Key research themes
1. How can low-cost IoT and embedded systems be designed to enable real-time intruder detection and notification in security monitoring?
This research area investigates the development and implementation of affordable, IoT-enabled security systems utilizing embedded platforms like Raspberry Pi and Arduino. The focus is on combining motion detection sensors, cameras, and wireless communication modules to capture intruder evidence and notify users in real time. These systems aim to provide scalable, accessible solutions for home, office, and small business security with minimal human intervention and low deployment costs.
2. What metrics and multi-agent frameworks enable near real-time assessment and visualization of security assurance in complex networked systems?
Research under this theme focuses on developing frameworks and models for evaluating, quantifying, and visualizing security assurance levels of large-scale IT and networked systems. These approaches often employ attack graphs, multi-agent systems, and anomaly detection techniques to represent both static vulnerabilities and dynamic behaviors. The outcome is improved near real-time situational awareness to guide stakeholders in understanding evolving security risks and allocating defensive resources accordingly.
3. How can automated security monitoring be integrated into software development lifecycles and distributed systems for enhanced vulnerability detection and code security?
This theme explores the incorporation of security monitoring mechanisms directly into software development processes and distributed architectures. It emphasizes the use of static analysis, vulnerability prediction models, security assessment metrics, and automated surveillance to preemptively detect software vulnerabilities and anomalies. The goal is to establish security by design, facilitating secure coding practices, and enabling continuous security validation in cloud, microservices, and containerized environments.