Home   /   Research

My Projects

Recent Publications

A complete list of publications will be added soon. In the meantime, see my Google Scholar profile.

 

H. Soroush, M. Albanese, M. Asgari Mehrabadi, I. Iganibo, M. Mosko, J. Gao, D. Fritz, S. Rane, and E. Bier, “SCIBORG: Secure Configurations for the IOT Based on Optimization and Reasoning on Graphs,” in Proceedings of the 8th IEEE Conference on Communications and Network Security (IEEE CNS 2020), virtual conference, June 29 - July 1, 2020. [Best paper award]

 

L. H. Pham, M. Albanese, R. Chadha, C.-Y. Chiang, S. Venkatesan, C. A. Kamhoua, and N. Leslie, “A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses,” in Proceedings of the 8th IEEE Conference on Communications and Network Security (IEEE CNS 2020), virtual conference, June 29 - July 1, 2020.

 

H. Soroush, S. Rane, and M. Albanese, “Securing Distributed System Configuration through Optimization and Reasoning on Graphs,” in Proceedings of the Network and Distributed Systems Security Symposium (NDSS 2019), San Diego, CA, USA, February 24-27, 2019. [Poster]

 

S. Venkatesan, M. Albanese, C.-Y. J. Chiang, A. Sapello, and R. Chadha, “DeBot: A Novel Network-based Mechanism to Detect Exfiltration by Architectural Stealthy Botnets,” Wiley Security and Privacy, vol. 1, no. 6, November/December 2018.

 

S. Sugrim, S. Venkatesan, J. Youzwak, C.-Y. Chiang, R. Chadha, M. Albanese, and H. Cam, “Measuring the Effectiveness of Network Deception,” in Proceedings of IEEE Intelligence and Security Informatics (ISI 2018), pages 142-147, Miami, FL, USA, November 8-10, 2018.

 

W. Connell, D. MenascĂ©, and M. Albanese, “Performance Modeling of Moving Target Defenses with Reconfiguration Limits,” IEEE Transactions on Dependable and Secure Computing, November 2018.

 

C.-Y. J. Chiang, S. Venkatesan, S. Sugrim, J. A. Youzwak,  R. Chadha, E. I. Colbert, H. Cam, and M. Albanese, “On Defensive Cyber Deception: A Case Study Using SDN,” in Proceedings of the 2018 IEEE Military Communications Conference (MILCOM 2018), pages 110-115, Los Angeles, CA, USA, October 29-31, 2018.

 

L. H. Pham, M. Albanese, and B. W. Priest, “A Quantitative Framework to Model Advanced Persistent Threats,” in Proceedings of the 15th International Conference on Security and Cryptography (SECRYPT 2018), pages 282-293, Porto, Portugal, July 26-28, 2018. [Best paper award]

 

M. Albanese, S. Jajodia, and S. Venkatesan, “Defending from Stealthy Botnets Using Moving Target Defenses,” IEEE Security and Privacy Magazine, vol. 16, no. 1, pages 92-97, January/February 2018.

 

M. Albanese and Sushil Jajodia, “A Graphical Model to Assess the Impact of Multi-Step Attacks,” Journal of Defense Modeling and Simulation, vol. 15, no. 1, pages 79-93, January 2018.