I will give a high level talk about current research that studies how to prioritize cyber-security mitigations. I will talk about information technology supply chains, attack graphs, set cover variations, and budgeted maximization of submodular functions.
July 2, 2015
4:00 pm (1h)
Discovery Building, Orchard View Room
Laura Mclay