Skip to content

Agenda

Sunday, August 28

3-5pm Registration

View All Presentations

 

Download the full program

Monday, August 29

8:30am-5:30pm Exhibit Hall open
9-10:10am Welcome & Keynote: General Norton Schwartz, IDA
10:10-10:30am Coffee break
10:30am-12noon

Parallel Sessions MA

Track 1

  1. The Effect of a Ransomware Attack on the Public Opinion of a Company: Sentiment Analysis of Twitter Data
  2. Characterizing Decentralized System Architectures and Their Influence on Performance and Other Outcomes
  3. Human Trafficking Interdiction with Decision Dependent Success
  4. Cybersecurity Platform Selection: A Multicriteria Decision Making Approach

Track 2

  1. Resource Allocation for Crime Deterrence in Urban Policing
  2. The Treatment Programs Assignment and Scheduling Problem and its Application in the Pennsylvania Department of Corrections
  3. Following the Trail: A Moving Target Search Using Canines
  4. A Game-theoretic Framework for Multitarget, Multilayer Defense Against Strategic Attackers

Track 3

  1. Enhancing Community Resilience Under Tornado Hazards: A Two-stage Robust Optimization Approach
  2. Joint Initial Dispatching of Official Responders and Registered Volunteers During Catastrophic Mass-casualty Incidents
  3. Electronic Health Records (EHRs) Security
  4. Robust Individualized Decision Learning with Sensitive Variables

Track 4

  1. Naval Defense Resource Allocation Problem Under Random Threats
  2. Optimizing the Location of Sensors and Block Placement for Detecting Suspicious Targets
  3. Optimal Placement of Ballot Drop Boxes
  4. Aircraft Selection in the Response to the Venezuelan Migrant Crisis in 2018: A Case of the Brazilian Air Force
12noon-1pm Lunch
1-2:30pm NSF Program Managers Panel
2:30-2:45pm Coffee break
2:45-3:40pm Keynote: Josh Lospinoso, Shift 5
3:40-4pm Coffee
4-5:30pm

Parallel Sessions MC

Track 1

  1. Electric Power Grid Resilience to Load Redistribution Cyber Attacks Under Attacker’s Behavioral Uncertainty
  2. Controlling Cascading Failures in the Power Grid
  3. Mitigating Cybersecurity Risks in Electric Grids with a High Penetration of Distributed Renewables
  4. High Voltage Substation Physical Security and Protection Against Substation Attacks

Track 2

  1. Identifying Vulnerable Package Dependencies with Named Entity Recognition
  2. Game-theoretic Approach to Defending Against Advanced Persistent Threats: From Cybersecurity to Cyber Resilience
  3. Innovative Use of Cyber Tools
  4. A Hypergraph-based Machine Learning Ensemble Intrusion Detection System

Track 3

  1. Survival Optimization Models for Emergency Medical Services
  2. Emergency Hospital Care Capacity Estimation for Surge
  3. Dynamic Capacity Management for Deferred Surgeries
  4. Policies for Sudden Demand Surges in Medical Supplies: Healthcare Supply Chain Impacts

Track 4

  1. Maximizing Node Activation Network Flow Problems Under Nonsimultaneous Flow Assumptions
  2. Optimizing Cooperative Interdependent Attack Graphs to Compromise Network Infrastructures
  3. Optimizing for Equity in Urban Planning
6:30-8pm Reception

Tuesday, August 30

9-10:10am Keynote: Joannes O. Royset, Naval Postgraduate School
9:30am-4:15pm Exhibit Hall open
10:10-10:30am Coffee break
10:30am-12noon

Parallel Sessions TA

Track 1

  1. Allocating Continuous Protection Resources to Facilities when the Effect of Protection is Uncertain
  2. Network Resilience Models for Security Applications: Beyond Density and Degree-ness
  3. Solution Support Systems for Managing Rolling Crises

Track 2

  1. Resource Coordination for Network Flow Interdiction
  2. Strategic Coordination of Detection Resources for Monitoring Critical Infrastructure Networks Against Attacks
  3. Multifirm Models of Cybersecurity Investment: Competition vs. Cooperation

Track 3

  1. Improving Logistic Regression on the Imbalanced Data by a Novel Penalized Log-likelihood Function
  2. Wavelet-based Architecture for Data Confidentiality, Integrity, and Availability
  3. Predicting Public Knowledge of Secure Cyber Practices
  4. Differentially Private Federated Learning: Algorithms and Open-source Software Framework

Track 4

  1. Planning for Army Readiness Using Lot Streaming
  2. Convoy Resupply Planning Using Fixed-parameter Tractable Algorithms for Lot-sizing with Heterogeneous Ground Vehicles
  3. Optimal Allocation of Tactical Search Units in Undersea Warfare
12noon-1pm Lunch
1-2:30pm

Parallel Sessions TB

Track 1

  1. Unsupervised Hunting of Anomalous Commands (UHAC) Framework
  2. Unsupervised Detection of Anomalies Using Word2Vec
  3. Implementing AI in Forecasting Cybersecurity Threats

Track 2

  1. Dine In or Take Out? Trends on Restaurant Service Demand Amid the COVID-19 Pandemic
  2. Predictive Resilience of Interdependent Water and Transportation Infrastructures: A Sociotechnical Approach
  3. Stochastic Optimization and Generalized Disjunctive Programming Applied to Power System Dynamics for
    Grid Resilience
  4. Distributionally Risk-receptive and Risk-averse Network Interdiction Problems with General Ambiguity Set

Track 3

  1. Systems Resilience Enhancement and Time-based Stochastic Process of Contingencies in Networked Microgrids
  2. Improving Resilience of Cyber-physical Systems with Data-driven Prior
  3. Algebraic Topology of Power Grid Resilience: Persistence Homology Technique

Track 4

  1. Continuous Patrolling Games
  2. Reducing the Frequency and Lethality of Mass Attacks
  3. Impacts of Communication Structures on Infrastructure Systems Resilience: An Agent-based Simulation Approach
2:30-2:45pm Coffee break
2:45-3:40pm Keynote: Rajan Batta, University at Buffalo
3:40-4pm Coffee
4-5:30pm

Parallel Sessions TC

Track 1

  1. Probabilistically Resilient Multi-robot Informative Path Planning
  2. Attacker-defender Maximum Coverage Location Problem with Partial Coverage and Spatial Demand
  3. Multiple Camera View-frame Placement in the Presence of an Adversary

Track 2

  1. Supply Chain Cybersecurity and Resilience for Internet of Things
  2. Information Flow in Blockchain Enabled Supply Chain Using Hyperledger
  3. Hybrid Supplier Risk Assessment and Identification Methodology for Government Purchasers

Track 3

  1. Electric Power Grid Resilience to Insider Threats
  2. Monodromy vs. Homotopy in Power Flow Algebraic Solution in Real-time Operation of Electric Power System
  3. Transfer Learning for Enhancing Power System’s Stability and Security Under Planned Network Topological Changes
  4. Understanding the Impact of Zero-day Cyberattack on Electric Mobility-on-demand System

Track 4

  1. A Verification Framework for Certifying Learning-based Safety-critical Aviation Systems
  2. Semantic AI Security in CPS: The Case of Autonomous Driving
  3. Online Learning-based Model Predictive Trajectory Control for Connected and Autonomous Vehicles
  4. Small Unmanned Aerial Systems (sUAS) Technology Testbed Enabling Homeland Protection Missions