BEGIN:VCALENDAR VERSION:2.0 PRODID:-//Date iCal//NONSGML kigkonsult.se iCalcreator 2.20.4// METHOD:PUBLISH X-WR-CALNAME;VALUE=TEXT:ÌÇÐÄÔ­´´ BEGIN:VTIMEZONE TZID:America/New_York BEGIN:STANDARD DTSTART:20181104T020000 TZOFFSETFROM:-0400 TZOFFSETTO:-0500 TZNAME:EST END:STANDARD BEGIN:DAYLIGHT DTSTART:20190310T020000 TZOFFSETFROM:-0500 TZOFFSETTO:-0400 TZNAME:EDT END:DAYLIGHT END:VTIMEZONE BEGIN:VEVENT UID:calendar.346581.field_event_date.0@www.wright.edu DTSTAMP:20260219T214505Z CREATED:20181115T194103Z DESCRIPTION:Ph.D. Committee:  Drs. Junjie Zhang (advisor)\, Michelle Cheath am\, Bin Wang\, and Phu H. Phung (University of Dayton) ABSTRACT:Security  has become of the most significant concerns for our cyberspace.  Securing  the cyberspace\, however\, becomes increasingly challenging.  This can be attributed to the rapidly growing diversities and complexity of the modern cyberspace.  Specifically\, it is not any more dominated by connected per sonal computers (PCs)\; instead\, it is greatly characterized by cyber-phy sical systems (CPS)\, embedded systems\, dynamic services\, and human-comp uter interactions [28]. Securing modern cyberspace therefore calls for a m ulti-faceted approach capable of systematically integrating these emerging characteristics. This dissertation presents our novel and significant sol utions towards this direction.   Specifically\, we have devised automated\ , systematic security solutions to three critical aspects of our modern cy berspace including i) cyber-physical systems\, ii) dynamic web services\, and iii) social networks.  This dissertation makes the following contribut ions.  First\, we have conducted systematic vulnerability assessment for a real-world\, complex CPS\, namely Unmanned Systems Autonomy Services (UxA S). Our assessment has identified a set of exploitable vulnerabilities. Se cond\, we have designed an adaptive traffic morphing algorithm to conceal CPS communications into background network traffic. Third\, we have design ed a CPS self-destruct model and studied the security-and-performance trad e-off using probabilistic model checking.   Finally\, we have designed a n ovel detection system to detect suspicious behaviors in an online emotiona l support system. DTSTART;TZID=America/New_York:20181129T130000 DTEND;TZID=America/New_York:20181129T150000 LAST-MODIFIED:20181115T200643Z LOCATION:405L Russ Engineering (Tait Conference Room) SUMMARY:Ph.D. Dissertation Proposal Defense Securing Modern Cyberspace Usin g A Multi-Faceted Approach By Yu Li URL;TYPE=URI:/events/phd-dissertation-proposal-defens e-securing-modern-cyberspace-using-multi-faceted-approach-yu END:VEVENT END:VCALENDAR