Formal Methods for Security Configuration Verification & Synthesis: Automated verification, synthesis and evaluation of network access control enforcement in the following domains:
enterprise networks,
Software-Defined Networks,
Internet of Things,
Clouds and Data Centers
Smart Grids, and Industry Control Systems, and
Wireless Sensor Networks.
Cyber Agility for Deterrence and Deception
Provably-safe moving target defense
Autonomous & Dynamic Cyber Deception
Cyber & Cyber-Physical System Resiliency:
Science of Resilience: Metrics, verification and synthesis
Verification and synthesis of resilient systems using reactive policies,
IoT configuration verification and hardening
K-resilience for SCADA Systems
Data-driven Cybersecurity Analytics:
Text analytics of cyber threat intelligence,
Predictive threat and prioritization analytics
Quantitative risk assessment
Fault detection and diagnosis in large-scale networks