no code implementations • 13 Jun 2022 • Mustafa Abdallah, Byung-Gun Joung, Wo Jae Lee, Charilaos Mousoulis, John W. Sutherland, Saurabh Bagchi
In this paper, we analyze four datasets from sensors deployed from manufacturing testbeds.
no code implementations • 29 Sep 2021 • Mustafa Abdallah, Ryan Rossi, Kanak Mahadik, Sungchul Kim, Handong Zhao, Haoliang Wang, Saurabh Bagchi
In this work, we develop techniques for fast automatic selection of the best forecasting model for a new unseen time-series dataset, without having to first train (or evaluate) all the models on the new time-series data to select the best one.
no code implementations • 5 Mar 2021 • Mustafa Abdallah, Timothy Cason, Saurabh Bagchi, Shreyas Sundaram
Each node has a certain value to the attacker and the defender, along with a probability of being successfully compromised, which is a function of the investments in that node by both players.
no code implementations • 11 Feb 2021 • Mustafa Abdallah, Wo Jae Lee, Nithin Raghunathan, Charilaos Mousoulis, John W. Sutherland, Saurabh Bagchi
While there is a rich literature on anomaly detection in many IoT-based systems, there is no existing work that documents the use of ML models for anomaly detection in digital agriculture and in smart manufacturing systems.
no code implementations • 12 Nov 2020 • Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi
We model the behavioral biases of human decision-making in securing interdependent systems and show that such behavioral decision-making leads to a suboptimal pattern of resource allocation compared to non-behavioral (rational) decision-making.
no code implementations • 4 Apr 2020 • Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi
We model the security investment decisions made by the defenders as a security game.
Cryptography and Security Computer Science and Game Theory
no code implementations • 30 Dec 2018 • Mustafa Abdallah, Ashraf Mahgoub, Saurabh Bagchi, Somali Chaterji
The performance of most error-correction algorithms that operate on genomic sequencer reads is dependent on the proper choice of its configuration parameters, such as the value of k in k-mer based techniques.