Cybersecurity

The Complexity of Estimating Systematic Risk in Networks

How Many Down? Toward Understanding Systematic Risk in Networks

Estimating Systematic Risk in Real-World Networks

Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools

Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks

Modeling Content-Adaptive Steganography with Detection Costs as a Quasi-Zero-Sum Game

Recently, content-adaptive steganography was modeled by Johnson et al. as a stochastic, two-player, zero-sum game between a steganographer and a steganalyst. To model economically rational steganalysts, we generalize this model by introducing a …

Mitigation of Targeted and Non-Targeted Covert Attacks as a Timing Game

Quantifying Network Topology Robustness Under Budget Constraints: General Model and Computational Complexity

Bitspotting: Detecting Optimal Adaptive Steganography

A Game-Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding