- Infrastructure Resilience and Vulnerability Analysis
- Complex Network Analysis Techniques
- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Risk and Safety Analysis
- Information and Cyber Security
- Disaster Management and Resilience
- Model Reduction and Neural Networks
- Supply Chain Resilience and Risk Management
- Adversarial Robustness in Machine Learning
- Probabilistic and Robust Engineering Design
- Evacuation and Crowd Dynamics
- Internet Traffic Analysis and Secure E-voting
- Fault Detection and Control Systems
- Reinforcement Learning in Robotics
- Simulation Techniques and Applications
- Distributed Control Multi-Agent Systems
- Ecosystem dynamics and resilience
- Optimal Power Flow Distribution
- Software-Defined Networks and 5G
- Neural Networks and Applications
- Fluid Dynamics and Turbulent Flows
- Disaster Response and Management
- Risk Perception and Management
- Nuclear Issues and Defense
Pacific Northwest National Laboratory
2015-2024
Northeastern University
2021-2024
Battelle
2021-2023
Universitat Politècnica de Catalunya
2018
Barcelona Supercomputing Center
2018
Government of the United States of America
2015
University of Southern California
2013-2014
University of Washington
2002
Abstract Natural hazards including floods can trigger catastrophic failures in interdependent urban transport network-of-networks (NoNs). Population growth has enhanced transportation demand while urbanization and climate change have intensified floods. However, despite the clear need to develop actionable insights for improving resilience of critical lifelines, theory methods remain underdeveloped. Furthermore, as infrastructure systems become more intelligent, security experts point...
This article presents a framework for economic consequence analysis of terrorism countermeasures. It specifies major categories direct and indirect costs, benefits, spillover effects, transfer payments that must be estimated in comprehensive assessment. develops spreadsheet tool data collection, storage, refinement, as well estimation the various components necessary accounts. also illustrates usefulness first assessment tradeoffs between enhanced security changes commercial activity an...
Abstract Artificial intelligence (AI) methods have revolutionized and redefined the landscape of data analysis in business, healthcare, technology. These innovated applied mathematics, computer science, engineering fields are showing considerable potential for risk especially disaster domain. The field has yet to define itself as a necessary application domain AI implementation by defining how responsibly balance risk. (1) How is being used applications; these applications addressing...
Abstract There is growing interest in leveraging advanced analytics, including artificial intelligence (AI) and machine learning (ML), for disaster risk analysis (RA) applications. These emerging methods offer unprecedented abilities to assess settings where threats can emerge transform quickly by relying on “learning” through datasets. a need understand these comparison the more established set of assessment commonly used practice. existing are generally accepted community grounded use...
Cyber-physical systems are vulnerable to cyber attacks that can produce serious physical consequences. Our previous work showed how hypergame analysis, an extension of game theory for situations with information asymmetries and player misperceptions, could be applied control subject deception-based attacks. Here, we build on research study a repeated, stochastic context. We consider detection attacker attempting manipulate the system while remaining undetected. discuss different monitoring...
The identification of the Stuxnet worm in 2010 provided a highly publicized example cyber attack that physically damaged an industrial control system. This raised public awareness about possibility similar attacks against other targets—including critical infrastructure. In this article, we use hypergames to analyze how strategic perturbations sensor readings and calibrated parameters can be used manipulate system employs optimal control. Hypergames form extension game theory enables us model...
Infrastructure Distributed Denial of Service (IDDoS) attacks continue to be one the most devastating challenges facing cyber systems. The new generation IDDoS exploits inherent weakness infrastructure, including deterministic nature routing, skewed distribution flows, and Internet ossification discover network critical links launch highly stealthy flooding that are not observable at victim’s end. In this paper, first, we propose a metric quantitatively measure potential susceptibility any...
The deterministic nature of existing routing protocols has resulted into an ossified Internet with static and predictable network routes. This gives persistent attackers (e.g. eavesdroppers DDoS attackers) plenty time to study the identify vulnerable (critical) links plan devastating stealthy attacks. Recently, Moving Target Defense (MTD) based approaches have been proposed defend against DoS However, MTD for route mutation are oriented towards re-configuring parameters in Local Area...
The understanding of resilience is an emerging topic within the study risks affecting distributed infrastructure systems. Although recent studies have explored quantification system resilience, there has been limited research aimed at role multiple performance measures, spatiotemporal heterogeneities, and modeling uncertainties assessment associated decision-making. Under real-world conditions, increased burden on analysts for translating observed data (including human electronic sensor...
Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration interaction these countermeasures. In this article, we present an analysis layered security within lower Manhattan area. It shows how portfolios can be evaluated through portfolio decision analysis. Consideration is given to total benefits and costs system. Portfolio diagrams created that help communicate alternatives among stakeholders who...
Increasing connectivity to the Internet for remote monitoring and control has made cyber-physical systems more vulnerable deliberate attacks; purely cyber attacks can thereby have physical consequences. Long-term, stealthy such as Stuxnet be described Advanced Persistent Threats (APTs). Here, we extend our previous work on hypergames APTs develop hypergame-based defender strategies that are robust deception do not rely attack detection. These provide provable bounds—and provably optimal...
Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect security games. Past research has primarily focused on representing the defender's beliefs about as point utility estimates. More recently, within physical domain, payoff uncertainties have been represented Uniform Gaussian probability distributions, intervals. Within cyber-settings, continuous distributions may still be appropriate for addressing statistical (aleatory) where defender assume that...
Soft errors caused by transient bit flips have the potential to significantly impact an application's behavior. This has motivated design of array techniques detect, isolate, and correct soft using microarchitectural, architectural, compilation-based, or application-level minimize their on executing application. The first step toward good error detection/correction involves understanding vulnerability errors. In this paper, we present comprehensive characterization convergence...
The dynamics-aware economic dispatch (DED) problem embeds low-level generator dynamics and operational constraints to enable near real-time scheduling of generation units in a power network. DED produces more dynamic supervisory control policy than traditional (T-ED) that reduces overall costs. However, contrast T-ED, is nonlinear, non-convex optimization computationally prohibitive solve. We introduce machine learning-based operator-theoretic approach for solving the efficiently....
Generating automated cyber resilience policies for real-world settings is a challenging research problem that must account uncertainties in system state over time and dynamics between attackers defenders. In addition to understanding attacker defender motives tools, identifying "relevant" attack data, it also critical develop rigorous mathematical formulations representing the defender's decision-support under uncertainty. Game-theoretic approaches involving resource allocation optimization...
Making a power system more operationally resilient to disruption is an important and hard problem. Modeling decisions must include careful consideration of the interaction between defenders potential disruptors, complex operational nature system, availability uncertainty information. Multi-level optimization defender-attacker-defender models are suitable choice here since they can express such considerations, quantify resilience, output prescriptive for reaching resilience. In this paper, we...
We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent typically exist the computing nodes a cyber-system; as get exploited, starting from low level ones, they open up doors to more critical vulnerabilities. These cannot be understood just by topological analysis network, and we use attack graph abstraction study these problems. In contrast earlier approaches based on heuristics evolutionary algorithms,...
Cyber-system security on a continual basis against multitude of adverse events is challenging undertaking. Cybersystem administrators operating with limited protective resources need to account for uncertainties associated system behavior and types attackers targeting system. These may arise due inherent randomness or incomplete knowledge about affecting the As result, uncertainty quantification attacker payoff functions within stochastic cybersecurity games critical area research interest....
Wireless wearable systems allow new user interface components. We highlight two-TiltType, a wrist-mounted device for text I/O, and phicons, objects whose physical appearances are metaphors their electronic capabilities. Artifacts like these can create smaller, simpler, easier systems.
The Koopman operator lifts nonlinear dynamical systems into a functional space of observables, where the dynamics are linear. In this paper, we provide three different representations for hybrid systems. first is specific to switched systems, and second third preserve original while eliminating discrete state variables; approach straightforward, conditions under which transformation associated with holds. Eliminating variables provides computational benefits when using data-driven methods...