Mike Fisk

Cybersecurity Artifical Intelligence

Our work has resulted in top publications, patents, and PathScan, a commercial product.

In 2010, we embarked on a multi-year interdisciplinary research project to build AI to detect when cyber insiders (an outside intruder or a rogue insider) are active within a network. Our approach models normal behaviors from multiple data sources inside a network and detects anomalous changes that are consistent with adversary activity. This approach demonstrates aspects of third-wave AI like explainability and model-based learning of sparse data, that are more sophisticated and efficient than deep learning.


Intrusion Tolerance

Intrusion tolerant cyber systems maintain certain performance characteristics even when components have been compromised. Our work focuses on managing trust relationships, and specifically authentication mechanisms, in complex systems.

Intrusion Tolerance & The Problem With Best Practices

Scalable Analytics

FileMap orchestrates map-reduce computations on any collection of computers and does it twice as fast as Hadoop Streaming.
Privacy Principles for Sharing Cyber Security Data
RetroFuture: Distributed Internet Measurement
SMACQ: Optimized execution of simultaneous streaming analytics.