{"id":197,"date":"2019-11-15T18:38:20","date_gmt":"2019-11-15T18:38:20","guid":{"rendered":"https:\/\/meetings.informs.org\/wordpress\/2022security\/?page_id=197"},"modified":"2023-12-05T18:28:31","modified_gmt":"2023-12-05T18:28:31","slug":"agenda","status":"publish","type":"page","link":"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/","title":{"rendered":"Agenda"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-197\" data-postid=\"197\" class=\"themify_builder_content themify_builder_content-197 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_4wdt575 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_bk7b576 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_ic4b124   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h3>Sunday, August 28<\/h3>\n<table class=\"regTable\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"20%\">3-5pm<\/td>\n<td width=\"40%\">Registration<\/td>\n<td width=\"40%\">\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-1cebb1f1-3fc0-42be-8193-e37096e6ac21\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-1cebb1f1-3fc0-42be-8193-e37096e6ac21\" class=\"hs-cta-node hs-cta-1cebb1f1-3fc0-42be-8193-e37096e6ac21\"><!-- [if lte IE 8]><\/p>\n<div id=\"hs-cta-ie-element\"><\/div>\n<p><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/3449182\/1cebb1f1-3fc0-42be-8193-e37096e6ac21\"><img decoding=\"async\" id=\"hs-cta-img-1cebb1f1-3fc0-42be-8193-e37096e6ac21\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/3449182\/1cebb1f1-3fc0-42be-8193-e37096e6ac21.png\" alt=\"View All Presentations\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(3449182, '1cebb1f1-3fc0-42be-8193-e37096e6ac21', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<p>&nbsp;<\/p>\n<p><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-a4338481-e1f1-4d26-b5a3-8aacaaeb9daf\"><span class=\"hs-cta-node hs-cta-a4338481-e1f1-4d26-b5a3-8aacaaeb9daf\" id=\"hs-cta-a4338481-e1f1-4d26-b5a3-8aacaaeb9daf\"><!--[if lte IE 8]><\/p>\n<div id=\"hs-cta-ie-element\"><\/div>\n<p><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/3449182\/a4338481-e1f1-4d26-b5a3-8aacaaeb9daf\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-a4338481-e1f1-4d26-b5a3-8aacaaeb9daf\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/3449182\/a4338481-e1f1-4d26-b5a3-8aacaaeb9daf.png\" alt=\"Download the full program\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(3449182, 'a4338481-e1f1-4d26-b5a3-8aacaaeb9daf', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n    <\/div>\n<\/div>\n<!-- \/module text --><!-- module text -->\n<div  class=\"module module-text tb_oo61535   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h3>Monday, August 29<\/h3>\n<table class=\"regTable\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>8:30am-5:30pm<\/td>\n<td>Exhibit Hall open<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">9-10:10am<\/td>\n<td width=\"80%\">Welcome &amp; Keynote: <a href=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#schwartz\" data-feathr-click-track=\"true\">General Norton Schwartz<\/a>, IDA<\/td>\n<\/tr>\n<tr>\n<td>10:10-10:30am<\/td>\n<td>Coffee break<\/td>\n<\/tr>\n<tr>\n<td>10:30am-12noon<\/td>\n<td>\n<div id=\"accordion\">\n<p class=\"accordion-toggle\">Parallel Sessions MA<\/p>\n<div class=\"accordion-content default\">\n<div class=\"entry\">\n<p class=\"track\">Track 1<\/p>\n<ol>\n<li>The Effect of a Ransomware Attack on the Public Opinion of a Company: Sentiment Analysis of Twitter Data<\/li>\n<li>Characterizing Decentralized System Architectures and Their Influence on Performance and Other Outcomes<\/li>\n<li>Human Trafficking Interdiction with Decision Dependent Success<\/li>\n<li>Cybersecurity Platform Selection: A Multicriteria Decision Making Approach<\/li>\n<\/ol>\n<\/div>\n<div class=\"entry\">\n<p class=\"track\">Track 2<\/p>\n<ol>\n<li>Resource Allocation for Crime Deterrence in Urban Policing<\/li>\n<li>The Treatment Programs Assignment and Scheduling Problem and its Application in the Pennsylvania Department of Corrections<\/li>\n<li>Following the Trail: A Moving Target Search Using Canines<\/li>\n<li>A Game-theoretic Framework for Multitarget, Multilayer Defense Against Strategic Attackers<\/li>\n<\/ol>\n<\/div>\n<div class=\"entry\">\n<p class=\"track\">Track 3<\/p>\n<ol>\n<li>Enhancing Community Resilience Under Tornado Hazards: A Two-stage Robust Optimization Approach<\/li>\n<li>Joint Initial Dispatching of Official Responders and Registered Volunteers During Catastrophic Mass-casualty Incidents<\/li>\n<li>Electronic Health Records (EHRs) Security<\/li>\n<li>Robust Individualized Decision Learning with Sensitive Variables<\/li>\n<\/ol>\n<\/div>\n<div class=\"entry\">\n<p class=\"track\">Track 4<\/p>\n<ol>\n<li>Naval Defense Resource Allocation Problem Under Random Threats<\/li>\n<li>Optimizing the Location of Sensors and Block Placement for Detecting Suspicious Targets<\/li>\n<li>Optimal Placement of Ballot Drop Boxes<\/li>\n<li>Aircraft Selection in the Response to the Venezuelan Migrant Crisis in 2018: A Case of the Brazilian Air Force<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td>12noon-1pm<\/td>\n<td>Lunch<\/td>\n<\/tr>\n<tr>\n<td>1-2:30pm<\/td>\n<td>NSF Program Managers Panel<\/td>\n<\/tr>\n<tr>\n<td>2:30-2:45pm<\/td>\n<td>Coffee break<\/td>\n<\/tr>\n<tr>\n<td>2:45-3:40pm<\/td>\n<td>Keynote: <a href=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#lospinoso\" data-feathr-click-track=\"true\">Josh Lospinoso<\/a>, Shift 5<\/td>\n<\/tr>\n<tr>\n<td>3:40-4pm<\/td>\n<td>Coffee<\/td>\n<\/tr>\n<tr>\n<td>4-5:30pm<\/td>\n<td>\n<div id=\"accordion\">\n<p class=\"accordion-toggle\">Parallel Sessions MC<\/p>\n<div class=\"accordion-content default\">\n<div class=\"entry\">\n<p class=\"track\">Track 1<\/p>\n<ol>\n<li>Electric Power Grid Resilience to Load Redistribution Cyber Attacks Under Attacker\u2019s Behavioral Uncertainty<\/li>\n<li>Controlling Cascading Failures in the Power Grid<\/li>\n<li>Mitigating Cybersecurity Risks in Electric Grids with a High Penetration of Distributed Renewables<\/li>\n<li>High Voltage Substation Physical Security and Protection Against Substation Attacks<\/li>\n<\/ol>\n<\/div>\n<div class=\"entry\">\n<p class=\"track\">Track 2<\/p>\n<ol>\n<li>Identifying Vulnerable Package Dependencies with Named Entity Recognition<\/li>\n<li>Game-theoretic Approach to Defending Against Advanced Persistent Threats: From Cybersecurity to Cyber Resilience<\/li>\n<li>Innovative Use of Cyber Tools<\/li>\n<li>A Hypergraph-based Machine Learning Ensemble Intrusion Detection System<\/li>\n<\/ol>\n<\/div>\n<div class=\"entry\">\n<p class=\"track\">Track 3<\/p>\n<ol>\n<li>Survival Optimization Models for Emergency Medical Services<\/li>\n<li>Emergency Hospital Care Capacity Estimation for Surge<\/li>\n<li>Dynamic Capacity Management for Deferred Surgeries<\/li>\n<li>Policies for Sudden Demand Surges in Medical Supplies: Healthcare Supply Chain Impacts<\/li>\n<\/ol>\n<\/div>\n<div class=\"entry\">\n<p class=\"track\">Track 4<\/p>\n<ol>\n<li>Maximizing Node Activation Network Flow Problems Under Nonsimultaneous Flow Assumptions<\/li>\n<li>Optimizing Cooperative Interdependent Attack Graphs to Compromise Network Infrastructures<\/li>\n<li>Optimizing for Equity in Urban Planning<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td>6:30-8pm<\/td>\n<td>Reception<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n    <\/div>\n<\/div>\n<!-- \/module text --><!-- module text -->\n<div  class=\"module module-text tb_gngg118   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h3>Tuesday, August 30<\/h3>\n<table class=\"regTable\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"20%\">9-10:10am<\/td>\n<td width=\"80%\">Keynote: <a href=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#royset\" data-feathr-click-track=\"true\">Joannes O. Royset<\/a>, Naval Postgraduate School<\/td>\n<\/tr>\n<tr>\n<td>9:30am-4:15pm<\/td>\n<td>Exhibit Hall open<\/td>\n<\/tr>\n<tr>\n<td>10:10-10:30am<\/td>\n<td>Coffee break<\/td>\n<\/tr>\n<tr>\n<td>10:30am-12noon<\/td>\n<td>\n<div id=\"accordion\">\n<p class=\"accordion-toggle\">Parallel Sessions TA<\/p>\n<div class=\"accordion-content default\">\n<div class=\"entry\">\n<p class=\"track\">Track 1<\/p>\n<ol>\n<li>Allocating Continuous Protection Resources to Facilities when the Effect of Protection is Uncertain<\/li>\n<li>Network Resilience Models for Security Applications: Beyond Density and Degree-ness<\/li>\n<li>Solution Support Systems for Managing Rolling Crises<\/li>\n<\/ol>\n<\/div>\n<div class=\"entry\">\n<p class=\"track\">Track 2<\/p>\n<ol>\n<li>Resource Coordination for Network Flow Interdiction<\/li>\n<li>Strategic Coordination of Detection Resources for Monitoring Critical Infrastructure Networks Against Attacks<\/li>\n<li>Multifirm Models of Cybersecurity Investment: Competition vs. Cooperation<\/li>\n<\/ol>\n<\/div>\n<div class=\"entry\">\n<p class=\"track\">Track 3<\/p>\n<ol>\n<li>Improving Logistic Regression on the Imbalanced Data by a Novel Penalized Log-likelihood Function<\/li>\n<li>Wavelet-based Architecture for Data Confidentiality, Integrity, and Availability<\/li>\n<li>Predicting Public Knowledge of Secure Cyber Practices<\/li>\n<li>Differentially Private Federated Learning: Algorithms and Open-source Software Framework<\/li>\n<\/ol>\n<\/div>\n<div class=\"entry\">\n<p class=\"track\">Track 4<\/p>\n<ol>\n<li>Planning for Army Readiness Using Lot Streaming<\/li>\n<li>Convoy Resupply Planning Using Fixed-parameter Tractable Algorithms for Lot-sizing with Heterogeneous Ground Vehicles<\/li>\n<li>Optimal Allocation of Tactical Search Units in Undersea Warfare<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td>12noon-1pm<\/td>\n<td>Lunch<\/td>\n<\/tr>\n<tr>\n<td>1-2:30pm<\/td>\n<td>\n<div id=\"accordion\">\n<p class=\"accordion-toggle\">Parallel Sessions TB<\/p>\n<div class=\"accordion-content default\">\n<div class=\"entry\">\n<p class=\"track\">Track 1<\/p>\n<ol>\n<li>Unsupervised Hunting of Anomalous Commands (UHAC) Framework<\/li>\n<li>Unsupervised Detection of Anomalies Using Word2Vec<\/li>\n<li>Implementing AI in Forecasting Cybersecurity Threats<\/li>\n<\/ol>\n<\/div>\n<div class=\"entry\">\n<p class=\"track\">Track 2<\/p>\n<ol>\n<li>Dine In or Take Out? Trends on Restaurant Service Demand Amid the COVID-19 Pandemic<\/li>\n<li>Predictive Resilience of Interdependent Water and Transportation Infrastructures: A Sociotechnical Approach<\/li>\n<li>Stochastic Optimization and Generalized Disjunctive Programming Applied to Power System Dynamics for<br \/>\nGrid Resilience<\/li>\n<li>Distributionally Risk-receptive and Risk-averse Network Interdiction Problems with General Ambiguity Set<\/li>\n<\/ol>\n<\/div>\n<div class=\"entry\">\n<p class=\"track\">Track 3<\/p>\n<ol>\n<li>Systems Resilience Enhancement and Time-based Stochastic Process of Contingencies in Networked Microgrids<\/li>\n<li>Improving Resilience of Cyber-physical Systems with Data-driven Prior<\/li>\n<li>Algebraic Topology of Power Grid Resilience: Persistence Homology Technique<\/li>\n<\/ol>\n<\/div>\n<div class=\"entry\">\n<p class=\"track\">Track 4<\/p>\n<ol>\n<li>Continuous Patrolling Games<\/li>\n<li>Reducing the Frequency and Lethality of Mass Attacks<\/li>\n<li>Impacts of Communication Structures on Infrastructure Systems Resilience: An Agent-based Simulation Approach<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td>2:30-2:45pm<\/td>\n<td>Coffee break<\/td>\n<\/tr>\n<tr>\n<td>2:45-3:40pm<\/td>\n<td>Keynote: <a href=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#batta\" data-feathr-click-track=\"true\">Rajan Batta<\/a>, University at Buffalo<\/td>\n<\/tr>\n<tr>\n<td>3:40-4pm<\/td>\n<td>Coffee<\/td>\n<\/tr>\n<tr>\n<td>4-5:30pm<\/td>\n<td>\n<div id=\"accordion\">\n<p class=\"accordion-toggle\">Parallel Sessions TC<\/p>\n<div class=\"accordion-content default\">\n<div class=\"entry\">\n<p class=\"track\">Track 1<\/p>\n<ol>\n<li>Probabilistically Resilient Multi-robot Informative Path Planning<\/li>\n<li>Attacker-defender Maximum Coverage Location Problem with Partial Coverage and Spatial Demand<\/li>\n<li>Multiple Camera View-frame Placement in the Presence of an Adversary<\/li>\n<\/ol>\n<\/div>\n<div class=\"entry\">\n<p class=\"track\">Track 2<\/p>\n<ol>\n<li>Supply Chain Cybersecurity and Resilience for Internet of Things<\/li>\n<li>Information Flow in Blockchain Enabled Supply Chain Using Hyperledger<\/li>\n<li>Hybrid Supplier Risk Assessment and Identification Methodology for Government Purchasers<\/li>\n<\/ol>\n<\/div>\n<div class=\"entry\">\n<p class=\"track\">Track 3<\/p>\n<ol>\n<li>Electric Power Grid Resilience to Insider Threats<\/li>\n<li>Monodromy vs. Homotopy in Power Flow Algebraic Solution in Real-time Operation of Electric Power System<\/li>\n<li>Transfer Learning for Enhancing Power System\u2019s Stability and Security Under Planned Network Topological Changes<\/li>\n<li>Understanding the Impact of Zero-day Cyberattack on Electric Mobility-on-demand System<\/li>\n<\/ol>\n<\/div>\n<div class=\"entry\">\n<p class=\"track\">Track 4<\/p>\n<ol>\n<li>A Verification Framework for Certifying Learning-based Safety-critical Aviation Systems<\/li>\n<li>Semantic AI Security in CPS: The Case of Autonomous Driving<\/li>\n<li>Online Learning-based Model Predictive Trajectory Control for Connected and Autonomous Vehicles<\/li>\n<li>Small Unmanned Aerial Systems (sUAS) Technology Testbed Enabling Homeland Protection Missions<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Sunday, August 28 3-5pm Registration &nbsp;<\/p>\n","protected":false},"author":1001077,"featured_media":440,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-197","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Agenda - 2022 INFORMS Conference on Security<\/title>\n<meta name=\"description\" content=\"Check for the most up-to-date plans for the 2022 INFORMS Conference on Security including sessions, keynotes and the Monday reception.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Agenda\" \/>\n<meta property=\"og:description\" content=\"Check for the most up-to-date plans for the 2022 INFORMS Conference on Security including sessions, keynotes and the Monday reception.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/\" \/>\n<meta property=\"og:site_name\" content=\"2022 INFORMS Conference on Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/INFORMSpage\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-05T18:28:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"136\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@INFORMS\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/\",\"url\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/\",\"name\":\"Agenda - 2022 INFORMS Conference on Security\",\"isPartOf\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\",\"datePublished\":\"2019-11-15T18:38:20+00:00\",\"dateModified\":\"2023-12-05T18:28:31+00:00\",\"description\":\"Check for the most up-to-date plans for the 2022 INFORMS Conference on Security including sessions, keynotes and the Monday reception.\",\"breadcrumb\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/#primaryimage\",\"url\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\",\"contentUrl\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\",\"width\":400,\"height\":136},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Agenda\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#website\",\"url\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/\",\"name\":\"2022 INFORMS Conference on Security\",\"description\":\"Arlington, VA | August 29-30, 2022\",\"publisher\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#organization\",\"name\":\"2022 INFORMS Conference on Security\",\"url\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\",\"contentUrl\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\",\"width\":400,\"height\":136,\"caption\":\"2022 INFORMS Conference on Security\"},\"image\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/INFORMSpage\/\",\"https:\/\/x.com\/INFORMS\",\"https:\/\/www.instagram.com\/informs_orms\",\"https:\/\/www.linkedin.com\/groups\/82644\/profile\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Agenda - 2022 INFORMS Conference on Security","description":"Check for the most up-to-date plans for the 2022 INFORMS Conference on Security including sessions, keynotes and the Monday reception.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/","og_locale":"en_US","og_type":"article","og_title":"Agenda","og_description":"Check for the most up-to-date plans for the 2022 INFORMS Conference on Security including sessions, keynotes and the Monday reception.","og_url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/","og_site_name":"2022 INFORMS Conference on Security","article_publisher":"https:\/\/www.facebook.com\/INFORMSpage\/","article_modified_time":"2023-12-05T18:28:31+00:00","og_image":[{"width":400,"height":136,"url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@INFORMS","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/","url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/","name":"Agenda - 2022 INFORMS Conference on Security","isPartOf":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#website"},"primaryImageOfPage":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/#primaryimage"},"image":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/#primaryimage"},"thumbnailUrl":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","datePublished":"2019-11-15T18:38:20+00:00","dateModified":"2023-12-05T18:28:31+00:00","description":"Check for the most up-to-date plans for the 2022 INFORMS Conference on Security including sessions, keynotes and the Monday reception.","breadcrumb":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/#primaryimage","url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","contentUrl":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","width":400,"height":136},{"@type":"BreadcrumbList","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/agenda\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/meetings.informs.org\/wordpress\/2022security\/"},{"@type":"ListItem","position":2,"name":"Agenda"}]},{"@type":"WebSite","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#website","url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/","name":"2022 INFORMS Conference on Security","description":"Arlington, VA | August 29-30, 2022","publisher":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/meetings.informs.org\/wordpress\/2022security\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#organization","name":"2022 INFORMS Conference on Security","url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#\/schema\/logo\/image\/","url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","contentUrl":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","width":400,"height":136,"caption":"2022 INFORMS Conference on Security"},"image":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/INFORMSpage\/","https:\/\/x.com\/INFORMS","https:\/\/www.instagram.com\/informs_orms","https:\/\/www.linkedin.com\/groups\/82644\/profile"]}]}},"builder_content":"<h3>Sunday, August 28<\/h3> <table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\"> <tbody> <tr> <td width=\"20%\">3-5pm<\/td> <td width=\"40%\">Registration<\/td> <td width=\"40%\"> <p><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/3449182\/1cebb1f1-3fc0-42be-8193-e37096e6ac21\"><img decoding=\"async\" id=\"hs-cta-img-1cebb1f1-3fc0-42be-8193-e37096e6ac21\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/3449182\/1cebb1f1-3fc0-42be-8193-e37096e6ac21.png\" alt=\"View All Presentations\" \/><\/a><\/p> <p>&nbsp;<\/p> <p><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/3449182\/a4338481-e1f1-4d26-b5a3-8aacaaeb9daf\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" id=\"hs-cta-img-a4338481-e1f1-4d26-b5a3-8aacaaeb9daf\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/3449182\/a4338481-e1f1-4d26-b5a3-8aacaaeb9daf.png\" alt=\"Download the full program\"\/><\/a> <\/td> <\/tr> <\/tbody> <\/table>\n<h3>Monday, August 29<\/h3> <table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\"> <tbody> <tr> <td>8:30am-5:30pm<\/td> <td>Exhibit Hall open<\/td> <\/tr> <tr> <td width=\"20%\">9-10:10am<\/td> <td width=\"80%\">Welcome &amp; Keynote: <a href=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#schwartz\" data-feathr-click-track=\"true\">General Norton Schwartz<\/a>, IDA<\/td> <\/tr> <tr> <td>10:10-10:30am<\/td> <td>Coffee break<\/td> <\/tr> <tr> <td>10:30am-12noon<\/td> <td>\n<p>Parallel Sessions MA<\/p>\n<p>Track 1<\/p> <ol> <li>The Effect of a Ransomware Attack on the Public Opinion of a Company: Sentiment Analysis of Twitter Data<\/li> <li>Characterizing Decentralized System Architectures and Their Influence on Performance and Other Outcomes<\/li> <li>Human Trafficking Interdiction with Decision Dependent Success<\/li> <li>Cybersecurity Platform Selection: A Multicriteria Decision Making Approach<\/li> <\/ol>\n<p>Track 2<\/p> <ol> <li>Resource Allocation for Crime Deterrence in Urban Policing<\/li> <li>The Treatment Programs Assignment and Scheduling Problem and its Application in the Pennsylvania Department of Corrections<\/li> <li>Following the Trail: A Moving Target Search Using Canines<\/li> <li>A Game-theoretic Framework for Multitarget, Multilayer Defense Against Strategic Attackers<\/li> <\/ol>\n<p>Track 3<\/p> <ol> <li>Enhancing Community Resilience Under Tornado Hazards: A Two-stage Robust Optimization Approach<\/li> <li>Joint Initial Dispatching of Official Responders and Registered Volunteers During Catastrophic Mass-casualty Incidents<\/li> <li>Electronic Health Records (EHRs) Security<\/li> <li>Robust Individualized Decision Learning with Sensitive Variables<\/li> <\/ol>\n<p>Track 4<\/p> <ol> <li>Naval Defense Resource Allocation Problem Under Random Threats<\/li> <li>Optimizing the Location of Sensors and Block Placement for Detecting Suspicious Targets<\/li> <li>Optimal Placement of Ballot Drop Boxes<\/li> <li>Aircraft Selection in the Response to the Venezuelan Migrant Crisis in 2018: A Case of the Brazilian Air Force<\/li> <\/ol>\n<\/td> <\/tr> <tr> <td>12noon-1pm<\/td> <td>Lunch<\/td> <\/tr> <tr> <td>1-2:30pm<\/td> <td>NSF Program Managers Panel<\/td> <\/tr> <tr> <td>2:30-2:45pm<\/td> <td>Coffee break<\/td> <\/tr> <tr> <td>2:45-3:40pm<\/td> <td>Keynote: <a href=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#lospinoso\" data-feathr-click-track=\"true\">Josh Lospinoso<\/a>, Shift 5<\/td> <\/tr> <tr> <td>3:40-4pm<\/td> <td>Coffee<\/td> <\/tr> <tr> <td>4-5:30pm<\/td> <td>\n<p>Parallel Sessions MC<\/p>\n<p>Track 1<\/p> <ol> <li>Electric Power Grid Resilience to Load Redistribution Cyber Attacks Under Attacker\u2019s Behavioral Uncertainty<\/li> <li>Controlling Cascading Failures in the Power Grid<\/li> <li>Mitigating Cybersecurity Risks in Electric Grids with a High Penetration of Distributed Renewables<\/li> <li>High Voltage Substation Physical Security and Protection Against Substation Attacks<\/li> <\/ol>\n<p>Track 2<\/p> <ol> <li>Identifying Vulnerable Package Dependencies with Named Entity Recognition<\/li> <li>Game-theoretic Approach to Defending Against Advanced Persistent Threats: From Cybersecurity to Cyber Resilience<\/li> <li>Innovative Use of Cyber Tools<\/li> <li>A Hypergraph-based Machine Learning Ensemble Intrusion Detection System<\/li> <\/ol>\n<p>Track 3<\/p> <ol> <li>Survival Optimization Models for Emergency Medical Services<\/li> <li>Emergency Hospital Care Capacity Estimation for Surge<\/li> <li>Dynamic Capacity Management for Deferred Surgeries<\/li> <li>Policies for Sudden Demand Surges in Medical Supplies: Healthcare Supply Chain Impacts<\/li> <\/ol>\n<p>Track 4<\/p> <ol> <li>Maximizing Node Activation Network Flow Problems Under Nonsimultaneous Flow Assumptions<\/li> <li>Optimizing Cooperative Interdependent Attack Graphs to Compromise Network Infrastructures<\/li> <li>Optimizing for Equity in Urban Planning<\/li> <\/ol>\n<\/td> <\/tr> <tr> <td>6:30-8pm<\/td> <td>Reception<\/td> <\/tr> <\/tbody> <\/table>\n<h3>Tuesday, August 30<\/h3> <table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\"> <tbody> <tr> <td width=\"20%\">9-10:10am<\/td> <td width=\"80%\">Keynote: <a href=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#royset\" data-feathr-click-track=\"true\">Joannes O. Royset<\/a>, Naval Postgraduate School<\/td> <\/tr> <tr> <td>9:30am-4:15pm<\/td> <td>Exhibit Hall open<\/td> <\/tr> <tr> <td>10:10-10:30am<\/td> <td>Coffee break<\/td> <\/tr> <tr> <td>10:30am-12noon<\/td> <td>\n<p>Parallel Sessions TA<\/p>\n<p>Track 1<\/p> <ol> <li>Allocating Continuous Protection Resources to Facilities when the Effect of Protection is Uncertain<\/li> <li>Network Resilience Models for Security Applications: Beyond Density and Degree-ness<\/li> <li>Solution Support Systems for Managing Rolling Crises<\/li> <\/ol>\n<p>Track 2<\/p> <ol> <li>Resource Coordination for Network Flow Interdiction<\/li> <li>Strategic Coordination of Detection Resources for Monitoring Critical Infrastructure Networks Against Attacks<\/li> <li>Multifirm Models of Cybersecurity Investment: Competition vs. Cooperation<\/li> <\/ol>\n<p>Track 3<\/p> <ol> <li>Improving Logistic Regression on the Imbalanced Data by a Novel Penalized Log-likelihood Function<\/li> <li>Wavelet-based Architecture for Data Confidentiality, Integrity, and Availability<\/li> <li>Predicting Public Knowledge of Secure Cyber Practices<\/li> <li>Differentially Private Federated Learning: Algorithms and Open-source Software Framework<\/li> <\/ol>\n<p>Track 4<\/p> <ol> <li>Planning for Army Readiness Using Lot Streaming<\/li> <li>Convoy Resupply Planning Using Fixed-parameter Tractable Algorithms for Lot-sizing with Heterogeneous Ground Vehicles<\/li> <li>Optimal Allocation of Tactical Search Units in Undersea Warfare<\/li> <\/ol>\n<\/td> <\/tr> <tr> <td>12noon-1pm<\/td> <td>Lunch<\/td> <\/tr> <tr> <td>1-2:30pm<\/td> <td>\n<p>Parallel Sessions TB<\/p>\n<p>Track 1<\/p> <ol> <li>Unsupervised Hunting of Anomalous Commands (UHAC) Framework<\/li> <li>Unsupervised Detection of Anomalies Using Word2Vec<\/li> <li>Implementing AI in Forecasting Cybersecurity Threats<\/li> <\/ol>\n<p>Track 2<\/p> <ol> <li>Dine In or Take Out? Trends on Restaurant Service Demand Amid the COVID-19 Pandemic<\/li> <li>Predictive Resilience of Interdependent Water and Transportation Infrastructures: A Sociotechnical Approach<\/li> <li>Stochastic Optimization and Generalized Disjunctive Programming Applied to Power System Dynamics for<br \/> Grid Resilience<\/li> <li>Distributionally Risk-receptive and Risk-averse Network Interdiction Problems with General Ambiguity Set<\/li> <\/ol>\n<p>Track 3<\/p> <ol> <li>Systems Resilience Enhancement and Time-based Stochastic Process of Contingencies in Networked Microgrids<\/li> <li>Improving Resilience of Cyber-physical Systems with Data-driven Prior<\/li> <li>Algebraic Topology of Power Grid Resilience: Persistence Homology Technique<\/li> <\/ol>\n<p>Track 4<\/p> <ol> <li>Continuous Patrolling Games<\/li> <li>Reducing the Frequency and Lethality of Mass Attacks<\/li> <li>Impacts of Communication Structures on Infrastructure Systems Resilience: An Agent-based Simulation Approach<\/li> <\/ol>\n<\/td> <\/tr> <tr> <td>2:30-2:45pm<\/td> <td>Coffee break<\/td> <\/tr> <tr> <td>2:45-3:40pm<\/td> <td>Keynote: <a href=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#batta\" data-feathr-click-track=\"true\">Rajan Batta<\/a>, University at Buffalo<\/td> <\/tr> <tr> <td>3:40-4pm<\/td> <td>Coffee<\/td> <\/tr> <tr> <td>4-5:30pm<\/td> <td>\n<p>Parallel Sessions TC<\/p>\n<p>Track 1<\/p> <ol> <li>Probabilistically Resilient Multi-robot Informative Path Planning<\/li> <li>Attacker-defender Maximum Coverage Location Problem with Partial Coverage and Spatial Demand<\/li> <li>Multiple Camera View-frame Placement in the Presence of an Adversary<\/li> <\/ol>\n<p>Track 2<\/p> <ol> <li>Supply Chain Cybersecurity and Resilience for Internet of Things<\/li> <li>Information Flow in Blockchain Enabled Supply Chain Using Hyperledger<\/li> <li>Hybrid Supplier Risk Assessment and Identification Methodology for Government Purchasers<\/li> <\/ol>\n<p>Track 3<\/p> <ol> <li>Electric Power Grid Resilience to Insider Threats<\/li> <li>Monodromy vs. Homotopy in Power Flow Algebraic Solution in Real-time Operation of Electric Power System<\/li> <li>Transfer Learning for Enhancing Power System\u2019s Stability and Security Under Planned Network Topological Changes<\/li> <li>Understanding the Impact of Zero-day Cyberattack on Electric Mobility-on-demand System<\/li> <\/ol>\n<p>Track 4<\/p> <ol> <li>A Verification Framework for Certifying Learning-based Safety-critical Aviation Systems<\/li> <li>Semantic AI Security in CPS: The Case of Autonomous Driving<\/li> <li>Online Learning-based Model Predictive Trajectory Control for Connected and Autonomous Vehicles<\/li> <li>Small Unmanned Aerial Systems (sUAS) Technology Testbed Enabling Homeland Protection Missions<\/li> <\/ol>\n<\/td> <\/tr> <\/tbody> <\/table>\n<p><strong><u>NSF Program:<\/u><\/strong> Humans, Disasters, and the Built Environment (HDBE)<\/p> <p>The HDBE program supports fundamental, multidisciplinary research on the interactions between humans and the built environment within and among communities exposed to natural, technological and other types of hazards and disasters. The program's context is provided by ongoing and emerging changes in three interwoven elements of a community: its population, its built environment (critical infrastructures, physical and virtual spaces, and buildings and related structures) and the hazards and disasters to which it is exposed. The HDBE program seeks research that integrates these elements and that can contribute to theories that hold over a broad range of scales and conditions. Examples include but are not limited to unified frameworks and theoretical models that encompass non-hazard to extreme hazard and disaster conditions, theoretical and empirical studies that consider how interactions between a community's population and its built environment may suppress or amplify hazard exposure or its effects, and studies that seek to inform scholarship through the development of shared data and related resources. In these and other areas funded through the HDBE program, research that challenges conventional wisdom on the interactions among humans, the built environment and hazards and disasters is particularly encouraged. Given the richness of the phenomena under study, the HDBE program seeks research that advances theories, methods and data within and across diverse disciplines, whether in engineering, the social sciences, computing or other relevant fields. Ultimately, research funded through this program is expected to inform how communities can cultivate and engage a broad range of physical, social and other resources to ensure improved quality of life for their inhabitants.<\/p> <p><strong><u>NSF Program:<\/u><\/strong> Civil Infrastructure Systems (CIS),Cyber Physical Systems (CPS) and Smart and Connected Communities.<\/p>","_links":{"self":[{"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/pages\/197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/users\/1001077"}],"replies":[{"embeddable":true,"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/comments?post=197"}],"version-history":[{"count":63,"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/pages\/197\/revisions"}],"predecessor-version":[{"id":890,"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/pages\/197\/revisions\/890"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/media\/440"}],"wp:attachment":[{"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/media?parent=197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}