- Infrastructure Resilience and Vulnerability Analysis
- Information and Cyber Security
- Smart Grid Security and Resilience
- Model Reduction and Neural Networks
- Simulation Techniques and Applications
- Network Security and Intrusion Detection
- Fluid Dynamics and Turbulent Flows
- Lattice Boltzmann Simulation Studies
- Risk and Safety Analysis
- Optimal Power Flow Distribution
- Advanced Graph Theory Research
- Distributed systems and fault tolerance
- Evacuation and Crowd Dynamics
- Gaussian Processes and Bayesian Inference
- Probabilistic and Robust Engineering Design
- Parallel Computing and Optimization Techniques
- Reinforcement Learning in Robotics
- Data Mining Algorithms and Applications
- Data Stream Mining Techniques
- Distributed and Parallel Computing Systems
- Advanced Malware Detection Techniques
- Advanced Data Storage Technologies
- Smart Grid Energy Management
- Optimization and Packing Problems
- Data Management and Algorithms
Pacific Northwest National Laboratory
2015-2024
Battelle
2023
Rutgers, The State University of New Jersey
2011-2013
Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect security games. Past research has primarily focused on representing the defender's beliefs about as point utility estimates. More recently, within physical domain, payoff uncertainties have been represented Uniform Gaussian probability distributions, intervals. Within cyber-settings, continuous distributions may still be appropriate for addressing statistical (aleatory) where defender assume that...
The dynamics-aware economic dispatch (DED) problem embeds low-level generator dynamics and operational constraints to enable near real-time scheduling of generation units in a power network. DED produces more dynamic supervisory control policy than traditional (T-ED) that reduces overall costs. However, contrast T-ED, is nonlinear, non-convex optimization computationally prohibitive solve. We introduce machine learning-based operator-theoretic approach for solving the efficiently....
Generating automated cyber resilience policies for real-world settings is a challenging research problem that must account uncertainties in system state over time and dynamics between attackers defenders. In addition to understanding attacker defender motives tools, identifying "relevant" attack data, it also critical develop rigorous mathematical formulations representing the defender's decision-support under uncertainty. Game-theoretic approaches involving resource allocation optimization...
Making a power system more operationally resilient to disruption is an important and hard problem. Modeling decisions must include careful consideration of the interaction between defenders potential disruptors, complex operational nature system, availability uncertainty information. Multi-level optimization defender-attacker-defender models are suitable choice here since they can express such considerations, quantify resilience, output prescriptive for reaching resilience. In this paper, we...
We present an algorithm to maintain the connected components of a graph that arrives as infinite stream edges. formalize on X-stream, new parallel theoretical computational model for streams. Connectivity-related queries, including component spanning trees, are supported with some latency, returning state at time query. Because may eventually exceed storage limits any number finite-memory processors, we assume aging command or daemon where "uninteresting" edges removed when system nears...
Cyber-system security on a continual basis against multitude of adverse events is challenging undertaking. Cybersystem administrators operating with limited protective resources need to account for uncertainties associated system behavior and types attackers targeting system. These may arise due inherent randomness or incomplete knowledge about affecting the As result, uncertainty quantification attacker payoff functions within stochastic cybersecurity games critical area research interest....
The Koopman operator lifts nonlinear dynamical systems into a functional space of observables, where the dynamics are linear. In this paper, we provide three different representations for hybrid systems. first is specific to switched systems, and second third preserve original while eliminating discrete state variables; approach straightforward, conditions under which transformation associated with holds. Eliminating variables provides computational benefits when using data-driven methods...
In this paper, we provide an introduction to the Koopman Operator (KO) designed be accessible those not already familiar with field. Our aim is expose domain experts and controls practitioners concept capabilities KO provides in interest of promoting wider use; as such, deliberately focus more on uses computational aspects than wealth analytical results literature. Domain may then able pose new applications-based research questions for community. We begin by defining describing its key...
Understanding aviation transportation infrastructure system behavior and coupling with communication networks is essential for securing restoring functionality against cyber-enabled threats. While significant progress has been made in the past decade on developing resilience theories based network structure operations, translating generalizing them to real-world practice often challenging due imperfect data inapplicability of modeling assumptions. These typically include: 1) stylized...
OF THE DISSERTATION Two applications of combinatorial optimization by Matthew R. Oster Dissertation Director: Professor Jonathan Eckstein This thesis presents two optimization. The first part contains a detailed description conference scheduling problem. We model the problem as symmetric clustering problem, or variant minimum k-partition we call capacitated k-partition. is proved to be NP-hard solve optimality, and further, unless P = NP, no constant factor polynomial-time approximation...
To address consequence assessment challenges associated with resilient operation of interdependent infrastructures against compound hazard events, we propose a novel policy-guided tri-level optimization model applied to proof-of-concept case study fuel distribution and transportation networks. Mathematically, our approach takes the form defender-attacker-defender (DAD) model–a multi-agent optimization, comprised defender, attacker, an operator acting in sequence. Here, notional may choose...
Summary form only given. The volume of streaming data for cyber analysis is increasing at a rate much greater than any organization's ability to hire human analysts. As preliminary step automating significant portions workload, we consider the problem modeling data. Since latter tends be relational in nature, graphs are natural abstraction. This motivates future research into efficient algorithms fundamental graph problems high-volume, environment. Algorithms designed using current...
Resilient operation of interdependent infrastructures against compound hazard events is essential for maintaining societal well-being. To address consequence assessment challenges in this problem space, we propose a novel tri-level optimization model applied to proof-of-concept case study with fuel distribution and transportation networks -- encompassing one realistic network; fictitious, yet as well drawn from three synthetic distributions. Mathematically, our approach takes the form...