Skip to main content

Cross-Cutting Thrusts: Next Generation Threat Prediction and Response

Projects List

Accountable Mobile Computing Framework Based on User Behavior Modeling
Research Area: Secure Home Computing | Mobility | Privacy Protection | Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researchers: Martin Griss, Anind Dey, Joy Zhang

Adaptive Strategies for Cross-Layer Jamming and Anti-Jamming
Research Area: Next Generation Secure and Available Networks
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researcher: Patrick Tague

Attacking and Defending Unreliable Hardware
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researcher: Onur Mutlu

Cross-Layer Self-Configuration for Secure and Resilient Networking
Research Area: Next Generation Secure and Available Networks
Cross Cutting Thrusts: Next Generation Threat Prediction and Response
Researcher: Patrick Tague

Efficient Data-Intensive Computing in Support of Security Applications
Research Area: Next Generation Secure and Available Networks | Survivable Distributed Systems
Cross Cutting Thrusts: Next Generation Threat Prediction and Response
Researcher: Dave Andersen

Empirically-Based Insider Threat Risk Assessment Diagnostic
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researchers: Andrew Moore, Dawn Cappelli

Exploratory R&D of a Technology-Driven Insider Threat Scoring Metric
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researchers: Andrew Moore, Randall Trzeciak

Inference-Based Adaptation Techniques for Next Generation Jamming and Anti-Jamming Capabilities
Research Area: Next Generation Secure and Available Networks
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researcher: Patrick Tague

Insider Threat Analysis Center
Cross Cutting Thrusts: Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researchers: Andrew Moore, Randall Trzeciak, Dawn Cappelli

MERIT ITL: The Insider Threat Lab
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications | Threat Analysis and Modeling | Next Generation Threat Prediction and Response
Researchers: Andrew Moore, Randall Trzeciak, Dawn Cappelli

Security Issues in Information Naming
Research Area: Secure Home Computing | Survivable Distributed Systems
Cross Cutting Thrusts: Next Generation Threat Prediction and Response
Researcher: Srinivasan Seshan

Security Patterns: Assurance for Secure Concurrent and Distributed Computing
Cross Cutting Thrusts: Software Security | Next Generation Threat Prediction and Response | Formal Methods
Researchers: William Scherlis, Jonathan Aldrich