ACTIVE projects
Hardening Network Configurations in the Face of Zero-Day Vulnerabilities - GMUCyberARM: CYBER DEFENSE MATRIX for Resilient Cost-Effective Cybersecurity Planning -UNCC |
Adaptive Cyber Deception - UNCCThreatZoom: OPTIMAL RISK MITIGATION USING Fine-grain Cours of Actions - UNCC |
A COURSE ON CERTIFIED ETHICAL HACKING - GMUPredictive Analytics for Cyber Threat Intelligence - UNCC |
Real-Time Attack Detection in Cyber-Physical Systems - CSUSecure IoT Information Flow Control Model |
Network Function Virtualization - CSU
|
Privacy Preserving Record Linkage - CSU |
Previous PROJECTS
(Transition-to-Practice)
Real-Time Detection and Mitigation of Low and Slow DDoS Attacks - UNCC
Analytical Verification of Cloud Configurations by Users - GMU |
Integrated Risk Analytics Using XCCDF and Network Configuration - UNCCAUTOMOTIVE Security - GMU |
Data-Driven Analytics for Exploring PREDICT Network Datasets and Threat Sharing - UNCCMultilayer cyber agility |
Prospective Projects
From stix sharing to automated threat intelligence & response -UNCCCyber Deception Triangle - UNCCMeasuring Enforcement of 20 Top Critical Security Controls (Metrics & METHODs) - UNCC & GMU |
Automated Security Hardening of IoT using Data-Driven Analytics - UNCCAutomated Mitigation of malicious application logic - UNCCSTIX Generator - UNCC |
Cyber Agility for Proactive Defense - UNCCDeveloping serious virtual video games for Cultivating Cybersecurity Expertise - UNCC |