My research interests are in optimal resource allocation, sequential decision theory, incentive design, and performance modeling and analysis, all within the context of communication networks. My most recent research activities involve online learning, modeling and mining of large scale Internet measurement data concerning cybersecurity, and the design of incentive mechanisms aimed at encouraging the adoption of better security practices. Here are some recent publications in these areas.
Security as a public good and its provision
P. Naghizadeh and M. Liu, “On the Uniqueness and Stability of Equilibria of Network Games”, Annual Allerton Conference on Control, Communication, and Computing (Allerton), October 2017, Allerton, IL.
P. Naghizadeh and M. Liu, “Provision of Public Goods on Networks: On Existence, Uniqueness, and Centralities”, IEEE Transactions on Network Science and Engineering (TNSE), accepted for publication, September 2017.
P. Naghizadeh and M. Liu, “Opting out of Incentive Mechanisms: A Study of Security as a Non-Excludable Public Good”, IEEE Transactions on Information Forensics and Security, 11(12), pp. 2790-2803, August 2016.
P. Naghizadeh and M. Liu, “Exit Equilibrium: Towards Understanding Voluntary Participation in Security Games”, IEEE Annual Conference on Computer Communications (INFOCOM), April 2016, San Francisco, CA.
Internet measurement and data analytics
A. Sarabi, Z. Zhu, C. Xiao, M. Liu and T. Dumitras, “Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State”, The Passive and Active Measurement Conference (PAM), March 2017, Sydney, Australia.
A. Sarabi, P. Naghizadeh, Y. Liu and M. Liu, “Risky Business: Fine-grained Data Breach Prediction Using Business Profiles”, Journal of Cybersecurity, 2(1), pp. 15-28, Dec 2016.
Y. Liu, A. Sarabi, J. Zhang, P. Naghizadeh, M. Karir, M. Bailey and M. Liu, “Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents”, USENIX Security, August 2015, Washington, D. C.
Y. Liu and M. Liu, “Detecting Hidden Propagation Structure and Its Application to Analyzing Phishing”, ACM/IEEE International Conference on Data Science and Advanced Analytics (DSAA), October 2014, Shanghai, China. Best Applications Paper Award.
Design of cyber insurance policies
M. Khalili, M. Liu, and S. Romanosky, “Embracing and Controlling Risk Dependency in Cyber Insurance Policy Underwriting”, The Annual Workshop on the Economics of Information Security (WEIS), June 2018, Innsbruck, Austria.
M. Khalili, P. Naghizadeh, and M. Liu, “Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence”, IEEE Transactions on Information Forensics & Security (TIFS), accepted for publication, February 2018.
M. Khalili, P. Naghizadeh, and M. Liu, “Designing Cyber Insurance Policies in the Presence of Security Interdependence”, The 12th Workshop on the Economics of Networks, Systems and Computation (NetEcon), June 2017, Boston, MA.