Empirical game-theoretic methods for adaptive cyber-defense
MP Wellman, TH Nguyen, and M Wright
in S Jajodia et al. (Eds.): Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, LNCS 11830, pages 112–128, 2019.
Abstract
Game-theoretic applications in cyber-security are often restricted…
Deception in Finitely Repeated Security Games
TH Nguyen, Y Wang, A Sinha, and MP Wellman
33rd AAAI Conference on Artificial Intelligence, Jan/Feb 2019.
Abstract
Allocating resources to defend targets from attack is often complicated by uncertainty about the attacker’s capabilities,…
A Learning and Masking Approach to Secure Learning
L Nguyen, S Wang, and A Sinha
Ninth Conference on Decision and Game Theory for Security, October 2018.
Abstract
Deep Neural Networks (DNNs) have been shown to be vulnerable against adversarial examples, which are data points cleverly constructed…
Stackelberg Security Games: Looking Beyond a Decade of Success
A Sinha, F Fang, B An, C Kiekintveld, and M Tambe
27th International Joint Conference on Artificial Intelligence, July 2018.
Abstract
The Stackelberg Security Game (SSG) model has been immensely influential in security research since it…
Mason Wright Defends Thesis Proposal
Mason Wright successfully defended his thesis proposal last week: Stable Profiles in Simulation-Based Games via Reinforcement Learning and Statistics.
Congratulations, Mason.
Multi-stage attack graph security games: Heuristic strategies, with empirical game-theoretic analysis
TH Nguyen, M Wright, MP Wellman, and S Singh
Security and Communication Networks, Article ID 2864873, 28 pages, 2018.
Extended version of a paper presented at the Fourth ACM Workshop on Moving Target Defense, Oct 2017.
Abstract
We study…
A Stackelberg game model for botnet data exfilitration
TH Nguyen, MP Wellman, and S Singh
8th Conference on Decision and Game Theory for Security (GameSec), pages 151–170, Oct 2017.
Abstract
Cyber-criminals can distribute malware to control computers on a networked system and leverage these…
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation
G Cybenko, S Jajodia, MP Wellman, and P Liu
In: Prakash A., Shyamasundar R. (eds) Information Systems Security. ICISS 2014. Lecture Notes in Computer Science, vol 8880. Springer.
Abstract
Today’s cyber defenses are largely static. They…
SoK: Security and Privacy in Machine Learning
N Papernot, P McDaniel, A Sinha, and MP Wellman
Third IEEE European Symposium on Security and Privacy, April 2018.
Abstract
Advances in machine learning (ML) in recent years have enabled a dizzying array of applications such as data analytics,…
A Moving Target Defense Approach to Mitigate DDoS Attacks against Proxy-Based Architectures
S Venkatesan, M Albanese, K Amin, S Jajodia, and M Wright
IEEE Conference on Communications and Network Security, Oct 2016.
Abstract
Distributed Denial of Service attacks against high-profile targets have become more frequent in recent…