NRC Research Associate Programs
Fellowships Office
Policy and Global Affairs

Participating Agencies

  sign inOpen Printer View

RAP opportunity at Air Force Research Laboratory     AFRL

Advanced Solutions to Mitigate Threats in Cyber Domain

Location

Information Directorate, RI/Cyber Operations

opportunity location
13.20.95.C0421 Rome, NY 134414514

Advisers

name email phone
Laurent Lavoisier Njilla Laurent.njilla@us.af.mil 315-709-7066

Description

Securing cyberspace needs innovative mathematical concept models that consider practical scenarios such as incomplete/imperfect information and imperfect monitoring. Moreover, the wireless network security has its challenges such as as node mobility, situation awareness, and computational complexity that are critical to its success. Furthermore, for making decisions on security investments, special attention should be given to the accurate value-added quantification of network security. New computing paradigms, such as cloud computing, should also be investigated for security investments.

The security landscape is becoming more sophisticated with the emergence of new communication technology platforms and information, such as mobile computing, cloud computing, online social networks, cyber physical system and the Internet of Things (IoT). The persistence, complexity, and capabilities of todays adversaries are limitless, and their threat does not only affect individuals or organizations, but also nations.

Traditional firewalls are not sufficient to ensure the security of computer networks. Due to the interconnection of numerous networks, cyberspace is becoming vulnerable to cyber attacks. There is a need to strike a balance between firewalls and other protective mechanisms. Amongst these mechanisms, intrusion detection and the profiling of attackers are mostly used despite their limitations. However, some data mining techniques such as deep neural networks or clustering and machine learning can be used. The use of Process mining techniques combined with game theoretic concepts can bridge the gap for discovering security breaches and learning the attackers’ modus operandi.

This research opportunity is interested in applying new techniques such as Category theory, channel theory, control theory and information flow to tackle threat in the cyber domain. The aim to provide solutions or modeling approaches to aid decision-making. The associates will work in relation to the AFRL/RI in-house basic research project entitled “Strategic And Tactical Utility Running Nonstop - SATURN” that is funded by AFOSR.

Reference:

H. Zhao, et al., “Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection”, IEEE Transactions on Dependable and Secure Computing, TDSC.2018.2864733, August 2018.

C. Kamhoua, et al., “Modeling and Design of Secure Internet of Things”, Wiley-IEEE Computer Society, 1st edition, ISBN: 978-1119593362

key words
Cyber Security; Cloud Computing; Hardware Security; Network Security; MANET; Game Theory; Category Theory; Cyber Threat Information; Information Theory; Channel Theory; Control Theory; Machine Learning; Deep Learning; Blockchain Technology; Internet of Things

Eligibility

Citizenship:  Open to U.S. citizens
Level:  Open to Postdoctoral and Senior applicants

Stipend

Base Stipend Travel Allotment Supplementation
$80,000.00 $5,000.00

$3,000 Supplement for Doctorates in Engineering & Computer Science

Experience Supplement:
Postdoctoral and Senior Associates will receive an appropriately higher stipend based on the number of years of experience past their PhD.

Copyright © 2024. National Academy of Sciences. All rights reserved.Terms of Use and Privacy Policy