Aug. 9, 2022, 1:20 a.m. | Devon Callahan, Timothy Curry, Hazel Davidson, Heytem Zitoun, Benjamin Fuller, Laurent Michel

cs.CR updates on arXiv.org arxiv.org

Maintaining a resilient computer network is a delicate task with conflicting
priorities. Flows should be served while controlling risk due to attackers.
Upon publication of a vulnerability, administrators scramble to manually
mitigate risk while waiting for a patch.


We introduce FASHION: a linear optimizer that balances routing flows with the
security risk posed by these flows. FASHION formalizes routing as a
multi-commodity flow problem with side constraints. FASHION formulates security
using two approximations of risk in a probabilistic attack graph …

attack hybrid networks optimization

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Intermediate Security Engineer, (Incident Response, Trust & Safety)

@ GitLab | Remote, US

Journeyman Cybersecurity Triage Analyst

@ Peraton | Linthicum, MD, United States

Project Manager II - Compliance

@ Critical Path Institute | Tucson, AZ, USA

Junior System Engineer (m/w/d) Cyber Security 1

@ Deutsche Telekom | Leipzig, Deutschland