Research Expertise 

Teaching
Research

Publications
Contributions
​Projects & Tools
Invited Talks & Panels
Professional Services
Students & Supervision

  •  Formal Methods for Security Configuration Verification & Synthesis: ​​Automated  verification, synthesis and evaluation of network access control enforcement in the following domains:
    • enterprise networks,
    • Software-Defined Networks,
    • Internet of Things,
    • Clouds and Data Centers
    • Smart Grids, and Industry Control Systems, and
    • Wireless Sensor Networks.
  • Cyber Agility for Deterrence and Deception 
    • Provably-safe moving target defense
    • Autonomous & Dynamic Cyber Deception
  • Cyber & Cyber-Physical System Resiliency: 
    • Science of Resilience: Metrics, verification and synthesis
    • Verification and synthesis of resilient systems using reactive policies,
    • IoT configuration verification and hardening
    • K-resilience for SCADA Systems
  • Data-driven Cybersecurity Analytics:
    • Text analytics of cyber threat intelligence,
    • Predictive threat and prioritization analytics
    • Quantitative risk assessment
    • Fault detection and diagnosis in large-scale networks
  • Cyber Defense Automation:
    • Adaptive DDoS defense
    • Dynamic Course-of-action Playbooks
    • Bio-inspired Automated Cyber Defense
    • Automated risk assessment and mitigation
    • Adaptive tuning of intrusion detection systems