- Network Security and Intrusion Detection
- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Complex Network Analysis Techniques
- Advanced Malware Detection Techniques
- Information and Cyber Security
- Access Control and Trust
- Software-Defined Networks and 5G
- Opinion Dynamics and Social Influence
- Bayesian Modeling and Causal Inference
- Misinformation and Its Impacts
- Security in Wireless Sensor Networks
- Adversarial Robustness in Machine Learning
- Smart Grid Security and Resilience
- Distributed systems and fault tolerance
- Topic Modeling
- Anomaly Detection Techniques and Applications
- Privacy-Preserving Technologies in Data
- Advanced Graph Neural Networks
- Vehicular Ad Hoc Networks (VANETs)
- Internet Traffic Analysis and Secure E-voting
- Explainable Artificial Intelligence (XAI)
- Cooperative Communication and Network Coding
- Caching and Content Delivery
- Energy Efficient Wireless Sensor Networks
Virginia Tech
2006-2024
National Security Agency
2024
The University of Western Australia
2021
Federico II University Hospital
2021
Institut Polytechnique de Paris
2021
The University of Queensland
2021
ORCID
2020
Ulsan National Institute of Science and Technology
2017-2019
DEVCOM Army Research Laboratory
2009-2018
SK Group (South Korea)
2014-2017
Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when collaboration or cooperation critical to achieving mission and system goals such as reliability, availability, scalability, reconfigurability. In defining managing military MANET, we must consider the interactions between composite cognitive, social, information communication networks, take into account severe resource constraints (e.g., computing power, energy, bandwidth, time), dynamics topology changes, node...
We propose a highly scalable cluster-based hierarchical trust management protocol for wireless sensor networks (WSNs) to effectively deal with selfish or malicious nodes. Unlike prior work, we consider multidimensional attributes derived from communication and social evaluate the overall of node. By means novel probability model, describe heterogeneous WSN comprising large number nodes vastly different quality service (QoS) behaviors objective yield "ground truth" node status. This serves as...
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades. However, nature of reactive security mechanisms has limitations because potential attackers cannot be prevented in advance. We are facing reality with proliferation persistent, advanced, intelligent attacks while defenders often way behind taking appropriate actions thwart attackers. The concept moving target (MTD) emerged proactive...
Delay tolerant networks (DTNs) are characterized by high end-to-end latency, frequent disconnection, and opportunistic communication over unreliable wireless links. In this paper, we design validate a dynamic trust management protocol for secure routing optimization in DTN environments the presence of well-behaved, selfish malicious nodes. We develop novel model-based methodology analysis our it via extensive simulation. Moreover, address management, i.e., determining applying best...
HBM (High Bandwidth Memory) is an emerging standard DRAM solution that can achieve breakthrough bandwidth of higher than 256GBps while reducing the power consumption as well. It has stacked architecture with core dies on top a base logic die, based TSV and die stacking technologies. In this paper, introduced comparison its generations provided. Also, packaging technology challenges to address reliability, thermal dissipation capability, maximum allowable package sizes, high throughput...
Machine learning (ML)-based intrusion detection system (IDS) approaches have been significantly applied and advanced the state-of-the-art security defense mechanisms. In smart grid computing environments, threats increased as shared networks are commonly used, along with associated vulnerabilities. However, compared to other network ML-based IDS research in a is relatively unexplored, although environment facing serious due its unique environmental this article, we conducted an extensive...
Many systems or applications have been developed for distributed environments with the goal of attaining multiple objectives in face environmental challenges such as high dynamics/hostility severe resource constraints (e.g., energy communications bandwidth). Often are conflicting each other, requiring optimal tradeoff analyses between objectives. This paper is mainly concerned how to model a system and optimize their performance. We first conduct comprehensive survey state-of-the-art...
We propose a trust-based intrusion detection scheme utilizing highly scalable hierarchical trust management protocol for clustered wireless sensor networks. Unlike existing work, we consider metric considering both quality of service (QoS) and social detecting malicious nodes. By statistically analyzing peer-to-peer evaluation results collected from nodes, each cluster head applies to assess the trustworthiness maliciousness nodes in its cluster. Cluster heads themselves are evaluated by...
Unmanned Aerial Vehicles (UAV)-based civilian or military applications become more critical to serving and/or missions. The significantly increased attention on UAV also has led security concerns particularly in the context of networked UAVs. Networked UAVs are vulnerable malicious attacks over open-air radio space and accordingly intrusion detection systems (IDSs) have been naturally derived deal with vulnerabilities attacks. In this paper, we briefly survey state-of-the-art IDS mechanisms...
Centrality metrics have been used in various networks, such as communication, social, biological, geographic, or contact networks. In particular, they order to study and analyze targeted attack behaviors investigated their effect on network resilience. Although a rich volume of centrality has developed for decades, limited set commonly use. This paper aims introduce existing discuss applicabilities performance based the results obtained from extensive simulation experiments encourage use...
Defensive deception is a promising approach for cyber defense. Via defensive deception, defender can anticipate and prevent attacks by misleading or luring an attacker, hiding some of its resources. Although garnering increasing research attention, there has not been systematic investigation key components, the underlying principles, tradeoffs in various problem settings. This survey focuses on centered game theory machine learning, since these are prominent families artificial intelligence...
InP quantum dots (QDs) are nontoxic emitters, which considered an alternative to CdSe-based QDs. However, the limited choice and high cost of P precursors have a negative impact on their practical applicability. In this work, we report large-scale synthesis highly luminescent InP@ZnS QDs from elemental precursor (P4), was simply synthesized via sublimation red powder. The size controlled by varying reaction parameters such as time temperature, type precursors. This way, photoluminescence...
The identification of vulnerabilities in a mission-critical system is one the challenges faced by cyber-physical (CPS). incorporation embedded Internet Things (IoT) devices makes it tedious to identify vulnerability and difficult control service-interruptions manage operations losses. Rule-based mechanisms have been considered as solution past. However, rule-based solutions operate on goodwill generated rules perform assumption-based detection. Such often far from actual realization IoT...
Moving target defense (MTD) has emerged as a proactive mechanism aiming to thwart potential attacker. The key underlying idea of MTD is increase uncertainty and confusion for attackers by changing the attack surface (i.e., system or network configurations) that can invalidate intelligence collected interrupt execution; ultimately leading failure. Recently, significant advance software-defined networking (SDN) technology enabled several complex operations be highly flexible robust;...
Thanks to graph neural networks (GNNs), semi-supervised node classification has shown the state-of-the-art performance in data. However, GNNs have not considered different types of uncertainties associated with class probabilities minimize risk increasing misclassification under uncertainty real life. In this work, we propose a multi-source framework using GNN that reflects various predictive both deep learning and belief/evidence theory domains for predictions. By collecting evidence from...
We propose end-to-end multimodal fact-checking and explanation generation, where the input is a claim large collection of web sources, including articles, images, videos, tweets, goal to assess truthfulness by retrieving relevant evidence predicting label (e.g., support, refute or not enough information), generate statement summarize explain reasoning ruling process. To support this research, we construct MOCHEG, large-scale dataset consisting 15,601 claims each annotated with statement,...
We propose and analyze a class of trust management protocols for encounter-based routing in delay tolerant networks (DTNs). The underlying idea is to incorporate evaluation the protocol, considering not only quality-of-service (QoS) properties (connectivity) but also social (honesty unselfishness) evaluate other nodes encountered. Two versions are considered: an equal-weight QoS protocol (called trust-based routing) connectivity-based routing). By utilizing stochastic Petri net model...
For mission-oriented mobile group systems designed to continue mission execution in hostile environments the presence of security attacks, it is critical properly deploy intrusion detection techniques cope with insider attacks enhance system reliability. In this paper, we analyze effect (IDS) on reliability a communication consisting groups set out for ad hoc networks. Unlike common belief that IDS should be executed as often possible prolong lifetime, discover at an optimal rate maximize...
Network address shuffling is one of moving target defense (MTD) techniques that can invalidate the information attackers have collected based on current network IP configuration.We propose a software-defined networking-based MTD technique called Flexible Random Virtual Multiplexing, namely FRVM, which aims to defend against reconnaissance and scanning attacks.FRVM enables host machine multiple, random, time-varying virtual addresses, are multiplexed real host.Multiplexing or de-multiplexing...
Delay tolerant networks (DTNs) are often encountered in military network environments where end-to-end connectivity is not guaranteed due to frequent disconnection or delay. This work proposes a provenance-based trust framework, namely PROVEST (PROVEnance-baSed Trust model) that aims achieve accurate peer-to-peer assessment and maximize the delivery of correct messages received by destination nodes while minimizing message delay communication cost under resource-constrained environments....
We propose a context-aware trust management model called CATrust for service-oriented ad hoc networks such as peer-to-peer and Internet of Things wherein node can be service requester or provider. The novelty our design lies in the use logistic regression to dynamically estimate trustworthiness provider based on its behavior patterns response context environment changes. develop recommendation filtering mechanism effectively screen out dishonest recommendations even extremely hostile...
We develop and analyze a trust management protocol for cognitive mission-driven group communication systems (GCSs) in mobile ad hoc networks (MANETs) using hierarchical modeling techniques based on stochastic Petri nets. The goal is to efficiently establish acceptable levels among nodes without prior interactions. seek identify the optimal length of chain peers Web so as maximize chain, by trading off space level. network can dynamically adapt changing environments adjusting their design...