Projects per year

## Fingerprint The fingerprint is based on mining the text of the scientific documents related to the associated persons. Based on that an index of weighted terms is created, which defines the key subjects of research unit

Graph in graph theory
Mathematics

Competition Graph
Mathematics

Data mining
Engineering & Materials Science

Scale-free Networks
Mathematics

Coloring
Engineering & Materials Science

Privacy
Mathematics

Privacy Preserving
Mathematics

Vertex of a graph
Mathematics

##
Network
Recent external collaboration on country level. Dive into details by clicking on the dots.

## Profiles

## Tamra Carpenter

- Center for Discrete Mathematics and Theoretical Computer Science (DIMACS) - RESEARCH PROFESSOR

Person

## Margaret Cozzens

- Center for Discrete Mathematics and Theoretical Computer Science (DIMACS) - DISTINGUISHED RESEARCH PROF AY

Person

## Dennis Egan

- Center for Discrete Mathematics and Theoretical Computer Science (DIMACS) - RESEARCH PROFESSOR I CAL YR

Person

## Projects 2007 2020

## Rcn: Dimacs/Simons Collaboration On Bridging Continuous And Discrete Optimization

National Science Foundation (NSF)

9/15/17 → 8/31/20

Project: Research project

Finance

Supply chains

Learning systems

Logistics

Momentum

## Mathematical And Computational Methods For Planning A Sustainable Future Ii

National Science Foundation (NSF)

7/15/15 → 6/30/19

Project: Research project

mathematics

engineering

planning

science

learning

## Circle: Catalyzing And Integrating Research, Collaboration, And Learning In Computing, Mathematics, And Their Applications

National Science Foundation (NSF)

8/15/14 → 7/31/19

Project: Research project

mathematics

learning

sustainability

infrastructure

mentoring

## Research Output 1967 2019

## A case study in tailoring a bio-inspired cyber-security algorithm: Designing anomaly detection for multilayer networks

Suárez, G. P., Gallos, L. & Fefferman, N. H., Jan 1 2019, In : Journal of Cyber Security and Mobility. 8, 1, p. 113-132 20 p.Research output: Contribution to journal › Article

Multilayers

Network protocols

Network layers

Denial-of-service attack

## A case study in tailoring a bio-inspired cyber-security algorithm: Designing anomaly detection for multilayer networks

Suárez, G., Gallos, L. & Fefferman, N. H., Aug 2 2018,*Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018.*Institute of Electrical and Electronics Engineers Inc., p. 281-286 6 p. 8424661

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

Multilayers

Network protocols

Network layers

Denial-of-service attack

1
Citation
(Scopus)

## From keys to databases-real-world applications of secure multi-party computation

Archer, D. W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J. I., Smart, N. P. & Wright, R., Dec 1 2018, In : Computer Journal. 61, 12, p. 1749-1771 23 p.Research output: Contribution to journal › Article