The National Academies Logo
Research Associateship Programs
Fellowships Office
Policy and Global Affairs

Participating Agencies - ARL/USMA

  Sign InPrintable View

Opportunity at Davies Teaching Fellowships (ARL/USMA)

Mathematical Approaches to Cyber Physical System Security


MD and NM-Computational and Information Sciences-FFP, Computational and Information Sciences Directorate - FFP

RO# Location
AA.36.02.C0071 Adelphi, MD 207831197


Name E-mail Phone
Kamhoua, Charles A 301.394.5963


Cyber Physical Systems (CPSs) are embedded systems that consist of computing elements and physical processes. Of particular interests are the security of Internet of Things (IoT), sensors networks, wearable devices, mobile phones, robots, autonomous vehicles, and smart cities. These IoT devices are most often designed without considering security. Unprotected IoT devices can be used as “stepping stones” by attackers to launch more sophisticated attacks such as advanced persistent threats (APTs). A later stage of APT is the “lateral movement” stage, where attackers use benign computer features to move step-by-step deeper into the network in a stealthy manner.

Emphasis is placed on research related to new techniques for the prediction, prevention, detection, resilience, survival, and recovery from IoT attack. This effort pursues mathematical excellence in the following relevant areas which impact IoT cybersecurity: APT; cyber deception; IoT defense-in-depth; and end-to-end determination of security assurance. Theoretical constructs or mathematical abstractions provide a rigorous scientific basis for cyber security because they allow for reasoning quantitatively about cyber-attacks. This opportunity involves the use of several mathematical approaches, including game theory, to capture the strategic behavior of malicious adversaries and automatically formulate the optimum policies; graph theory to build and formalize attack-graphs; and adversarial machine learning for adaptation to dynamic change in operating scenario. Limited rationality, incomplete information, imperfect monitoring in distributed networks are among the challenges to be considered.



Kamdem G, Kamhoua C, Lu Y, Shetty S, Njilla L: "A Markov Game Theoritic Approach for Power Grid Security". 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), Atlanta, GA, 2017, pp. 139-144

Cuong TD, Nguyen HT, Choongseon H, Kamhoua CA, Kevin A. Kwiat KA, Blasch E, Ren S, Pissinou N, Iyengar SS: Game theory for cyber security and privacy. ACM Computing Surveys 50(2): Article 30, 37 pages, May 2017


Cyber physical systems; Internet of Things; Sensors networks; Cyber security; Cyber deception; Cyber resilience; Game theory; Graph theory; Machine learning;


Citizenship:  Open to U.S. citizens
Level:  Open to Postdoctoral applicants
Copyright © 2014. National Academy of Sciences. All rights reserved. 500 Fifth St. N.W., Washington, D.C. 20001.
Terms of Use and Privacy Statement.