{"id":636,"date":"2022-04-20T18:03:31","date_gmt":"2022-04-20T18:03:31","guid":{"rendered":"https:\/\/meetings.informs.org\/wordpress\/2022security\/?page_id=636"},"modified":"2022-08-29T11:27:12","modified_gmt":"2022-08-29T11:27:12","slug":"speakers","status":"publish","type":"page","link":"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/","title":{"rendered":"Speakers"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-636\" data-postid=\"636\" class=\"themify_builder_content themify_builder_content-636 themify_builder tf_clear\">\n                    <div  data-anchor=\"keynotes\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-keynotes tb_9e8g390 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col4-3 tb_t0lq390 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_4245355   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>Keynotes<\/h2>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col4-1 tb_togq541 last\">\n                            <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"schwartz\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-schwartz tb_fupi792 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col4-3 tb_5upj794 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_2 tb_k6hp327\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-3 tb_v1tg328 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_5atc842   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>IDA and the FFRDC Research Ecosystem<\/h2>\n<h3>General Norton Schwartz<\/h3>\n<p><b>President,\u00a0<span style=\"background-color: initial; font-size: 1em;\">Institute for Defense Analyses<\/span><\/b><\/p>\n<p>The security environment has shifted and evolved since the establishment of the Department of Defense, Joint Staff and Combatant Command structure after the conclusion of World War II in 1947.\u00a0 The establishment of the structure for joint warfighting provided new opportunities for analytic support to the newly formed department of defense.\u00a0 The Institute for Defense Analyses (IDA) was created in 1956 to provide analyses in support of the new department.\u00a0 IDA\u2019s mission is to answer the most challenging U.S. security and science policy questions with objective analysis leveraging extraordinary scientific, technical, and analytic expertise. As a manager of three Federally Funded Research and Development Centers (FFRDC), IDA is part of a network of analytic agencies funded by the Department of Defense, Department of Energy, Homeland Security, National Science Foundation, and other executive agencies to support the variety security issues faced by the United States. This network of FFRDCs provide a vast array of opportunity to perform research and analyses in support of the United States. We will discuss these opportunities and some of the recent analyses performed by our three FFRDCs, IDA Systems and Analyses Center, IDA Science and Technology Policy Institute and the IDA Center for Communications and Computing. We will highlight research and career opportunities and research areas with the potential for significant impact.<\/p>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module accordion -->\n<div  class=\"module module-accordion tb_0tr9710 \" data-behavior=\"toggle\" data-lazy=\"1\">\n    \n    <ul class=\"ui module-accordion   transparent\">\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-0tr9710-0\" class=\"tb_title_accordion\" aria-controls=\"acc-0tr9710-0-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-fas-plus\" aria-hidden=\"true\"><use href=\"#tf-fas-plus\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-fas-minus\" aria-hidden=\"true\"><use href=\"#tf-fas-minus\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">About Norton Schwartz<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-0tr9710-0-content\" data-id=\"acc-0tr9710-0\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Norton A. Schwartz serves as President of the Institute for Defense Analyses (IDA), a nonprofit corporation operating in the public interest. IDA manages three Federally Funded Research and Development Centers that answer the most challenging U.S. security and science policy questions with objective analysis leveraging extraordinary scientific, technical, and analytic expertise. At IDA, General Schwartz (U.S. Air Force, retired) directs the activities of more than 1,000 scientists and technologists employed by IDA.<\/p>\n<p>General Schwartz has a long and prestigious career of service and leadership that spans over five decades. He was most recently President and CEO of Business Executives for National Security (BENS). During his six-year tenure at BENS, he was also a member of IDA\u2019s Board of Trustees.<\/p>\n<p>Prior to retiring from the U.S. Air Force, General Schwartz served as the 19th Chief of Staff of the U.S. Air Force from 2008 to 2012. He previously held senior joint positions as Director of the Joint Staff and as the Commander of the U.S. Transportation Command. He began his service as a pilot with the airlift evacuation out of Vietnam in 1975.<\/p>\n<p>General Schwartz is a U.S. Air Force Academy graduate and holds a master\u2019s degree in business administration from Central Michigan University. He is also an alumnus of the Armed Forces Staff College and the National War College.<\/p>\n<p>He is a member of the Council on Foreign Relations and a 1994 Fellow of Massachusetts Institute of Technology\u2019s Seminar XXI. General Schwartz has been married to Suzie since 1981.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n        <\/ul>\n\n<\/div><!-- \/module accordion -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-1 tb_e2rv328 last\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_3mo0859 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Norty-Schwartz.jpg\" class=\"wp-post-image wp-image-649\" title=\"Norty-Schwartz\" alt=\"Norty Schwartz headshot\" srcset=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Norty-Schwartz.jpg 300w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Norty-Schwartz-150x150.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <\/div>\n                <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col4-1 tb_i1to662 last\">\n                            <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"lospinoso\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-lospinoso tb_gnra448 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col4-3 tb_u6qr449 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_2 tb_oxw2449\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-3 tb_frvg449 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_o4am449   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>Cybersecurity for Planes, Trains, and Tanks<\/h2>\n<h3>Josh Lospinoso<\/h3>\n<p><b>CEO,\u00a0Shift5<\/b><\/p>\n<p>DoD Weapon Systems are choc-full of digital components. They are more networked and software dependent than ever before, but generally these systems were never designed with cybersecurity in mind. In recent operational testing, the DoD routinely found mission-critical cyber vulnerabilities. Disconcertingly simple tools and techniques were often enough for penetration testers to take control of weapon systems. Fortunately, the DoD is beginning to take weapon system cybersecurity seriously, but we have a long way to go as a cybersecurity community in developing solutions to address this dangerous new threat frontier. Additionally, civilian transportation assets like commercial aircraft, maritime vessels, freight\/passenger rail, satellites, and road vehicles have corollary cybersecurity issues. As critical infrastructure, these systems are simultaneously more important and more vulnerable than ever before. In this talk, Josh will discuss how we got here, the magnitude of the problem, and what\u2019s required to begin paying the debt.<\/p>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module accordion -->\n<div  class=\"module module-accordion tb_31fh235 \" data-behavior=\"toggle\" data-lazy=\"1\">\n    \n    <ul class=\"ui module-accordion   transparent\">\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-31fh235-0\" class=\"tb_title_accordion\" aria-controls=\"acc-31fh235-0-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-fas-plus\" aria-hidden=\"true\"><use href=\"#tf-fas-plus\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-fas-minus\" aria-hidden=\"true\"><use href=\"#tf-fas-minus\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">About Josh Lospinoso<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-31fh235-0-content\" data-id=\"acc-31fh235-0\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Josh Lospinoso is CEO of Shift5, a cybersecurity company protecting the world\u2019s fleets from cyberattack. He is an entrepreneur with deep expertise in cybersecurity, data science, and system software engineering. In 2012, he co-founded RedOwl Analytics, an insider threat detection platform acquired by Raytheon\/Forcepoint in 2017.<\/p>\n<p>Josh is a US Army veteran, having served 10 years as a cyber officer leading teams to build dozens of cyber tools for the National Security Agency\u2019s Tailored Access Operations, Army Cyber Command, and the Cyber National Mission Force.<\/p>\n<p>Josh is the author of C++ Crash Course (No Starch Press, 2019), dozens of peer-reviewed journal articles spanning multiple disciplines, and multiple patents. He is a graduate of U.S. Army Ranger School, and he holds multiple degrees the United States Military Academy and a Ph.D. from the University of Oxford, where he was a Rhodes Scholar.<\/p>\n<p>He serves on the board of the American Association of Rhodes Scholars and is a member of the Programming Committee for the Hacker Initiative, a nonprofit supporting the worldwide hacker community. Josh is also a Venture Partner at First In, an early state investment firm.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n        <\/ul>\n\n<\/div><!-- \/module accordion -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-1 tb_agbw449 last\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_q1g1654 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Josh_Lospinoso.jpg\" class=\"wp-post-image wp-image-665\" title=\"Josh_Lospinoso\" alt=\"Josh Lospinoso headshot\" srcset=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Josh_Lospinoso.jpg 300w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Josh_Lospinoso-150x150.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <\/div>\n                <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col4-1 tb_fwhm450 last\">\n                            <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"royset\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-royset tb_1eqn229 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col4-3 tb_tkrw230 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_2 tb_vrlq230\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-3 tb_svyt231 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_c0q0231   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>Robustness and Conservativeness in Statistical Learning<\/h2>\n<h3>Johannes O. Royset<\/h3>\n<p><b>Professor of Operations Research, Naval Postgraduate School<\/b><\/p>\n<p>Despite impressive achievements over the last decade, statistical learning remains prone to errors when the training data is biased, corrupted, or mislabeled. Dr. Royset will discuss troubling situations from computer vision as well as military operations research and review approaches to enhance robustness and conservativeness. In particular, he proposes superquantile regression as an alternative to least-squares regression when the focus is on estimating distributional tail behavior.\u00a0 Computationally efficient approximations achieve robust training against adversarial interference. Diametrical risk minimization improves on classical empirical risk minimization by accounting for worst-case empirical risks within neighborhoods in a parameter space. He illustrates the empirical performance of the various approaches through examples such as training of neural networks using corrupted labels, and also discuss the theoretical performance of diametrical risk minimization under challenging non-convex, non-Lipschitz loss functions.<\/p>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module accordion -->\n<div  class=\"module module-accordion tb_we1c929 \" data-behavior=\"toggle\" data-lazy=\"1\">\n    \n    <ul class=\"ui module-accordion   transparent\">\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-we1c929-0\" class=\"tb_title_accordion\" aria-controls=\"acc-we1c929-0-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-fas-plus\" aria-hidden=\"true\"><use href=\"#tf-fas-plus\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-fas-minus\" aria-hidden=\"true\"><use href=\"#tf-fas-minus\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">About Johannes Royset<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-we1c929-0-content\" data-id=\"acc-we1c929-0\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Dr. Johannes O. Royset is a Professor of Operations Research at the Naval Postgraduate School. His research focuses on formulating and solving stochastic and deterministic optimization problems arising in data analytics, sensor management, and reliability engineering. Dr. Royset is the co-inventor of epi-splines, a functional approximation tool with wide applications in data fitting and forecasting, and of superquantile regression, second-order superquantile risk, and buffered probability. He was awarded a National Research Council postdoctoral fellowship in 2003, a Young Investigator Award from the Air Force Office of Scientific Research in 2007, and the Barchi Prize as well as the MOR Journal Award from the Military Operations Research Society in 2009. He received the Carl E. and Jessie W. Menneken Faculty Award for Excellence in Scientific Research in 2010 and the Goodeve Medal from the Operational Research Society in 2019. Dr. Royset was a plenary speaker at the International Conference on Stochastic Programming in 2016 and at the SIAM Conference on Uncertainty Quantification in 2018. He has a Doctor of Philosophy degree from the University of California at Berkeley (2002). Dr. Royset has been an associate or guest editor of\u00a0<em>SIAM Journal on Optimization<\/em>,\u00a0<em>Operations Research<\/em>,\u00a0<em>Mathematical Programming<\/em>,\u00a0<em>Journal of Optimization Theory and Applications<\/em>,\u00a0<em>Naval Research Logistics<\/em>,\u00a0<em>Journal of Convex Analysis<\/em>,\u00a0<em>Set-Valued and Variational Analysis<\/em>, and\u00a0<em>Computational Optimization and Applications<\/em>. He has published more than 90 papers and two books.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n        <\/ul>\n\n<\/div><!-- \/module accordion -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-1 tb_o2mh231 last\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_lm6s287 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Johannes-Royset.jpg\" class=\"wp-post-image wp-image-635\" title=\"Johannes-Royset\" alt=\"Johannes O. Royset headshot\" srcset=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Johannes-Royset.jpg 400w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Johannes-Royset-300x300.jpg 300w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Johannes-Royset-150x150.jpg 150w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <\/div>\n                <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col4-1 tb_83i4232 last\">\n                            <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"batta\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-batta tb_9rni867 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col4-3 tb_wmhp868 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_2 tb_qgkl869\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-3 tb_34ho869 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_pns0870   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>Stochastic Modeling Challenges for Problems in the Security Domain<\/h2>\n<h3>Rajan Batta<\/h3>\n<p><b>SUNY Distinguished Professor and Associate Dean for Faculty Affairs and Diversity, School of Engineering and Applied Sciences, University at Buffalo<\/b><\/p>\n<p>The security domain provides excellent problems for the operation research community. Security problems that have a stochastic component are particularly challenging to model and analyze successfully. In this keynote, Dr. Batta will discuss several security problems that he worked on with colleagues and graduate students that have a stochastic modeling component.<\/p>\n<p>These include topics such as:<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li>sensor deployment to detect movement of suspicious objects,<\/li>\n<li>deployment and redeployment of an ad hoc sensor network with unreliable communication links,<\/li>\n<li>strategic deployment of response units with uncertain future demands,<\/li>\n<li>search for emerging objects in an area of interest, with and without camouflaging capabilities, and<\/li>\n<li>strategies for infiltration into enemy territory.<\/li>\n<\/ol>\n<\/li>\n<\/ol>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module accordion -->\n<div  class=\"module module-accordion tb_gz3m63 \" data-behavior=\"toggle\" data-lazy=\"1\">\n    \n    <ul class=\"ui module-accordion   transparent\">\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-gz3m63-0\" class=\"tb_title_accordion\" aria-controls=\"acc-gz3m63-0-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-fas-plus\" aria-hidden=\"true\"><use href=\"#tf-fas-plus\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-fas-minus\" aria-hidden=\"true\"><use href=\"#tf-fas-minus\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">About Rajan Batta<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-gz3m63-0-content\" data-id=\"acc-gz3m63-0\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Rajan Batta is a SUNY distinguished professor in the Department of Industrial and Systems Engineering and the Associate Dean for Faculty Affairs and Diversity in the School of Engineering and Applied Sciences, at the University at Buffalo, where he has been a faculty member since 1984. He uses operations research techniques to develop and analyze mathematical models of systems critical to society. His research interests range from military logistics and homeland defense, to transportation planning and analysis of urban crime patterns. His recent work in the military domain has focused on search missions over uncertain networks. He has won numerous awards for his research and scholarship, including the MOR Journal Award from MORS (2005 and 2020), the Koopman Award from the INFORMS Military and Security Society (2108), and several research awards from the Institute of Industrial and Systems Engineers: Frank and Lillian Gilbreth Industrial Engineering Award (2022); Award for Technical Innovation in Industrial Engineering (2016); and David F. Baker Research Award (2008). Batta received his Ph.D. in operations research from the Massachusetts Institute of Technology and a bachelor of technology in mechanical engineering from the Indian Institute of Technology, Delhi.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n        <\/ul>\n\n<\/div><!-- \/module accordion -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-1 tb_dtdj869 last\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_berj764 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Rajan_Batta.jpg\" class=\"wp-post-image wp-image-681\" title=\"Rajan_Batta\" alt=\"Rajan Batta headshot\" srcset=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Rajan_Batta.jpg 300w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Rajan_Batta-150x150.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <\/div>\n                <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col4-1 tb_ctxp870 last\">\n                            <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"nsf-program-managers\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-nsf-program-managers tb_u4pe658 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col4-3 tb_gmig658 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_rpk4658   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h2>National Science Foundation (NSF) Program Managers Panel<\/h2>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col4-1 tb_oyvt659 last\">\n                            <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"fan\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-fan tb_mgk1752 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col4-3 tb_7vaj752 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_2 tb_ad3e752\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-3 tb_eeud753 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_eg8a753   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h3>Yueyue Fan<\/h3>\n<p><b>Professor,\u00a0<\/b><b>University of California, Davis<\/b><b><br \/>\nProgram Manager, National Science Foundation<\/b><\/p>\n<p>Dr. Fan will present the Civil Infrastructure Systems (CIS) program that supports fundamental and innovative research in the design, operation and management of civil infrastructure and contributes to creating smart, sustainable and resilient communities at local, national and international scales. The CIS program focuses on civil infrastructure as a system in which interactions between spatially- and functionally- distributed components and intersystem connections exist, and is interested in every critical civil infrastructure system, including transportation, power, water, pipelines, etc. The research themes addressing novel system and service design, system integration, big data analytics, and socio-technological-infrastructure connections and the research contributions&mdash;theoretical, scientific, mathematical, or computational&mdash;will be discussed.<\/p>\n    <\/div>\n<\/div>\n<!-- \/module text --><!-- module accordion -->\n<div  class=\"module module-accordion tb_38dv66 \" data-behavior=\"toggle\" data-lazy=\"1\">\n    \n    <ul class=\"ui module-accordion   transparent\">\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-38dv66-0\" class=\"tb_title_accordion\" aria-controls=\"acc-38dv66-0-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-fas-plus\" aria-hidden=\"true\"><use href=\"#tf-fas-plus\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-fas-minus\" aria-hidden=\"true\"><use href=\"#tf-fas-minus\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">About Yueyue Fan<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-38dv66-0-content\" data-id=\"acc-38dv66-0\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Dr. Yueyue Fan is a professor in civil and environmental engineering at University of California, Davis. She is also a faculty member in graduate program of Applied Mathematics at UC Davis. She received her Ph.D. in civil engineering at University of Southern California in 2003. Dr. Fan\u2019s research is on transportation and energy infrastructure systems modeling, with a special interest in integrating applied mathematics and engineering domain knowledge to address fundamental challenges brought by data and system uncertainty, dynamics, and underdetermined issues. Dr. Fan is currently serving as the program director of the Civil Infrastructure Systems (CIS) program at the National Science Foundation.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n        <\/ul>\n\n<\/div><!-- \/module accordion --><!-- module text -->\n<div  class=\"module module-text tb_0kyr263   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h4>NSF Program: Civil Infrastructure Systems (CIS)<\/h4>\n<p>The Civil Infrastructure Systems (CIS) program supports fundamental and innovative research in the design, operation and management of civil infrastructure that contributes to creating smart, sustainable and resilient communities at local, national and international scales. This program focuses on civil infrastructure as a system in which interactions between spatially- and functionally- distributed components and intersystem connections exist. All critical civil infrastructure systems are of interest, including transportation, power, water, pipelines and others.<\/p>\n<p>The CIS program encourages potentially disruptive ideas that will open new frontiers and significantly broaden and transform relevant research communities. The program particularly welcomes research that addresses novel system and service design, system integration, big data analytics, and socio-technological-infrastructure connections. The program values diverse theoretical, scientific, mathematical, or computational contributions from a broad set of disciplines.<\/p>\n<p>While component-level, subject-matter knowledge may be crucial in many research efforts, the program does not support research with a primary contribution pertaining to individual infrastructure components such as materials, sensor technology, extreme event analysis, human factors, climate modeling, structural, geotechnical, hydrologic or environmental engineering.<\/p>\n<p>Also: Cyber Physical Systems (CPS) and Smart and Connected Communities.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-1 tb_insh753 last\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_b2ct816 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Yueyue-Fan.jpg\" class=\"wp-post-image wp-image-657\" title=\"Yueyue-Fan\" alt=\"Yueyue Fan headshot\" srcset=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Yueyue-Fan.jpg 300w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Yueyue-Fan-150x150.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <\/div>\n                <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col4-1 tb_341d753 last\">\n                            <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"huth\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-huth tb_ex8d731 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col4-3 tb_4htp732 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_2 tb_9ufn772\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-3 tb_ikla773 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_d8ai735   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h3>Paul Huth<\/h3>\n<p><b>Program Officer, National Science Foundation<\/b><\/p><p>Dr. Huth will present the Security and Preparedness (SAP) Program that supports basic scientific research advancing knowledge and understanding of issues broadly related to global and national security. Funded research should be theoretically motivated, conceptually precise, methodologically rigorous, and empirically oriented and could for example involve international relations, global and national security, human security, political violence, state stability, conflict processes, regime transition, international and comparative political economy, and peace science. Dr. Huth will also discuss other NSF programs that SAP co-reviews with on a regular basis.<br><\/p>\n    <\/div>\n<\/div>\n<!-- \/module text --><!-- module accordion -->\n<div  class=\"module module-accordion tb_uu1m263 \" data-behavior=\"toggle\" data-lazy=\"1\">\n    \n    <ul class=\"ui module-accordion   transparent\">\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-uu1m263-0\" class=\"tb_title_accordion\" aria-controls=\"acc-uu1m263-0-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-fas-plus\" aria-hidden=\"true\"><use href=\"#tf-fas-plus\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-fas-minus\" aria-hidden=\"true\"><use href=\"#tf-fas-minus\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">About Paul Huth<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-uu1m263-0-content\" data-id=\"acc-uu1m263-0\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Dr. Paul Huth is a program officer at the National Science Foundation for the Security &amp; Preparedness Program within the Division of Social and Economic Sciences. He has served in this position for the past two years. Dr. Huth received his Ph.D. in political science from Yale University in 1986 and was a faculty member at the University of Michigan until 2005 and thereafter at the University of Maryland. In addition to his position at NSF, Dr. Huth is currently the Bauman Professor of Political Economy in the Government and Politics Department and Director of the Center for International Development and Conflict Management at the University of Maryland. He has served as editor of\u00a0<i>The Journal of Conflict Resolution<\/i>\u00a0since 2009. He has published widely on subjects relating to armed conflict and the resolution of international disputes, including multiple books and edited volumes as well as dozens of articles in leading academic journals. In recognition of his work he has received the Karl W. Deutsch Award, Quincy Wright Book Award, the Olof Palme Visiting Professor Award, and a Lifetime Achievement Award from the American Political Science Association. In support of his research Dr. Huth has received external grants and contracts from the National Science Foundation, United States Institute of Peace, Smith Richardson Foundation, the Minerva Program at DOD, USAID, and UK DFID.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n        <\/ul>\n\n<\/div><!-- \/module accordion --><!-- module text -->\n<div  class=\"module module-text tb_4xo3188   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h4>NSF Program: Security and Preparedness (SAP)<\/h4>\n<p>The Security and Preparedness (SAP) Program supports basic scientific research that advances knowledge and understanding of issues broadly related to global and national security. Research proposals are evaluated on the criteria of intellectual merit and broader impacts; the proposed projects are expected to be theoretically motivated, conceptually precise, methodologically rigorous, and empirically oriented. Substantive areas include (but are not limited to) international relations, global and national security, human security, political violence, state stability, conflict processes, regime transition, international and comparative political economy, and peace science. Moreover, the Program supports research experiences for undergraduate students and infrastructural activities, including methodological innovations. The Program does not fund applied research. In addition, we encourage you to examine the websites for the National Science Foundation&#8217;s Accountable Institutions and Behavior (AIB) and Law and Science (LS) programs.<\/p>\n<p>Besides the Security and Preparedness Program, Dr. Huth will also discuss other NSF programs that SAP co-reviews with on a regular basis.<\/p>\n    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-1 tb_p6t2773 last\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_tva9451 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Paul-Huth.jpg\" class=\"wp-post-image wp-image-668\" title=\"Paul-Huth\" alt=\"Paul Huth headshot\" srcset=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Paul-Huth.jpg 300w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Paul-Huth-150x150.jpg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <\/div>\n                <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col4-1 tb_i4zf735 last\">\n                            <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-anchor=\"lang\" data-lazy=\"1\" class=\"module_row themify_builder_row tb_has_section tb_section-lang tb_rwb5287 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_2 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col4-3 tb_yb3c287 first\">\n                            <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_2 tb_htuh202\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col4-3 tb_f2vg203 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_r68f288   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h3>Daan Liang<\/h3>\n<p><b>Program Director for Human, Disaster, and Built Environment (HDBE), National Science Foundation<\/b><\/p>\n<p>Dr. Liang will present the Humans, Disasters, and the Built Environment (HDBE) program that supports fundamental, multidisciplinary research on the interactions between humans and the built environment within and among communities exposed to natural, technological and other types of hazards and disasters. The HDBE program seeks research that integrates ongoing and emerging changes in three interwoven elements of a community: its population, its built environment (critical infrastructures, physical and virtual spaces, and buildings and related structures) and the hazards and disasters to which it is exposed. The HDBE program seeks research that advances theories, methods and data within and across diverse disciplines, whether in engineering, the social sciences, computing or other relevant fields. Research funded by the HDBE program should inform how communities can cultivate and engage a broad range of physical, social and other resources to ensure improved quality of life for their inhabitants.\u00a0<\/p>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module accordion -->\n<div  class=\"module module-accordion tb_6zsm321 \" data-behavior=\"toggle\" data-lazy=\"1\">\n    \n    <ul class=\"ui module-accordion   transparent\">\n            <li>\n            <div class=\"accordion-title tf_rel\">\n                <a href=\"#acc-6zsm321-0\" class=\"tb_title_accordion\" aria-controls=\"acc-6zsm321-0-content\" aria-expanded=\"false\">\n                    <i class=\"accordion-icon\"><svg  class=\"tf_fa tf-fas-plus\" aria-hidden=\"true\"><use href=\"#tf-fas-plus\"><\/use><\/svg><\/i>                    <i class=\"accordion-active-icon tf_hide\"><svg  class=\"tf_fa tf-fas-minus\" aria-hidden=\"true\"><use href=\"#tf-fas-minus\"><\/use><\/svg><\/i>                    <span class=\"accordion-title-wrap\">About Daan Liang<\/span>                <\/a>\n            <\/div><!-- .accordion-title -->\n            <div id=\"acc-6zsm321-0-content\" data-id=\"acc-6zsm321-0\" aria-hidden=\"true\" class=\"accordion-content tf_hide tf_clearfix\">\n                                    <div class=\"tb_text_wrap\">\n                        <p>Dr. Daan Liang is the Program Director for the Human, Disaster, and Built Environment program at the National Science Foundation. The program supports fundamental, multidisciplinary research on the interactions between humans and the built environment within and among communities exposed to natural, technological, and other types of hazards and disasters. Prior to his current IPA assignment, Dr. Liang is a professor in the Department of Civil, Construction, and Environmental Engineering and the Director of Center for Sustainable Infrastructure (CSI) at the University of Alabama. His research interests include wind damage assessment, recovery, and mitigation, community resilience to natural hazards, risk transfer and hedging, and construction engineering. He has been supported by grants and contracts from National Science Foundation, U.S. Department of Energy, U.S.\u00a0 Department of Commerce, National Institute of Standards and Technology, Texas Department of Transportation, private industry, and charitable foundation. Dr. Liang co-founded and co-directed an NSF Industry-University Cooperative Research Center (IUCRC) on Wind Hazard and Infrastructure Performance (WHIP). Dr. Liang has held various academic and administrative positions at Texas Tech University. Dr. Liang received his bachelor\u2019s degree in engineering management from Tianjin University, China in 1997 and both his MS (1999) and Ph.D. (2001) in civil engineering from University of Buffalo, New York. He is a licensed professional engineer in Texas.<\/p>                    <\/div>\n                            <\/div><!-- .accordion-content -->\n        <\/li>\n        <\/ul>\n\n<\/div><!-- \/module accordion --><!-- module text -->\n<div  class=\"module module-text tb_jfsw580   \" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <h4>NSF Program:&nbsp;Humans, Disasters, and the Built Environment<\/h4>\n<p>The HDBE program supports fundamental, multidisciplinary research on the interactions between humans and the built environment within and among communities exposed to natural, technological and other types of hazards and disasters. The program&#8217;s context is provided by ongoing and emerging changes in three interwoven elements of a community: its population, its built environment (critical infrastructures, physical and virtual spaces, and buildings and related structures) and the hazards and disasters to which it is exposed. The HDBE program seeks research that integrates these elements and that can contribute to theories that hold over a broad range of scales and conditions. Examples include but are not limited to unified frameworks and theoretical models that encompass non-hazard to extreme hazard and disaster conditions, theoretical and empirical studies that consider how interactions between a community&#8217;s population and its built environment may suppress or amplify hazard exposure or its effects, and studies that seek to inform scholarship through the development of shared data and related resources. In these and other areas funded through the HDBE program, research that challenges conventional wisdom on the interactions among humans, the built environment and hazards and disasters is particularly encouraged. Given the richness of the phenomena under study, the HDBE program seeks research that advances theories, methods and data within and across diverse disciplines, whether in engineering, the social sciences, computing or other relevant fields. Ultimately, research funded through this program is expected to inform how communities can cultivate and engage a broad range of physical, social and other resources to ensure improved quality of life for their inhabitants.<\/p>\n    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col4-1 tb_5aor203 last\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_0zit30 image-top   tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Daan-Liang.jpg\" class=\"wp-post-image wp-image-634\" title=\"Daan-Liang\" alt=\"Daan Lang headshot\" srcset=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Daan-Liang.jpg 400w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Daan-Liang-300x300.jpg 300w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Daan-Liang-150x150.jpg 150w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                    <\/div>\n                <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column tb-column col4-1 tb_ioci288 last\">\n                            <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Keynotes IDA and the FFRDC Research Ecosystem General Norton Schwartz President,\u00a0Institute for Defense Analyses The security environment has shifted and evolved since the establishment of the Department of Defense, Joint Staff and Combatant Command structure after the conclusion of World War II in 1947.\u00a0 The establishment of the structure for joint warfighting provided new opportunities [&hellip;]<\/p>\n","protected":false},"author":1001077,"featured_media":440,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-636","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Speakers - 2022 INFORMS Conference on Security<\/title>\n<meta name=\"description\" content=\"Learn about the confirmed speakers for the 2022 INFORMS Conference on Security: their names, bios, talk titles, and talk summaries.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Speakers\" \/>\n<meta property=\"og:description\" content=\"Learn about the confirmed speakers for the 2022 INFORMS Conference on Security: their names, bios, talk titles, and talk summaries.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/\" \/>\n<meta property=\"og:site_name\" content=\"2022 INFORMS Conference on Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/INFORMSpage\/\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-29T11:27:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"136\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@INFORMS\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/\",\"url\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/\",\"name\":\"Speakers - 2022 INFORMS Conference on Security\",\"isPartOf\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\",\"datePublished\":\"2022-04-20T18:03:31+00:00\",\"dateModified\":\"2022-08-29T11:27:12+00:00\",\"description\":\"Learn about the confirmed speakers for the 2022 INFORMS Conference on Security: their names, bios, talk titles, and talk summaries.\",\"breadcrumb\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#primaryimage\",\"url\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\",\"contentUrl\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\",\"width\":400,\"height\":136},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Speakers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#website\",\"url\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/\",\"name\":\"2022 INFORMS Conference on Security\",\"description\":\"Arlington, VA | August 29-30, 2022\",\"publisher\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#organization\",\"name\":\"2022 INFORMS Conference on Security\",\"url\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\",\"contentUrl\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg\",\"width\":400,\"height\":136,\"caption\":\"2022 INFORMS Conference on Security\"},\"image\":{\"@id\":\"https:\/\/meetings.informs.org\/wordpress\/2022security\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/INFORMSpage\/\",\"https:\/\/x.com\/INFORMS\",\"https:\/\/www.instagram.com\/informs_orms\",\"https:\/\/www.linkedin.com\/groups\/82644\/profile\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Speakers - 2022 INFORMS Conference on Security","description":"Learn about the confirmed speakers for the 2022 INFORMS Conference on Security: their names, bios, talk titles, and talk summaries.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/","og_locale":"en_US","og_type":"article","og_title":"Speakers","og_description":"Learn about the confirmed speakers for the 2022 INFORMS Conference on Security: their names, bios, talk titles, and talk summaries.","og_url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/","og_site_name":"2022 INFORMS Conference on Security","article_publisher":"https:\/\/www.facebook.com\/INFORMSpage\/","article_modified_time":"2022-08-29T11:27:12+00:00","og_image":[{"width":400,"height":136,"url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@INFORMS","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/","url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/","name":"Speakers - 2022 INFORMS Conference on Security","isPartOf":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#website"},"primaryImageOfPage":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#primaryimage"},"image":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#primaryimage"},"thumbnailUrl":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","datePublished":"2022-04-20T18:03:31+00:00","dateModified":"2022-08-29T11:27:12+00:00","description":"Learn about the confirmed speakers for the 2022 INFORMS Conference on Security: their names, bios, talk titles, and talk summaries.","breadcrumb":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#primaryimage","url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","contentUrl":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","width":400,"height":136},{"@type":"BreadcrumbList","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/speakers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/meetings.informs.org\/wordpress\/2022security\/"},{"@type":"ListItem","position":2,"name":"Speakers"}]},{"@type":"WebSite","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#website","url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/","name":"2022 INFORMS Conference on Security","description":"Arlington, VA | August 29-30, 2022","publisher":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/meetings.informs.org\/wordpress\/2022security\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#organization","name":"2022 INFORMS Conference on Security","url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#\/schema\/logo\/image\/","url":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","contentUrl":"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2020\/10\/2022_INFORMS_Conference_on_Security_logo.jpg","width":400,"height":136,"caption":"2022 INFORMS Conference on Security"},"image":{"@id":"https:\/\/meetings.informs.org\/wordpress\/2022security\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/INFORMSpage\/","https:\/\/x.com\/INFORMS","https:\/\/www.instagram.com\/informs_orms","https:\/\/www.linkedin.com\/groups\/82644\/profile"]}]}},"builder_content":"<h2>Keynotes<\/h2>\n<h2>IDA and the FFRDC Research Ecosystem<\/h2> <h3>General Norton Schwartz<\/h3> <p><b>President,\u00a0Institute for Defense Analyses<\/b><\/p> <p>The security environment has shifted and evolved since the establishment of the Department of Defense, Joint Staff and Combatant Command structure after the conclusion of World War II in 1947.\u00a0 The establishment of the structure for joint warfighting provided new opportunities for analytic support to the newly formed department of defense.\u00a0 The Institute for Defense Analyses (IDA) was created in 1956 to provide analyses in support of the new department.\u00a0 IDA\u2019s mission is to answer the most challenging U.S. security and science policy questions with objective analysis leveraging extraordinary scientific, technical, and analytic expertise. As a manager of three Federally Funded Research and Development Centers (FFRDC), IDA is part of a network of analytic agencies funded by the Department of Defense, Department of Energy, Homeland Security, National Science Foundation, and other executive agencies to support the variety security issues faced by the United States. This network of FFRDCs provide a vast array of opportunity to perform research and analyses in support of the United States. We will discuss these opportunities and some of the recent analyses performed by our three FFRDCs, IDA Systems and Analyses Center, IDA Science and Technology Policy Institute and the IDA Center for Communications and Computing. We will highlight research and career opportunities and research areas with the potential for significant impact.<\/p>\n<ul><li><h4>About Norton Schwartz<\/h4><p>Norton A. Schwartz serves as President of the Institute for Defense Analyses (IDA), a nonprofit corporation operating in the public interest. IDA manages three Federally Funded Research and Development Centers that answer the most challenging U.S. security and science policy questions with objective analysis leveraging extraordinary scientific, technical, and analytic expertise. At IDA, General Schwartz (U.S. Air Force, retired) directs the activities of more than 1,000 scientists and technologists employed by IDA.<\/p> <p>General Schwartz has a long and prestigious career of service and leadership that spans over five decades. He was most recently President and CEO of Business Executives for National Security (BENS). During his six-year tenure at BENS, he was also a member of IDA\u2019s Board of Trustees.<\/p> <p>Prior to retiring from the U.S. Air Force, General Schwartz served as the 19th Chief of Staff of the U.S. Air Force from 2008 to 2012. He previously held senior joint positions as Director of the Joint Staff and as the Commander of the U.S. Transportation Command. He began his service as a pilot with the airlift evacuation out of Vietnam in 1975.<\/p> <p>General Schwartz is a U.S. Air Force Academy graduate and holds a master\u2019s degree in business administration from Central Michigan University. He is also an alumnus of the Armed Forces Staff College and the National War College.<\/p> <p>He is a member of the Council on Foreign Relations and a 1994 Fellow of Massachusetts Institute of Technology\u2019s Seminar XXI. General Schwartz has been married to Suzie since 1981.<\/p><\/li><\/ul>\n<img src=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Norty-Schwartz.jpg\" title=\"Norty-Schwartz\" alt=\"Norty Schwartz headshot\" srcset=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Norty-Schwartz.jpg 300w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Norty-Schwartz-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n<h2>Cybersecurity for Planes, Trains, and Tanks<\/h2> <h3>Josh Lospinoso<\/h3> <p><b>CEO,\u00a0Shift5<\/b><\/p> <p>DoD Weapon Systems are choc-full of digital components. They are more networked and software dependent than ever before, but generally these systems were never designed with cybersecurity in mind. In recent operational testing, the DoD routinely found mission-critical cyber vulnerabilities. Disconcertingly simple tools and techniques were often enough for penetration testers to take control of weapon systems. Fortunately, the DoD is beginning to take weapon system cybersecurity seriously, but we have a long way to go as a cybersecurity community in developing solutions to address this dangerous new threat frontier. Additionally, civilian transportation assets like commercial aircraft, maritime vessels, freight\/passenger rail, satellites, and road vehicles have corollary cybersecurity issues. As critical infrastructure, these systems are simultaneously more important and more vulnerable than ever before. In this talk, Josh will discuss how we got here, the magnitude of the problem, and what\u2019s required to begin paying the debt.<\/p>\n<ul><li><h4>About Josh Lospinoso<\/h4><p>Josh Lospinoso is CEO of Shift5, a cybersecurity company protecting the world\u2019s fleets from cyberattack. He is an entrepreneur with deep expertise in cybersecurity, data science, and system software engineering. In 2012, he co-founded RedOwl Analytics, an insider threat detection platform acquired by Raytheon\/Forcepoint in 2017.<\/p> <p>Josh is a US Army veteran, having served 10 years as a cyber officer leading teams to build dozens of cyber tools for the National Security Agency\u2019s Tailored Access Operations, Army Cyber Command, and the Cyber National Mission Force.<\/p> <p>Josh is the author of C++ Crash Course (No Starch Press, 2019), dozens of peer-reviewed journal articles spanning multiple disciplines, and multiple patents. He is a graduate of U.S. Army Ranger School, and he holds multiple degrees the United States Military Academy and a Ph.D. from the University of Oxford, where he was a Rhodes Scholar.<\/p> <p>He serves on the board of the American Association of Rhodes Scholars and is a member of the Programming Committee for the Hacker Initiative, a nonprofit supporting the worldwide hacker community. Josh is also a Venture Partner at First In, an early state investment firm.<\/p><\/li><\/ul>\n<img src=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Josh_Lospinoso.jpg\" title=\"Josh_Lospinoso\" alt=\"Josh Lospinoso headshot\" srcset=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Josh_Lospinoso.jpg 300w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Josh_Lospinoso-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n<h2>Robustness and Conservativeness in Statistical Learning<\/h2> <h3>Johannes O. Royset<\/h3> <p><b>Professor of Operations Research, Naval Postgraduate School<\/b><\/p> <p>Despite impressive achievements over the last decade, statistical learning remains prone to errors when the training data is biased, corrupted, or mislabeled. Dr. Royset will discuss troubling situations from computer vision as well as military operations research and review approaches to enhance robustness and conservativeness. In particular, he proposes superquantile regression as an alternative to least-squares regression when the focus is on estimating distributional tail behavior.\u00a0 Computationally efficient approximations achieve robust training against adversarial interference. Diametrical risk minimization improves on classical empirical risk minimization by accounting for worst-case empirical risks within neighborhoods in a parameter space. He illustrates the empirical performance of the various approaches through examples such as training of neural networks using corrupted labels, and also discuss the theoretical performance of diametrical risk minimization under challenging non-convex, non-Lipschitz loss functions.<\/p>\n<ul><li><h4>About Johannes Royset<\/h4><p>Dr. Johannes O. Royset is a Professor of Operations Research at the Naval Postgraduate School. His research focuses on formulating and solving stochastic and deterministic optimization problems arising in data analytics, sensor management, and reliability engineering. Dr. Royset is the co-inventor of epi-splines, a functional approximation tool with wide applications in data fitting and forecasting, and of superquantile regression, second-order superquantile risk, and buffered probability. He was awarded a National Research Council postdoctoral fellowship in 2003, a Young Investigator Award from the Air Force Office of Scientific Research in 2007, and the Barchi Prize as well as the MOR Journal Award from the Military Operations Research Society in 2009. He received the Carl E. and Jessie W. Menneken Faculty Award for Excellence in Scientific Research in 2010 and the Goodeve Medal from the Operational Research Society in 2019. Dr. Royset was a plenary speaker at the International Conference on Stochastic Programming in 2016 and at the SIAM Conference on Uncertainty Quantification in 2018. He has a Doctor of Philosophy degree from the University of California at Berkeley (2002). Dr. Royset has been an associate or guest editor of\u00a0<em>SIAM Journal on Optimization<\/em>,\u00a0<em>Operations Research<\/em>,\u00a0<em>Mathematical Programming<\/em>,\u00a0<em>Journal of Optimization Theory and Applications<\/em>,\u00a0<em>Naval Research Logistics<\/em>,\u00a0<em>Journal of Convex Analysis<\/em>,\u00a0<em>Set-Valued and Variational Analysis<\/em>, and\u00a0<em>Computational Optimization and Applications<\/em>. He has published more than 90 papers and two books.<\/p><\/li><\/ul>\n<img src=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Johannes-Royset.jpg\" title=\"Johannes-Royset\" alt=\"Johannes O. Royset headshot\" srcset=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Johannes-Royset.jpg 400w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Johannes-Royset-300x300.jpg 300w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Johannes-Royset-150x150.jpg 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\n<h2>Stochastic Modeling Challenges for Problems in the Security Domain<\/h2> <h3>Rajan Batta<\/h3> <p><b>SUNY Distinguished Professor and Associate Dean for Faculty Affairs and Diversity, School of Engineering and Applied Sciences, University at Buffalo<\/b><\/p> <p>The security domain provides excellent problems for the operation research community. Security problems that have a stochastic component are particularly challenging to model and analyze successfully. In this keynote, Dr. Batta will discuss several security problems that he worked on with colleagues and graduate students that have a stochastic modeling component.<\/p> <p>These include topics such as:<\/p> <ol> <li style=\"list-style-type: none;\"> <ol> <li>sensor deployment to detect movement of suspicious objects,<\/li> <li>deployment and redeployment of an ad hoc sensor network with unreliable communication links,<\/li> <li>strategic deployment of response units with uncertain future demands,<\/li> <li>search for emerging objects in an area of interest, with and without camouflaging capabilities, and<\/li> <li>strategies for infiltration into enemy territory.<\/li> <\/ol> <\/li> <\/ol>\n<ul><li><h4>About Rajan Batta<\/h4><p>Rajan Batta is a SUNY distinguished professor in the Department of Industrial and Systems Engineering and the Associate Dean for Faculty Affairs and Diversity in the School of Engineering and Applied Sciences, at the University at Buffalo, where he has been a faculty member since 1984. He uses operations research techniques to develop and analyze mathematical models of systems critical to society. His research interests range from military logistics and homeland defense, to transportation planning and analysis of urban crime patterns. His recent work in the military domain has focused on search missions over uncertain networks. He has won numerous awards for his research and scholarship, including the MOR Journal Award from MORS (2005 and 2020), the Koopman Award from the INFORMS Military and Security Society (2108), and several research awards from the Institute of Industrial and Systems Engineers: Frank and Lillian Gilbreth Industrial Engineering Award (2022); Award for Technical Innovation in Industrial Engineering (2016); and David F. Baker Research Award (2008). Batta received his Ph.D. in operations research from the Massachusetts Institute of Technology and a bachelor of technology in mechanical engineering from the Indian Institute of Technology, Delhi.<\/p><\/li><\/ul>\n<img src=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Rajan_Batta.jpg\" title=\"Rajan_Batta\" alt=\"Rajan Batta headshot\" srcset=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Rajan_Batta.jpg 300w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Rajan_Batta-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n<h3>William J. Flynn<\/h3> <p><b>CEO,\u00a0Amtrak<\/b><\/p>\n<h2>National Science Foundation (NSF) Program Managers Panel<\/h2>\n<h3>Yueyue Fan<\/h3> <p><b>Professor,\u00a0<\/b><b>University of California, Davis<\/b><b><br \/> Program Manager, National Science Foundation<\/b><\/p> <p>Dr. Fan will present the Civil Infrastructure Systems (CIS) program that supports fundamental and innovative research in the design, operation and management of civil infrastructure and contributes to creating smart, sustainable and resilient communities at local, national and international scales. The CIS program focuses on civil infrastructure as a system in which interactions between spatially- and functionally- distributed components and intersystem connections exist, and is interested in every critical civil infrastructure system, including transportation, power, water, pipelines, etc. The research themes addressing novel system and service design, system integration, big data analytics, and socio-technological-infrastructure connections and the research contributions&mdash;theoretical, scientific, mathematical, or computational&mdash;will be discussed.<\/p>\n<ul><li><h4>About Yueyue Fan<\/h4><p>Dr. Yueyue Fan is a professor in civil and environmental engineering at University of California, Davis. She is also a faculty member in graduate program of Applied Mathematics at UC Davis. She received her Ph.D. in civil engineering at University of Southern California in 2003. Dr. Fan\u2019s research is on transportation and energy infrastructure systems modeling, with a special interest in integrating applied mathematics and engineering domain knowledge to address fundamental challenges brought by data and system uncertainty, dynamics, and underdetermined issues. Dr. Fan is currently serving as the program director of the Civil Infrastructure Systems (CIS) program at the National Science Foundation.<\/p><\/li><\/ul>\n<h4>NSF Program: Civil Infrastructure Systems (CIS)<\/h4> <p>The Civil Infrastructure Systems (CIS) program supports fundamental and innovative research in the design, operation and management of civil infrastructure that contributes to creating smart, sustainable and resilient communities at local, national and international scales. This program focuses on civil infrastructure as a system in which interactions between spatially- and functionally- distributed components and intersystem connections exist. All critical civil infrastructure systems are of interest, including transportation, power, water, pipelines and others.<\/p> <p>The CIS program encourages potentially disruptive ideas that will open new frontiers and significantly broaden and transform relevant research communities. The program particularly welcomes research that addresses novel system and service design, system integration, big data analytics, and socio-technological-infrastructure connections. The program values diverse theoretical, scientific, mathematical, or computational contributions from a broad set of disciplines.<\/p> <p>While component-level, subject-matter knowledge may be crucial in many research efforts, the program does not support research with a primary contribution pertaining to individual infrastructure components such as materials, sensor technology, extreme event analysis, human factors, climate modeling, structural, geotechnical, hydrologic or environmental engineering.<\/p> <p>Also: Cyber Physical Systems (CPS) and Smart and Connected Communities.<\/p>\n<img src=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Yueyue-Fan.jpg\" title=\"Yueyue-Fan\" alt=\"Yueyue Fan headshot\" srcset=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Yueyue-Fan.jpg 300w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Yueyue-Fan-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n<h3>Paul Huth<\/h3> <p><b>Program Officer, National Science Foundation<\/b><\/p><p>Dr. Huth will present the Security and Preparedness (SAP) Program that supports basic scientific research advancing knowledge and understanding of issues broadly related to global and national security. Funded research should be theoretically motivated, conceptually precise, methodologically rigorous, and empirically oriented and could for example involve international relations, global and national security, human security, political violence, state stability, conflict processes, regime transition, international and comparative political economy, and peace science. Dr. Huth will also discuss other NSF programs that SAP co-reviews with on a regular basis.<br><\/p>\n<ul><li><h4>About Paul Huth<\/h4><p>Dr. Paul Huth is a program officer at the National Science Foundation for the Security &amp; Preparedness Program within the Division of Social and Economic Sciences. He has served in this position for the past two years. Dr. Huth received his Ph.D. in political science from Yale University in 1986 and was a faculty member at the University of Michigan until 2005 and thereafter at the University of Maryland. In addition to his position at NSF, Dr. Huth is currently the Bauman Professor of Political Economy in the Government and Politics Department and Director of the Center for International Development and Conflict Management at the University of Maryland. He has served as editor of\u00a0<i>The Journal of Conflict Resolution<\/i>\u00a0since 2009. He has published widely on subjects relating to armed conflict and the resolution of international disputes, including multiple books and edited volumes as well as dozens of articles in leading academic journals. In recognition of his work he has received the Karl W. Deutsch Award, Quincy Wright Book Award, the Olof Palme Visiting Professor Award, and a Lifetime Achievement Award from the American Political Science Association. In support of his research Dr. Huth has received external grants and contracts from the National Science Foundation, United States Institute of Peace, Smith Richardson Foundation, the Minerva Program at DOD, USAID, and UK DFID.<\/p><\/li><\/ul>\n<h4>NSF Program: Security and Preparedness (SAP)<\/h4> <p>The Security and Preparedness (SAP) Program supports basic scientific research that advances knowledge and understanding of issues broadly related to global and national security. Research proposals are evaluated on the criteria of intellectual merit and broader impacts; the proposed projects are expected to be theoretically motivated, conceptually precise, methodologically rigorous, and empirically oriented. Substantive areas include (but are not limited to) international relations, global and national security, human security, political violence, state stability, conflict processes, regime transition, international and comparative political economy, and peace science. Moreover, the Program supports research experiences for undergraduate students and infrastructural activities, including methodological innovations. The Program does not fund applied research. In addition, we encourage you to examine the websites for the National Science Foundation's Accountable Institutions and Behavior (AIB) and Law and Science (LS) programs.<\/p> <p>Besides the Security and Preparedness Program, Dr. Huth will also discuss other NSF programs that SAP co-reviews with on a regular basis.<\/p>\n<img src=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Paul-Huth.jpg\" title=\"Paul-Huth\" alt=\"Paul Huth headshot\" srcset=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Paul-Huth.jpg 300w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/05\/Paul-Huth-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n<h3>Daan Liang<\/h3> <p><b>Program Director for Human, Disaster, and Built Environment (HDBE), National Science Foundation<\/b><\/p> <p>Dr. Liang will present the Humans, Disasters, and the Built Environment (HDBE) program that supports fundamental, multidisciplinary research on the interactions between humans and the built environment within and among communities exposed to natural, technological and other types of hazards and disasters. The HDBE program seeks research that integrates ongoing and emerging changes in three interwoven elements of a community: its population, its built environment (critical infrastructures, physical and virtual spaces, and buildings and related structures) and the hazards and disasters to which it is exposed. The HDBE program seeks research that advances theories, methods and data within and across diverse disciplines, whether in engineering, the social sciences, computing or other relevant fields. Research funded by the HDBE program should inform how communities can cultivate and engage a broad range of physical, social and other resources to ensure improved quality of life for their inhabitants.\u00a0<\/p>\n<ul><li><h4>About Daan Liang<\/h4><p>Dr. Daan Liang is the Program Director for the Human, Disaster, and Built Environment program at the National Science Foundation. The program supports fundamental, multidisciplinary research on the interactions between humans and the built environment within and among communities exposed to natural, technological, and other types of hazards and disasters. Prior to his current IPA assignment, Dr. Liang is a professor in the Department of Civil, Construction, and Environmental Engineering and the Director of Center for Sustainable Infrastructure (CSI) at the University of Alabama. His research interests include wind damage assessment, recovery, and mitigation, community resilience to natural hazards, risk transfer and hedging, and construction engineering. He has been supported by grants and contracts from National Science Foundation, U.S. Department of Energy, U.S.\u00a0 Department of Commerce, National Institute of Standards and Technology, Texas Department of Transportation, private industry, and charitable foundation. Dr. Liang co-founded and co-directed an NSF Industry-University Cooperative Research Center (IUCRC) on Wind Hazard and Infrastructure Performance (WHIP). Dr. Liang has held various academic and administrative positions at Texas Tech University. Dr. Liang received his bachelor\u2019s degree in engineering management from Tianjin University, China in 1997 and both his MS (1999) and Ph.D. (2001) in civil engineering from University of Buffalo, New York. He is a licensed professional engineer in Texas.<\/p><\/li><\/ul>\n<h4>NSF Program:&nbsp;Humans, Disasters, and the Built Environment<\/h4> <p>The HDBE program supports fundamental, multidisciplinary research on the interactions between humans and the built environment within and among communities exposed to natural, technological and other types of hazards and disasters. The program's context is provided by ongoing and emerging changes in three interwoven elements of a community: its population, its built environment (critical infrastructures, physical and virtual spaces, and buildings and related structures) and the hazards and disasters to which it is exposed. The HDBE program seeks research that integrates these elements and that can contribute to theories that hold over a broad range of scales and conditions. Examples include but are not limited to unified frameworks and theoretical models that encompass non-hazard to extreme hazard and disaster conditions, theoretical and empirical studies that consider how interactions between a community's population and its built environment may suppress or amplify hazard exposure or its effects, and studies that seek to inform scholarship through the development of shared data and related resources. In these and other areas funded through the HDBE program, research that challenges conventional wisdom on the interactions among humans, the built environment and hazards and disasters is particularly encouraged. Given the richness of the phenomena under study, the HDBE program seeks research that advances theories, methods and data within and across diverse disciplines, whether in engineering, the social sciences, computing or other relevant fields. Ultimately, research funded through this program is expected to inform how communities can cultivate and engage a broad range of physical, social and other resources to ensure improved quality of life for their inhabitants.<\/p>\n<img src=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Daan-Liang.jpg\" title=\"Daan-Liang\" alt=\"Daan Lang headshot\" srcset=\"https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Daan-Liang.jpg 400w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Daan-Liang-300x300.jpg 300w, https:\/\/meetings.informs.org\/wordpress\/2022security\/files\/2022\/04\/Daan-Liang-150x150.jpg 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>","_links":{"self":[{"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/pages\/636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/users\/1001077"}],"replies":[{"embeddable":true,"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/comments?post=636"}],"version-history":[{"count":45,"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/pages\/636\/revisions"}],"predecessor-version":[{"id":877,"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/pages\/636\/revisions\/877"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/media\/440"}],"wp:attachment":[{"href":"https:\/\/meetings.informs.org\/wordpress\/2022security\/wp-json\/wp\/v2\/media?parent=636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}