Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Optimally Blending Honeypots into Production Networks: Hardness and Algorithms

    Honeypot is an important cyber defense technique that can expose attackers’ new attacks (e.g., zero-day exploits). However, the effectiveness of honeypots has not been systematically investigated, beyond the r...

    Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu in Science of Cyber Security (2023)

  2. No Access

    Chapter and Conference Paper

    Computational Complexity Characterization of Protecting Elections from Bribery

    The bribery problem in election has received considerable attention in the literature, upon which various algorithmic and complexity results have been obtained. It is thus natural to ask whether we can protect...

    Lin Chen, Ahmed Sunny, Lei Xu, Shouhuai Xu, Zhimin Gao in Computing and Combinatorics (2020)