Research concentrates on understanding and exploiting interactions of information with cyber attackers – human and/or intelligent agents. These interactions involve friendly operations against adversary information systems and networks, defense of friendly information systems and networks, and assurance of persistent information support to Soldiers even when parts of the friendly systems and networks are compromised.
Networked Trust and Its Impact on Security (ALC)
Develop models of networked trust and its impact on cybersecurity, and experimental validation with a mixture of agent models and HiTL testing.
Network Science Research Lab (ALC)
Live test bed for monitoring, collecting, and testing computer networks.
Learning and Detection (ALC)
Enhance and explore detection capabilities using statistical, machine learning, and graph theoretic approaches that will result in a fundamental understanding of the limits of cyber threat detection. Develop on-device real-time protection against emerging threats that can be tailored to both mission requirements and device capabilities
Edward Colbert, email@example.com, (301) 394-1674
Risk Modeling (ALC)
Develop mathematical models and approaches to measure user, defender and/or attacker behavior, cognitive processes and limitations. Develop a holistic, dynamic, predictive risk model that identifies most relevant risk parameters, includes humans, to mission objectives and provide courses of action to achieve an optimal/sub-optimal mission endstate.
Hasan Cam, firstname.lastname@example.org, (301) 394-2871