“Graph-Theoretic Approach for Increasing Participation in Networks with Assorted Resources”
Waseem Abbas,
Aron Laszka, Mudassir Shabbir, Xenofon Koutsoukos
IEEE Transactions on Network Science and Engineering, Accepted for Publication
PDF BibTeX
@article{abbas_graph,
author={Waseem Abbas and Aron Laszka and Mudassir Shabbir and Xenofon Koutsoukos},
title={Graph-Theoretic Approach for Increasing Participation in Networks with Assorted Resources},
journal={IEEE Transactions on Network Science and Engineering},
}
“Safe and Private Forward-Trading Platform for Transactive Microgrids”
Scott Eisele, Taha Eghtesad, Keegan Campanelli, Prakhar Agrawal,
Aron Laszka, Abhishek Dubey
ACM Transactions on Cyber-Physical Systems, Accepted for Publication
PDF BibTeX
@article{eisele_safe,
author={Scott Eisele and Taha Eghtesad and Keegan Campanelli and Prakhar Agrawal and Aron Laszka and Abhishek Dubey},
title={Safe and Private Forward-Trading Platform for Transactive Microgrids},
journal={ACM Transactions on Cyber-Physical Systems},
}
“Blockchains for Transactive Energy Systems: Opportunities, Challenges, and Approaches”
Scott Eisele, Carlos Barreto, Abhishek Dubey, Xenofon Koutsoukos, Taha Eghtesad,
Aron Laszka, Anastasia Mavridou
IEEE Computer, Accepted for Publication
PDF BibTeX
@article{eisele_blockchains,
author={Scott Eisele and Carlos Barreto and Abhishek Dubey and Xenofon Koutsoukos and Taha Eghtesad and Aron Laszka and Anastasia Mavridou},
title={Blockchains for Transactive Energy Systems: Opportunities, Challenges, and Approaches},
journal={IEEE Computer},
}
“Integrating Redundancy, Diversity, and Hardening to Improve Security of Industrial Internet of Things”
Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos
Cyber-Physical Systems, Volume 6, Issue 1, pp. 1 - 32, 2020
PDF Publisher BibTeX
@article{laszka2020integrating,
author={Aron Laszka and Waseem Abbas and Yevgeniy Vorobeychik and Xenofon Koutsoukos},
title={Integrating Redundancy, Diversity, and Hardening to Improve Security of Industrial Internet of Things},
journal={Cyber-Physical Systems},
publisher={Taylor \& Francis},
volume={6},
number={1},
pages={1--32},
year={2020},
}
“Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game”
Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos
Computers & Security [Impact Factor: 3.06 (2018)], Volume 87, pp. 101576, November 2019
PDF Publisher BibTeX
@article{laszka2019detection,
author={Aron Laszka and Waseem Abbas and Yevgeniy Vorobeychik and Xenofon Koutsoukos},
title={Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game},
journal={Computers \& Security},
publisher={Springer},
volume={87},
pages={101576},
year={2019},
month={November}
}
“Post-Incident Audits on Cyber Insurance Discounts”
Sakshyam Panda, Daniel W. Woods,
Aron Laszka, Andrew Fielder, Emmanouil Panaousis
Computers & Security [Impact Factor: 3.06 (2018)], Volume 87, pp. 101593, November 2019
PDF Publisher BibTeX
@article{panda2019post,
author={Sakshyam Panda and Daniel W. Woods and Aron Laszka and Andrew Fielder and Emmanouil Panaousis},
title={Post-Incident Audits on Cyber Insurance Discounts},
journal={Computers \& Security},
publisher={Springer},
volume={87},
pages={101593},
year={2019},
month={November}
}
“A Game-Theoretic Approach for Selecting Optimal Time-Dependent Thresholds for Anomaly Detection”
Amin Ghafouri,
Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos
Autonomous Agents and Multi-Agent Systems, Volume 33, Issue 4, pp. 430 - 456, July 2019
PDF Publisher BibTeX
@article{ghafouri2019game,
author={Amin Ghafouri and Aron Laszka and Waseem Abbas and Yevgeniy Vorobeychik and Xenofon Koutsoukos},
title={A Game-Theoretic Approach for Selecting Optimal Time-Dependent Thresholds for Anomaly Detection},
journal={Autonomous Agents and Multi-Agent Systems},
publisher={Springer},
volume={33},
number={4},
pages={430--456},
year={2019},
month={July}
}
“Database Audit Workload Prioritization via Game Theory”
Chao Yan, Bo Li, Yevgeniy Vorobeychik,
Aron Laszka, Daniel Fabbri, Bradley Malin
ACM Transactions on Privacy and Security, Volume 22, Issue 3, pp. 17:1 - 17:21, June 2019
PDF Publisher BibTeX
@article{yan2019database,
author={Chao Yan and Bo Li and Yevgeniy Vorobeychik and Aron Laszka and Daniel Fabbri and Bradley Malin},
title={Database Audit Workload Prioritization via Game Theory},
journal={ACM Transactions on Privacy and Security},
volume={22},
number={3},
pages={17:1--17:21},
year={2019},
month={June}
}
“A Game-Theoretic Approach for Integrity Assurance in Resource-Bounded Systems”
Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
International Journal of Information Security, Volume 17, Issue 2, pp. 221 - 242, 2018
PDF Publisher BibTeX
@article{laszka2018game,
author={Aron Laszka and Yevgeniy Vorobeychik and Xenofon Koutsoukos},
title={A Game-Theoretic Approach for Integrity Assurance in Resource-Bounded Systems},
journal={International Journal of Information Security},
publisher={Springer},
volume={17},
number={2},
pages={221--242},
year={2018},
}
“Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks”
Waseem Abbas,
Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
IEEE Transactions on Network Science and Engineering, Volume 5, Issue 1, pp. 65 - 78, 2018
PDF Publisher BibTeX
@article{abbas2018scheduling,
author={Waseem Abbas and Aron Laszka and Yevgeniy Vorobeychik and Xenofon Koutsoukos},
title={Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks},
journal={IEEE Transactions on Network Science and Engineering},
volume={5},
number={1},
pages={65--78},
year={2018},
}
“Improving Network Connectivity and Robustness Using Trusted Nodes with Application to Resilient Consensus”
Waseem Abbas,
Aron Laszka, Xenofon Koutsoukos
IEEE Transactions on Control of Network Systems, Volume 5, Issue 4, pp. 2036 - 2048, December 2018
PDF Publisher BibTeX
@article{abbas2018improving,
author={Waseem Abbas and Aron Laszka and Xenofon Koutsoukos},
title={Improving Network Connectivity and Robustness Using Trusted Nodes with Application to Resilient Consensus},
journal={IEEE Transactions on Control of Network Systems},
volume={5},
number={4},
pages={2036--2048},
year={2018},
month={December}
}
“Application-Aware Anomaly Detection of Sensor Measurements in Cyber-Physical Systems”
Amin Ghafouri,
Aron Laszka, Xenofon Koutsoukos
Sensors [5-Year Impact Factor: 3.014 (2017)], Volume 18, Issue 8, pp. 2448:1 - 2448:21, 2018
PDF Publisher BibTeX
@article{ghafouri2018application,
author={Amin Ghafouri and Aron Laszka and Xenofon Koutsoukos},
title={Application-Aware Anomaly Detection of Sensor Measurements in Cyber-Physical Systems},
journal={Sensors},
publisher={MDPI},
volume={18},
number={8},
pages={2448:1--2448:21},
year={2018},
}
“On the Assessment of Systematic Risk in Networked Systems”
Aron Laszka, Benjamin Johnson, Jens Grossklags
ACM Transactions on Internet Technology, Volume 18, Issue 4, pp. 48:1 - 48:28, November 2018
PDF BibTeX
@article{laszka2018assessment,
author={Aron Laszka and Benjamin Johnson and Jens Grossklags},
title={On the Assessment of Systematic Risk in Networked Systems},
journal={ACM Transactions on Internet Technology},
volume={18},
number={4},
pages={48:1--48:28},
year={2018},
month={November}
}
“SURE: A Modeling and Simulation Integration Platform for Evaluation of SecUre and REsilient Cyber-Physical Systems”
Xenofon Koutsoukos, Gabor Karsai,
Aron Laszka, Himanshu Neema, Bradley Potteiger, Peter Volgyesi, Yevgeniy Vorobeychik, Janos Sztipanovits
Proceedings of the IEEE [Impact Factor: 9.11 (2016)], Volume 106, Issue 1, pp. 93 - 112, January 2018
Publisher
“Devising Effective Policies for Bug-Bounty Platforms and Security Vulnerability Discovery”
Mingyi Zhao,
Aron Laszka, Jens Grossklags
Journal of Information Policy, Volume 7, pp. 372 - 418, 2017
PDF Publisher BibTeX
@article{zhao2017devising,
author={Mingyi Zhao and Aron Laszka and Jens Grossklags},
title={Devising Effective Policies for Bug-Bounty Platforms and Security Vulnerability Discovery},
journal={Journal of Information Policy},
publisher={Penn State University Press},
volume={7},
pages={372--418},
year={2017},
}
“Monitoring Stealthy Diffusions”
Nika Haghtalab,
Aron Laszka, Ariel Procaccia, Yevgeniy Vorobeychik, Xenofon Koutsoukos
Knowledge and Information Systems [Impact Factor: 2.25 (2017)], Volume 52, Issue 3, pp. 657 - 685, September 2017
PDF Publisher BibTeX
@article{haghtalab2017monitoring,
author={Nika Haghtalab and Aron Laszka and Ariel Procaccia and Yevgeniy Vorobeychik and Xenofon Koutsoukos},
title={Monitoring Stealthy Diffusions},
journal={Knowledge and Information Systems},
publisher={Springer},
volume={52},
number={3},
pages={657--685},
year={2017},
month={September}
}
“Scheduling Battery-Powered Sensor Networks for Minimizing Detection Delays”
Aron Laszka, Waseem Abbas, Xenofon Koutsoukos
IEEE Communications Letters [Impact Factor: 2.72], Volume 21, Issue 4, pp. 789 - 792, April 2017
PDF Publisher BibTeX
@article{laszka2017scheduling,
author={Aron Laszka and Waseem Abbas and Xenofon Koutsoukos},
title={Scheduling Battery-Powered Sensor Networks for Minimizing Detection Delays},
journal={IEEE Communications Letters},
volume={21},
number={4},
pages={789--792},
year={2017},
month={April}
}
“Adaptive Steganography and Steganalysis with Fixed-Size Embedding”
Benjamin Johnson, Pascal Schöttle,
Aron Laszka, Jens Grossklags, Rainer Böhme
Transactions on Data Hiding and Multimedia Security, Volume 10, pp. 69 - 91, April 2015
PDF Publisher BibTeX
@article{johnson2015adaptive,
author={Benjamin Johnson and Pascal Schottle and Aron Laszka and Jens Grossklags and Rainer Bohme},
title={Adaptive Steganography and Steganalysis with Fixed-Size Embedding},
journal={Transactions on Data Hiding and Multimedia Security},
publisher={Springer},
volume={10},
pages={69--91},
year={2015},
month={April}
}
“Network Topology Vulnerability/Cost Tradeoff: Model, Application, and Computational Complexity”
Aron Laszka, Assane Gueye
Internet Mathematics, Volume 11, Issue 6, pp. 588 - 626, February 2015
PDF Publisher BibTeX
@article{laszka2015network,
author={Aron Laszka and Assane Gueye},
title={Network Topology Vulnerability/Cost Tradeoff: Model, Application, and Computational Complexity},
journal={Internet Mathematics},
publisher={Taylor \& Francis},
volume={11},
number={6},
pages={588--626},
year={2015},
month={February}
}
“Secure Team Composition to Thwart Insider Threats and Cyberespionage”
Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme
ACM Transactions on Internet Technology, Volume 14, Issue 2-3, pp. 19:1 - 19:22, October 2014
PDF Publisher BibTeX
@article{laszka2014secure,
author={Aron Laszka and Benjamin Johnson and Pascal Schottle and Jens Grossklags and Rainer Bohme},
title={Secure Team Composition to Thwart Insider Threats and Cyberespionage},
journal={ACM Transactions on Internet Technology},
volume={14},
number={2-3},
pages={19:1--19:22},
year={2014},
month={October}
}
“A Survey of Interdependent Information Security Games”
Aron Laszka, Mark Felegyhazi, Levente Buttyán
ACM Computing Surveys [Impact Factor: 6.75], Volume 47, Issue 2, pp. 23:1 - 23:38, August 2014
(see also CrySyS Lab Technical Report No. CRYSYS-TR-2012-11-15:
A Survey of Interdependent Security Games)
PDF Publisher BibTeX
@article{laszka2014survey,
author={Aron Laszka and Mark Felegyhazi and Levente Buttyan},
title={A Survey of Interdependent Information Security Games},
journal={ACM Computing Surveys},
volume={47},
number={2},
pages={23:1--23:38},
year={2014},
month={August}
}
“Modeling Content-Adaptive Steganography with Detection Costs as a Quasi-Zero-Sum Game”
Aron Laszka, Adam Foldes
Infocommunications Journal, Volume 5, Issue 4, pp. 33 - 43, December 2013
PDF BibTeX
@article{laszka2013modeling,
author={Aron Laszka and Adam Foldes},
title={Modeling Content-Adaptive Steganography with Detection Costs as a Quasi-Zero-Sum Game},
journal={Infocommunications Journal},
volume={5},
number={4},
pages={33--43},
year={2013},
month={December}
}
“Designing Robust Network Topologies for Wireless Sensor Networks in Adversarial Environments”
Aron Laszka, Levente Buttyán, Dávid Szeszlér
Pervasive and Mobile Computing [Impact Factor: 2.35], Volume 9, Issue 4, pp. 546 - 563, August 2013
PDF Publisher BibTeX
@article{laszka2013designing,
author={Aron Laszka and Levente Buttyan and David Szeszler},
title={Designing Robust Network Topologies for Wireless Sensor Networks in Adversarial Environments},
journal={Pervasive and Mobile Computing},
publisher={Elsevier},
volume={9},
number={4},
pages={546--563},
year={2013},
month={August}
}