Center for Configuration Analytics and Automation
Ehab Al-Shaer (UNCC)
Sushil Jajodia (GMU)
Indrakshi Ray (CSU)
April IAB Meeting 2017
Projects & Tools
Invited Talks & Panels
Methods for Security Configuration Verification & Synthesis:
Automated security configuration synthesis, verification, evaluation, and enforcement for
Internet of Things,
Clouds and Data Centers
Smart Grids, and Industry Control Systems, and
Wireless Sensor Networks.
Cyber Agility for Deterrence and Deception
Adaptive moving target defense,
Active cyber deception for dynamic deflection, discovery, and distortion.
Cyber & Cyber-Physical System
Verification and synthesis of resilient systems using reactive policies,
Dynamic cyber resistance,
Data-driven Cybersecurity Analytics
Text analytics of cyber threat intelligence,
Predictive threat analytics,
Quantitative risk assessment,
Intrusion/fault detection and diagnosis, and DDoS mitigation.
Cyber Defense Automation
Automated risk mitigation,
Adaptive tuning of intrusion detection,
Course-of-action mitigiation generation,
Adaptive and active cyber defense, defense composition,
STIX-based actuation, and
Reactive polices for auto-resilient defense.