Cybersecurity

Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments

Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms

Optimal Thresholds for Intrusion Detection Systems

Vulnerability of Transportation Networks to Traffic-Signal Tampering

Multi-Defender Strategic Filtering Against Spear-Phishing Attacks

Resilient Observation Selection in Adversarial Settings

Games of Timing for Security in Dynamic Environments

Monitoring Stealthy Diffusion

Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems

Should Cyber-Insurance Providers Invest in Software Security?