Publications

2020

(2020). Safe and Private Forward-Trading Platform for Transactive Microgrids. ACM Transactions on Cyber-Physical Systems.

PDF Project

(2020). Blockchains for Transactive Energy Systems: Opportunities, Challenges, and Approaches. IEEE Computer.

PDF Project

(2020). Graph-Theoretic Approach for Increasing Participation in Networks with Assorted Resources. IEEE Transactions on Network Science and Engineering.

PDF

(2020). Equilibrium of Blockchain Miners with Dynamic Asset Allocation. BRAINS 2020.

PDF

(2020). Mechanisms for Outsourcing Computation via a Decentralized Market. DEBS 2020.

PDF

(2020). Cyber-Attacks and Mitigation in Blockchain Based Transactive Energy Systems. ICPS 2020.

PDF Project

(2020). Verified Development and Deployment of Multiple Interacting Smart Contracts with VeriSolid. ICBC 2020. Acceptance rate: 22%

PDF Project

(2020). An Empirical Study of Android Security Bulletins in Different Vendors. WWW 2020.

PDF Project

(2020). Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning. AAAI 2020. Acceptance rate: 20.6%

PDF Dataset

(2020). Integrating Redundancy, Diversity, and Hardening to Improve Security of Industrial Internet of Things. Cyber-Physical Systems.

PDF

2019

(2019). Post-Incident Audits on Cyber Insurance Discounts. Computers & Security. Impact Factor: 3.06 (2018)

PDF

(2019). Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game. Computers & Security. Impact Factor: 3.06 (2018)

PDF

(2019). Data-Driven Detection of Anomalies and Cascading Failures in Traffic Networks. PHM 2019.

PDF

(2019). Diversity and Trust to Increase Structural Robustness in Networks. ACC 2019.

PDF

(2019). A Game-Theoretic Approach for Selecting Optimal Time-Dependent Thresholds for Anomaly Detection. Autonomous Agents and Multi-Agent Systems.

PDF

(2019). Database Audit Workload Prioritization via Game Theory. ACM Transactions on Privacy and Security.

PDF

(2019). Augmenting Learning Components for Safety in Resource Constrained Autonomous Robots. ISORC 2019.

PDF

(2019). Cyber-Physical Simulation Platform for Security Assessment of the Transactive Energy Systems. MSCPES 2019.

PDF Project

(2019). VeriSolid: Correct-by-Design Smart Contracts for Ethereum. FC 2019. Acceptance rate: 22%

PDF Dataset Project Slides

(2019). Towards High-Resolution Multi-Stage Security Games. Proactive and Dynamic Network Defense.

PDF DOI

2018

(2018). TRANSAX: A Blockchain-based Decentralized Forward-Trading Energy Exchange for Transactive Microgrids. ICPADS 2018.

PDF Project

(2018). Improving Network Connectivity and Robustness Using Trusted Nodes with Application to Resilient Consensus. IEEE Transactions on Control of Network Systems.

PDF

(2018). On the Assessment of Systematic Risk in Networked Systems. ACM Transactions on Internet Technology.

PDF

(2018). Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening. ICII 2018.

PDF

(2018). Cyber-Insurance as a Signaling Game: Self-Reporting and External Security Audits. GameSec 2018.

PDF

(2018). SolidWorx: A Resilient and Trustworthy Transactive Platform for Smart and Connected Communities. IEEE Blockchain 2018. Acceptance rate: 15.3%

PDF Project

(2018). Economic Analyses of Security Investments on Cryptocurrency Exchanges. IEEE Blockchain 2018. Acceptance rate: 15.3%

PDF

(2018). Application-Aware Anomaly Detection of Sensor Measurements in Cyber-Physical Systems. Sensors. 5-Year Impact Factor: 3.014 (2017)

PDF

(2018). Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing. ICDE 2018.

(2018). A Game-Theoretic Approach for Integrity Assurance in Resource-Bounded Systems. International Journal of Information Security.

PDF

(2018). Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks. IEEE Transactions on Network Science and Engineering.

PDF

(2018). The Rules of Engagement for Bug Bounty Programs. FC 2018. Acceptance rate: 26%

PDF Project Slides

(2018). An Economic Study of the Effect of Android Platform Fragmentation on Security Updates. FC 2018. Acceptance rate: 26%

PDF

(2018). SURE: A Modeling and Simulation Integration Platform for Evaluation of SecUre and REsilient Cyber-Physical Systems. Proceedings of the IEEE. Impact Factor: 9.11 (2016)

2017

(2017). PlaTIBART: A Platform for Transactive IoT Blockchain Applications with Repeatable Testing. M4IoT 2017.

PDF Project

(2017). On the Economics of Ransomware. GameSec 2017.

PDF

(2017). Monitoring Stealthy Diffusions. Knowledge and Information Systems. Impact Factor: 2.25 (2017)

PDF

(2017). Improving Network Connectivity Using Trusted Nodes and Edges. ACC 2017.

PDF

(2017). Synergic Security for Smart Water Networks: Redundancy, Diversity, and Hardening. CySWater 2017.

PDF

(2017). Scheduling Battery-Powered Sensor Networks for Minimizing Detection Delays. IEEE Communications Letters. Impact Factor: 2.72

PDF

(2017). Optimal Detection of Faulty Traffic Sensors Used in Route Planning. SCOPE 2017.

PDF

(2017). Graph-Theoretic Approach for Increasing Participation in Social Sensing. SocialSens 2017.

PDF

(2017). A Game-Theoretic Approach for Alert Prioritization. AICS 2017.

PDF Slides

(2017). Devising Effective Policies for Bug-Bounty Platforms and Security Vulnerability Discovery. Journal of Information Policy.

PDF Project

2016

(2016). Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments. GameSec 2016.

PDF

(2016). Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms. ESORICS 2016. Acceptance rate: 21%

PDF Project

(2016). Vulnerability of Transportation Networks to Traffic-Signal Tampering. ICCPS 2016.

PDF Dataset Slides

(2016). Resilient Wireless Sensor Networks for Cyber-Physical Systems. Cyber-Physical System Design with Sensor Networking Technologies.

PDF DOI

(2016). Optimal Thresholds for Intrusion Detection Systems. HotSoS 2016.

PDF

(2016). Multi-Defender Strategic Filtering Against Spear-Phishing Attacks. AAAI 2016.

PDF

2015

(2015). Resilient Observation Selection in Adversarial Settings. CDC 2015.

PDF Slides

(2015). Monitoring Stealthy Diffusion. ICDM 2015. Acceptance rate: 18.2%

PDF Dataset

(2015). Games of Timing for Security in Dynamic Environments. GameSec 2015.

PDF

(2015). Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems. CPS-SPC 2015.

PDF Slides

(2015). Should Cyber-Insurance Providers Invest in Software Security?. ESORICS 2015. Acceptance rate: less than 20%

PDF Slides

(2015). Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking. RATSP 2015.

PDF

(2015). A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things. IoT/CPS-Security 2015.

PDF

(2015). Adaptive Steganography and Steganalysis with Fixed-Size Embedding. Transactions on Data Hiding and Multimedia Security.

PDF

(2015). Optimal Personalized Filtering Against Spear-Phishing Attacks. AAAI 2015.

PDF Slides

2014

(2014). FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources. GameSec 2014.

PDF Slides

(2014). Secure Team Composition to Thwart Insider Threats and Cyberespionage. ACM Transactions on Internet Technology.

PDF

(2014). A Survey of Interdependent Information Security Games. ACM Computing Surveys. Impact Factor: 6.75

PDF

(2014). The Complexity of Estimating Systematic Risk in Networks. CSF 2014.

PDF

(2014). How Many Down? Toward Understanding Systematic Risk in Networks. ASIACCS 2014. Acceptance rate: 20%

PDF

(2014). Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools. BITCOIN 2014.

PDF

(2014). Estimating Systematic Risk in Real-World Networks. FC 2014. Acceptance rate: 22.5%

PDF

2013

(2013). Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks. WINE 2013. Acceptance rate: 24%

PDF Slides

(2013). Mitigation of Targeted and Non-Targeted Covert Attacks as a Timing Game. GameSec 2013.

PDF

(2013). Bitspotting: Detecting Optimal Adaptive Steganography. IWDW 2013.

PDF

(2013). Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats. ESORICS 2013. Acceptance rate: 17.8%

PDF Slides

(2013). A Game-Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding. EUSIPCO 2013.

PDF

(2013). Designing Robust Network Topologies for Wireless Sensor Networks in Adversarial Environments. Pervasive and Mobile Computing. Impact Factor: 2.35

PDF

2012

(2012). Game-theoretic Robustness of Many-to-one Networks. GameNets 2012.

PDF

2011