Center for Discrete Mathematics and Theoretical Computer Science (DIMACS)

Research Output 1974 2019

2019

A case study in tailoring a bio-inspired cyber-security algorithm: Designing anomaly detection for multilayer networks

Suárez, G. P., Gallos, L. & Fefferman, N. H., Jan 1 2019, In : Journal of Cyber Security and Mobility. 8, 1, p. 113-132 20 p.

Research output: Contribution to journalArticle

Multilayers
Network protocols
Network layers
Denial-of-service attack

Dynamic Ad Hoc social networks in improvised intelligence/counter-intelligence exercises: A Department of Homeland security red-team blue-team live-action roleplay

Myers, K., Denegre, A., Gallos, L., Lemanski, N., Mayberry, A., Redere, A., Schwab, S., Stringham, O. & Fefferman, N. H., Jan 1 2019, In : Journal of Homeland Security and Emergency Management.

Research output: Contribution to journalArticle

National security
Homelands
intelligence
social network
Infiltration

Living-learning community for women in computer science at Rutgers

Wright, R., Nadler, S. J., Nguyen, T., Sanchez Gomez, C. N. & Wright, H. M., Feb 22 2019, SIGCSE 2019 - Proceedings of the 50th ACM Technical Symposium on Computer Science Education. Association for Computing Machinery, Inc, p. 286-292 7 p. (SIGCSE 2019 - Proceedings of the 50th ACM Technical Symposium on Computer Science Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

computer science
Computer science
learning
community
Group

Propinquity drives the emergence of network structure and density

Gallos, L. K., Havlin, S., Stanley, H. E. & Fefferman, N. H., Oct 8 2019, In : Proceedings of the National Academy of Sciences of the United States of America. 116, 41, p. 20360-20365 6 p.

Research output: Contribution to journalArticle

Open Access
2018

A case study in tailoring a bio-inspired cyber-security algorithm: Designing anomaly detection for multilayer networks

Suárez, G., Gallos, L. & Fefferman, N. H., Aug 2 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018. Institute of Electrical and Electronics Engineers Inc., p. 281-286 6 p. 8424661. (Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multilayers
Network protocols
Network layers
Denial-of-service attack
4 Citations (Scopus)

From keys to databases-real-world applications of secure multi-party computation

Archer, D. W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J. I., Smart, N. P. & Wright, R. N., Dec 1 2018, In : Computer Journal. 61, 12, p. 1749-1771 23 p.

Research output: Contribution to journalArticle

IGroup Learning and iDetect for Dynamic Anomaly Detection with Applications in Maritime Threat Detection

Cai, C., Chen, R., Liu, A. D., Roberts, F. & Xie, M., Dec 11 2018, Proceedings of 2018 10th International Conference on Knowledge and Systems Engineering, KSE 2018. Phuong, T. M. & Nguyen, M. L. (eds.). Institute of Electrical and Electronics Engineers Inc., 8573348. (Proceedings of 2018 10th International Conference on Knowledge and Systems Engineering, KSE 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Statistical methods
Threat
Anomaly detection
Early warning
Anomaly

IGroup Learning and iDetect for Dynamic Anomaly Detection with Applications in Maritime Threat Detection

Cai, C., Chen, R., Liu, A. D., Roberts, F. & Xie, M., Dec 12 2018, 2018 IEEE International Symposium on Technologies for Homeland Security, HST 2018. Institute of Electrical and Electronics Engineers Inc., 8574162. (2018 IEEE International Symposium on Technologies for Homeland Security, HST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

threat
learning
world economy
transportation system
statistical method

Using Noisy Binary Search for Differentially Private Anomaly Detection

Bittner, D. M., Sarwate, A. & Wright, R., Jan 1 2018, Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Proceedings. Dinur, I., Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 20-37 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10879 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary search
Anomaly Detection
Group Testing
Privacy
Anomalous
2017
3 Citations (Scopus)

Anomaly detection through information sharing under different topologies

Gallos, L., Korczyński, M. & Fefferman, N. H., Dec 1 2017, In : Eurasip Journal on Information Security. 2017, 1, 5.

Research output: Contribution to journalArticle

Topology
Monitoring
Parallel algorithms
Communication
1 Citation (Scopus)

Differentially private noisy search with applications to anomaly detection

Bittner, D. M., Sarwate, A. & Wright, R., Nov 3 2017, AISec 2017 - Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2017. Association for Computing Machinery, Inc, 1 p. (AISec 2017 - Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Dynamics at the boundary of game theory and distributed computing

Jaggard, A. D., Lutz, N., Schapira, M. & Wright, R., Aug 1 2017, In : ACM Transactions on Economics and Computation. 5, 3, 15.

Research output: Contribution to journalArticle

Game theory
Distributed computer systems
Game Theory
Distributed Computing
Dynamic Games

Keynote: Privacy in today's world

Wright, R. N., Oct 30 2017, CyberW 2017 - Proceedings of the 2017 Workshop on Women in Cyber Security, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 7-10 4 p. (CyberW 2017 - Proceedings of the 2017 Workshop on Women in Cyber Security, co-located with CCS 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile devices
2016
4 Citations (Scopus)

Differentially private online active learning with applications to anomaly detection

Ghassemi, M., Sarwate, A. & Wright, R., Oct 28 2016, AISec 2016 - Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2016. Association for Computing Machinery, Inc, p. 117-128 12 p. (AISec 2016 - Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning algorithms
Classifiers
Labels
Detectors
Problem-Based Learning

Meaningful and meaningless statements using metrics for the border condition

Roberts, F., Sep 14 2016, 2016 IEEE Symposium on Technologies for Homeland Security, HST 2016. Institute of Electrical and Electronics Engineers Inc., 7568936. (2016 IEEE Symposium on Technologies for Homeland Security, HST 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

The little-known challenge of maritime cyber security

Direnzo, J., Goward, D. A. & Roberts, F., Jan 20 2016, IISA 2015 - 6th International Conference on Information, Intelligence, Systems and Applications. Institute of Electrical and Electronics Engineers Inc., 7388071. (IISA 2015 - 6th International Conference on Information, Intelligence, Systems and Applications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

vulnerability
transportation system
Oils
2015
3 Citations (Scopus)

Experimental designs for testing metal detectors at a large sports stadium

Nelson, C., Kantor, P., Nakamura, B., Ricks, B., Whytlaw, R., Egan, D., Matlin, A., Roberts, F., Tobia, M. & Young, M., Aug 26 2015, 2015 IEEE International Symposium on Technologies for Homeland Security, HST 2015. Institute of Electrical and Electronics Engineers Inc., 7225280. (2015 IEEE International Symposium on Technologies for Homeland Security, HST 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Metal detectors
Stadiums
Sports
Design of experiments
experiment
1 Citation (Scopus)

Food Webs and Graphs

Cozzens, M., Mar 25 2015, Algebraic and Discrete Mathematical Methods for Modern Biology. Elsevier, p. 29-49 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Food Web
Graph in graph theory
Competition Graph
Ecology
Linkage

Highly efficient evaluation design (HEED) for comparing algorithms used to detect nuclear materials

Kantor, P., Nelson, C., Roberts, F. & Pottenger, W. M., Jan 1 2015, IIE Annual Conference and Expo 2015. Institute of Industrial Engineers, p. 1842-1851 10 p. (IIE Annual Conference and Expo 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensors
Design of experiments
Radiation
Experiments

Optimal US coast guard boat allocations with sharing

Nakamura, B., Boros, E., Kantor, P., McGinity, C., Nelson, C., Oster, M., Ricks, B., Roberts, F., Yao, W., Ball, P., Conrad, C., Rader, T. & Hanson, K., Jan 1 2015, IIE Annual Conference and Expo 2015. Institute of Industrial Engineers, p. 2049-2058 10 p. (IIE Annual Conference and Expo 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Boats
Coastal zones
Laptop computers
Integer programming
Innovation
14 Citations (Scopus)

Simple and efficient self-healing strategy for damaged complex networks

Gallos, L. K. & Fefferman, N. H., Nov 10 2015, In : Physical Review E - Statistical, Nonlinear, and Soft Matter Physics. 92, 5, 052806.

Research output: Contribution to journalArticle

healing
Complex Networks
Vertex of a graph
airports
Damage
6 Citations (Scopus)

Strategy for the energy crisis: The case of commuter transportation policy

Roberts, F., Jan 1 2015, Structure of Decision: The Cognitive Maps of Political Elites. Princeton University Press, p. 142-179 38 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

energy crisis
transportation policy
commuter
Consensus
energy shortage
4 Citations (Scopus)

The effect of disease-induced mortality on structural network properties

Gallos, L. & Fefferman, N. H., Aug 27 2015, In : PloS one. 10, 8, e0136704.

Research output: Contribution to journalArticle

Mortality
burden of disease
social networks
human population
topology
7 Citations (Scopus)

The questionnaire method

Roberts, F., Jan 1 2015, Structure of Decision: The Cognitive Maps of Political Elites. Princeton University Press, p. 333-342 10 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

questionnaire
self-initiated work
research planning
Research Design
Research Personnel
2014
3 Citations (Scopus)

ACCAM global optimization model for the USCG aviation air stations

Nelson, C., Boros, E., Roberts, F., Rubio-Herrero, J., Kantor, P., McGinity, C., Nakamura, B., Ricks, B., Ball, P., Conrad, C., Hanson, K. & Rader, T., Jan 1 2014, IIE Annual Conference and Expo 2014. Institute of Industrial Engineers, p. 2761-2770 10 p. (IIE Annual Conference and Expo 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Global optimization
Aviation
Coastal zones
Aircraft
Air
2 Citations (Scopus)

Meaningful and meaningless statements in landscape ecology and environmental sustainability

Roberts, F., Jan 1 2014, Springer Optimization and Its Applications. Springer International Publishing, p. 297-312 16 p. (Springer Optimization and Its Applications; vol. 92).

Research output: Chapter in Book/Report/Conference proceedingChapter

Sustainability
Ecology
Climate
Water
Metric
2 Citations (Scopus)

Modeling the impact of patron screening at an NFL stadium

Ricks, B. C., Nakamura, B., Almaz, A., DeMarco, R., Hui, C., Kantor, P., Matlin, A., Nelson, C., Powell, H., Roberts, F. & Thompson, B., Jan 1 2014, IIE Annual Conference and Expo 2014. Institute of Industrial Engineers, p. 3086-3095 10 p. (IIE Annual Conference and Expo 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stadiums
Screening
National security
Magnetometers
Hazards

Open vs. closed systems for accountability

Feigenbaum, J., Jaggard, A. D. & Wright, R. N., Jan 1 2014, Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014. Association for Computing Machinery, 4. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Practical and privacy-preserving policy compliance for outsourced data

Di Crescenzo, G., Feigenbaum, J., Gupta, D., Panagos, E., Perry, J. & Wright, R. N., Jan 1 2014, Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Revised Selected Papers. Brenner, M., Smith, M., Böhme, R. & Moore, T. (eds.). Springer Verlag, p. 181-194 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8438).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy Preserving
Compliance
Network protocols
Query
Cryptography
6 Citations (Scopus)

Privacy-preserving publish/subscribe: Efficient protocols in a distributed model

Di Crescenzo, G., Coan, B., Schultz, J., Tsang, S. & Wright, R., Jan 1 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer Verlag, p. 114-132 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Publish/subscribe
Privacy Preserving
Cryptography
Encryption
Privacy
7 Citations (Scopus)

Revealing effective classifiers through network comparison

Gallos, L. & Fefferman, N. H., Nov 1 2014, In : EPL. 108, 3, 38001.

Research output: Contribution to journalArticle

classifiers
commonality
network analysis
ecology
complex systems
1 Citation (Scopus)

Self-stabilizing uncoupled dynamics

Jaggard, A. D., Lutz, N., Schapira, M. & Wright, R., Jan 1 2014, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8768, p. 74-85 12 p.

Research output: Contribution to journalArticle

Game
Self-stabilization
Dynamic Games
Resilience
Distributed Systems

Strange bedfellows: How and when to work with your enemy

Jaggard, A. D. & Wright, R., Jan 1 2014, Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. Stajano, F., Matyáš, V., Švenda, P., Anderson, J., Christianson, B. & Malcolm, J. (eds.). Springer Verlag, p. 263-267 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8809).

Research output: Chapter in Book/Report/Conference proceedingChapter

Security Protocols
Formal Model
Context
Collaboration

Strange bedfellows: How and when to work with your enemy (transcript of discussion)

Wright, R., Jan 1 2014, Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. Stajano, F., Matyáš, V., Švenda, P., Anderson, J., Christianson, B. & Malcolm, J. (eds.). Springer Verlag, p. 268-275 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8809).

Research output: Chapter in Book/Report/Conference proceedingChapter

Strategy-proof location functions on finite graphs

McMorris, F. R., Mulder, H. M. & Roberts, F. S., Jan 1 2014, Springer Optimization and Its Applications. Springer International Publishing, p. 63-75 13 p. (Springer Optimization and Its Applications; vol. 92).

Research output: Chapter in Book/Report/Conference proceedingChapter

Finite Graph
Strategy
Entire
Graph in graph theory
8 Citations (Scopus)

Systematizing secure computation for research and decision support

Perry, J., Gupta, D., Feigenbaum, J. & Wright, R., Jan 1 2014, Security and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings. de Prisco, R. & Abdalla, M. (eds.). Springer Verlag, p. 380-397 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8642).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure Computation
Multiparty Computation
Decision Support
Secure multi-party Computation
Proposition
2013
1 Citation (Scopus)

A cloud-based mobile computing applications platform for first responders

Chung, C., Egan, D., Jain, A., Caruso, N., Misner, C. & Wallace, R., Aug 5 2013, Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013. p. 503-508 6 p. 6525568. (Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile computing
Application programs
Smartphones
Authentication
Costs
3 Citations (Scopus)
Mobile Sensor Networks
Surveillance
Attack
Sensor
Bayesian Information Criterion
46 Citations (Scopus)

DP-WHERE: Differentially private modeling of human mobility

Mir, D. J., Isaacman, S., Caceres, R., Martonosi, M. & Wright, R., Dec 1 2013, Proceedings - 2013 IEEE International Conference on Big Data, Big Data 2013. p. 580-588 9 p. 6691626. (Proceedings - 2013 IEEE International Conference on Big Data, Big Data 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cellular telephones
Epidemiology
Urban planning
Ecology
Experiments
7 Citations (Scopus)

Efficient and private three-party publish/subscribe

Di Crescenzo, G., Burns, J., Coan, B., Schultz, J., Stanton, J., Tsang, S. & Wright, R. N., Sep 9 2013, Network and System Security - 7th International Conference, NSS 2013, Proceedings. p. 278-292 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7873 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Publish/subscribe
Privacy
Network protocols
Servers
Server
1 Citation (Scopus)

Estimating violation risk for fisheries regulations

Chalupsky, H., Demarco, R., Hovy, E. H., Kantor, P. B., Matlin, A., Mitra, P., Ozbas, B., Roberts, F., Wojtowicz, J. & Xie, M., Dec 16 2013, Algorithmic Decision Theory - Third International Conference, ADT 2013, Proceedings. p. 297-308 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8176 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fisheries
Coastal zones
Fishing vessels
Vessel
Fish
13 Citations (Scopus)

IMDB Network Revisited: Unveiling Fractal and Modular Properties from a Typical Small-World Network

Gallos, L. K., Potiguar, F. Q., Andrade, J. S. & Makse, H. A., Jun 24 2013, In : PloS one. 8, 6, e66443.

Research output: Contribution to journalArticle

Small-world networks
Fractals
Motion Pictures
topology
Topology
1 Citation (Scopus)

Meaningful and meaningless statements in epidemiology and public health

Roberts, F., Jan 1 2013, Measurement with Persons: Theory, Methods, and Implementation Areas. Taylor and Francis, p. 75-95 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Epidemiology
Public Health
9 Citations (Scopus)

The design space of probing algorithms for network-performance measurement

Jaggard, A. D., Kopparty, S., Ramachandran, V. & Wright, R., Jul 22 2013, SIGMETRICS 2013 - Proceedings of the 2013 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. 1 SPEC. ISS. ed. p. 105-116 12 p. (Performance Evaluation Review; vol. 41, no. 1 SPEC. ISS.).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network performance
Approximation algorithms
Fault detection
Telecommunication networks
Hardness
2012
13 Citations (Scopus)

A differentially private estimator for the stochastic Kronecker graph model

Mir, D. & Wright, R., Jul 27 2012, Proceedings - Joint EDBT/ICDT Workshops 2012. p. 167-176 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Probability distributions
Statistics
Sampling
18 Citations (Scopus)

A practical differentially private random decision tree classifier

Jagannathan, G., Pillaipakkamnatt, K. & Wright, R., Apr 1 2012, In : Transactions on Data Privacy. 5, 1, p. 273-295 23 p.

Research output: Contribution to journalArticle

Decision trees
Decision tree
Privacy
Classifiers
Classifier
177 Citations (Scopus)
Cluster Analysis
Brain
Information Theory
Social Support
Organizations
37 Citations (Scopus)

Collective behavior in the spatial spreading of obesity

Gallos, L. K., Barttfeld, P., Havlin, S., Sigman, M. & Makse, H. A., Jun 14 2012, In : Scientific reports. 2, 454.

Research output: Contribution to journalArticle

Obesity
Spatial Analysis
Health Policy
Causality
Habits
52 Citations (Scopus)

How people interact in evolving online affiliation networks

Gallos, L. K., Rybski, D., Liljeros, F., Havlin, S. & Makse, H. A., Dec 1 2012, In : Physical Review X. 2, 3, 031014.

Research output: Contribution to journalArticle

tendencies
inference
statistical analysis
interactions
55 Citations (Scopus)

The conundrum of functional brain networks: Small-world efficiency or fractal modularity

Gallos, L., Sigman, M. & Makse, H. A., Sep 24 2012, In : Frontiers in Physiology. 3 MAY, Article 123.

Research output: Contribution to journalArticle

Fractals
Brain
Information Theory
Cognition
Neurons