -- June 2015)
  10. Co-PI. TC: Large: Collaborative Research: Privacy-Enhanced Secure Data Provenance. Funded by NSF (Sept. 2011 -- Aug. 2016)
  11. PI. IAPD: Integrated Adaptive and Proactive Defense against Stealthy Botnets. Funded by AFOSR (March 2009 -- Oct. 2012)
  12. Co-PI. AFOSR MURI: A Framework for Managing the Assured Information Sharing Lifecycle (July 2008 -- June 2013)
  13. PI. Securing the Smart Power Grid. Funded by UTSA (Sept. 2010 -- Aug. 2011)
  14. Co-PI. A Systematic Defense Framework for Combating Botnets. Funded by ONR (April 2009 -- Dec. 2010)
  15. PI. Modeling Cyber Attacks. Funded by UTSA (Nov. 2008 -- Nov. 2009)
  16. PI. Collaborative Research: Secure Knowledge Management: Models and Mechanisms, funded by NSF CyberTrust (9/1/2005 -- 8/31/2009)
  17. PI. SuE: A Framework for Survivable Tactical Information Systems, Funded by Army Research (4/15/2005 -- 1/14/2008)
  18. PI. Survivability Analysis for Cryptographic Key Infrastructures in MANETS, Funded by UTSA (9/1/2006 -- 12/31/2007)
  19. PI. Countering Malicious and Fast-Spreading Malicious Codes, Funded by UTSA Center for Infrastructure Assurance and Security (6/1/2004 -- 8/31/2006)