Mathematics and statistics
group_project
Submitted by Laura Albert on Thu, 01/04/2018 - 12:52pm
Our nation's information technology (IT) infrastructure is vulnerable to numerous security risks, including security vulnerabilities within the IT supply chain. This research addresses the cyber-security risks and vulnerabilities that exist in the Federal IT infrastructure. It will provide new insights for prioritizing and deploying IT security mitigations in a budget-constrained environment. It will also develop tools that can be used by Federal decision-makers and other large organizations which make investments.
group_project
Submitted by William Adams on Wed, 01/03/2018 - 3:04pm
The modernized electric grid, the Smart Grid, integrates two-way communication technologies across power generation, transmission and distribution, in order to deliver electricity efficiently, securely and cost-effectively. On the monitoring and control side, it employs real-time monitoring offered by a messaging-based advanced metering infrastructure (AMI), which ensures the grid's stability and reliability, as well as the efficient implementation of demand response schemes to mitigate bursts demand.
group_project
Submitted by Nadia Heninger on Wed, 01/03/2018 - 2:47pm
The primary goal of this project is to develop a mathematical foundation underlying the analysis of modern cryptosystems. Cryptography is a core tool used to secure communications over the Internet. Secure and trustworthy communications and data storage are essential to national security and to the functioning of the world economy. Recent spectacular research results have enabled the development of new types of cryptography, exciting new potential applications, and hopes for stronger guarantees of cryptographic security in the long term.
group_project
Submitted by Harry Crane on Wed, 01/03/2018 - 2:13pm
The project examines the structure and function of dynamic networks by formulating and analyzing probabilistic models for temporally evolving networks and processes occurring on them. In addition, the project seeks practical and efficient statistical methods for network inference. The project is primarily motivated by national security concerns surrounding counter-terrorism and cybersecurity, but outcomes should be directly relevant in biological, social, and physical science applications as well as mathematical areas of probability theory, combinatorics, and graph theory.
group_project
Submitted by Joerg Kliewer on Wed, 01/03/2018 - 2:00pm
Today's world is highly dependent on the integrity of communication systems as the Internet, WiFi, or cellular networks. As networks become more pervasive, they are increasingly being used for communication and storage of critical as well as sensitive data and therefore impose more stringent demands on reliability and security, which must be maintained even under extreme settings such as partial power failures, natural disasters, or, most importantly, adversarial attacks.
group_project
Submitted by Matthieu Bloch on Wed, 01/03/2018 - 1:31pm
The widespread development of communication networks has profoundly transformed our society, resulting in a significant increase in productivity and efficiency. However, the benefits of this increased connectivity are today also counterbalanced by the ease with which malicious individuals can interfere or tamper with sensitive data and information. The past decade has thus witnessed a growing concern for the issues of privacy, confidentiality, and integrity of communications.
group_project
Submitted by Jerry Cheng on Tue, 01/02/2018 - 3:50pm
This project aims to address privacy concerns of smartphone users. In particular, it investigates how the usages of the smartphone applications (apps) may reshape users' privacy perceptions and what is the implication of such reshaping. There has been recent work that investigates privacy leakage and potential defense mechanisms. However, so far there is only limited understanding on the consequences of such privacy losses, especially when large amount of privacy information leaked from smartphone users across many apps.
group_project
Submitted by Seth Pettie on Thu, 12/21/2017 - 2:34pm
Consider a network where each node is either good or bad. The good nodes all run an algorithm that attempts to achieve a specific goal. The hidden set of bad nodes are controlled by an adversary who uses them to thwart this goal.
group_project
Submitted by George Kesidis on Wed, 12/20/2017 - 6:16pm
For nearly 40 years, the United States has faced a critical problem: increasing demand for energy has outstripped the ability of the systems and markets that supply power. Today, a variety of promising new technologies offer a solution to this problem. Clean, renewable power generation, such as solar and wind are increasingly available. Hybrid and plug-in electric vehicles offer greater energy efficiency in transportation.
group_project
Submitted by ozankoy on Tue, 12/19/2017 - 2:21pm
A wide range of cloud services and applications operate on sensitive data such as business, personal, and governmental information. This renders security and privacy as the most critical concerns in the cloud era. The objective of this project is to question the separation approach in the design of security and reliability features of storage systems, and to investigate new, coding-based security mechanisms based on a joint-design principle. The proposed program will result in a myriad of outcomes.