Matthew R. Oster

ORCID: 0000-0002-9876-8637
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Infrastructure Resilience and Vulnerability Analysis
  • Information and Cyber Security
  • Smart Grid Security and Resilience
  • Model Reduction and Neural Networks
  • Simulation Techniques and Applications
  • Network Security and Intrusion Detection
  • Fluid Dynamics and Turbulent Flows
  • Lattice Boltzmann Simulation Studies
  • Risk and Safety Analysis
  • Optimal Power Flow Distribution
  • Advanced Graph Theory Research
  • Distributed systems and fault tolerance
  • Evacuation and Crowd Dynamics
  • Gaussian Processes and Bayesian Inference
  • Probabilistic and Robust Engineering Design
  • Parallel Computing and Optimization Techniques
  • Reinforcement Learning in Robotics
  • Data Mining Algorithms and Applications
  • Data Stream Mining Techniques
  • Distributed and Parallel Computing Systems
  • Advanced Malware Detection Techniques
  • Advanced Data Storage Technologies
  • Smart Grid Energy Management
  • Optimization and Packing Problems
  • Data Management and Algorithms

Pacific Northwest National Laboratory
2015-2024

Battelle
2023

Rutgers, The State University of New Jersey
2011-2013

Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect security games. Past research has primarily focused on representing the defender's beliefs about as point utility estimates. More recently, within physical domain, payoff uncertainties have been represented Uniform Gaussian probability distributions, intervals. Within cyber-settings, continuous distributions may still be appropriate for addressing statistical (aleatory) where defender assume that...

10.1109/ths.2015.7225287 article EN 2015-04-01

The dynamics-aware economic dispatch (DED) problem embeds low-level generator dynamics and operational constraints to enable near real-time scheduling of generation units in a power network. DED produces more dynamic supervisory control policy than traditional (T-ED) that reduces overall costs. However, contrast T-ED, is nonlinear, non-convex optimization computationally prohibitive solve. We introduce machine learning-based operator-theoretic approach for solving the efficiently....

10.1145/3447555.3464864 article EN 2021-06-22

Generating automated cyber resilience policies for real-world settings is a challenging research problem that must account uncertainties in system state over time and dynamics between attackers defenders. In addition to understanding attacker defender motives tools, identifying "relevant" attack data, it also critical develop rigorous mathematical formulations representing the defender's decision-support under uncertainty. Game-theoretic approaches involving resource allocation optimization...

10.1109/ths.2017.7943478 article EN 2017-04-01

Making a power system more operationally resilient to disruption is an important and hard problem. Modeling decisions must include careful consideration of the interaction between defenders potential disruptors, complex operational nature system, availability uncertainty information. Multi-level optimization defender-attacker-defender models are suitable choice here since they can express such considerations, quantify resilience, output prescriptive for reaching resilience. In this paper, we...

10.1109/rws50334.2020.9241279 article EN 2020-10-19

We present an algorithm to maintain the connected components of a graph that arrives as infinite stream edges. formalize on X-stream, new parallel theoretical computational model for streams. Connectivity-related queries, including component spanning trees, are supported with some latency, returning state at time query. Because may eventually exceed storage limits any number finite-memory processors, we assume aging command or daemon where "uninteresting" edges removed when system nears...

10.1145/2501221.2501234 article EN 2013-07-30

Cyber-system security on a continual basis against multitude of adverse events is challenging undertaking. Cybersystem administrators operating with limited protective resources need to account for uncertainties associated system behavior and types attackers targeting system. These may arise due inherent randomness or incomplete knowledge about affecting the As result, uncertainty quantification attacker payoff functions within stochastic cybersecurity games critical area research interest....

10.1109/ths.2016.7568967 article EN 2016-05-01

The Koopman operator lifts nonlinear dynamical systems into a functional space of observables, where the dynamics are linear. In this paper, we provide three different representations for hybrid systems. first is specific to switched systems, and second third preserve original while eliminating discrete state variables; approach straightforward, conditions under which transformation associated with holds. Eliminating variables provides computational benefits when using data-driven methods...

10.48550/arxiv.2006.12427 preprint EN other-oa arXiv (Cornell University) 2020-01-01

In this paper, we provide an introduction to the Koopman Operator (KO) designed be accessible those not already familiar with field. Our aim is expose domain experts and controls practitioners concept capabilities KO provides in interest of promoting wider use; as such, deliberately focus more on uses computational aspects than wealth analytical results literature. Domain may then able pose new applications-based research questions for community. We begin by defining describing its key...

10.1109/rws50334.2020.9241276 article EN 2020-10-19

Understanding aviation transportation infrastructure system behavior and coupling with communication networks is essential for securing restoring functionality against cyber-enabled threats. While significant progress has been made in the past decade on developing resilience theories based network structure operations, translating generalizing them to real-world practice often challenging due imperfect data inapplicability of modeling assumptions. These typically include: 1) stylized...

10.1109/ths.2018.8574123 article EN 2018-10-01

OF THE DISSERTATION Two applications of combinatorial optimization by Matthew R. Oster Dissertation Director: Professor Jonathan Eckstein This thesis presents two optimization. The first part contains a detailed description conference scheduling problem. We model the problem as symmetric clustering problem, or variant minimum k-partition we call capacitated k-partition. is proved to be NP-hard solve optimality, and further, unless P = NP, no constant factor polynomial-time approximation...

10.7282/t3sb4419 article EN 2014-01-01

To address consequence assessment challenges associated with resilient operation of interdependent infrastructures against compound hazard events, we propose a novel policy-guided tri-level optimization model applied to proof-of-concept case study fuel distribution and transportation networks. Mathematically, our approach takes the form defender-attacker-defender (DAD) model–a multi-agent optimization, comprised defender, attacker, an operator acting in sequence. Here, notional may choose...

10.1109/hst53381.2021.9619824 article EN 2021-11-08

Summary form only given. The volume of streaming data for cyber analysis is increasing at a rate much greater than any organization's ability to hire human analysts. As preliminary step automating significant portions workload, we consider the problem modeling data. Since latter tends be relational in nature, graphs are natural abstraction. This motivates future research into efficient algorithms fundamental graph problems high-volume, environment. Algorithms designed using current...

10.1109/milcom.2011.6127489 article EN 2011-11-01

Resilient operation of interdependent infrastructures against compound hazard events is essential for maintaining societal well-being. To address consequence assessment challenges in this problem space, we propose a novel tri-level optimization model applied to proof-of-concept case study with fuel distribution and transportation networks -- encompassing one realistic network; fictitious, yet as well drawn from three synthetic distributions. Mathematically, our approach takes the form...

10.48550/arxiv.2310.10587 preprint EN cc-by-nc-nd arXiv (Cornell University) 2023-01-01
Coming Soon ...