Publications

Results 26–50 of 99

Search results

Jump to search filters

China Civilian Nuclear Power Reactor Study

Caskey, Susan A.; Laros, James H.

China is endeavoring to build nuclear power plants (NPPs) in numerous countries around the globe - an initiative that has the potential to strengthen Chinas political and economic influences on those countries. This study provides an overview of the situation and considers the issues involved in such partnerships with China. In order to assess Chinas ability to follow through with its agreements, this study also presents a technical review of its NPP production capability.

More Details

Resilience-based performance measures for next-generation systems security engineering

Proceedings - International Carnahan Conference on Security Technology

Williams, Adam D.; Adams, Thomas A.; Wingo, Jamie; Birch, Gabriel C.; Caskey, Susan A.; Fleming Lindsley, Elizabeth S.; Gunda, Thushara G.

Performance measures commonly used in systems security engineering tend to be static, linear, and have limited utility in addressing challenges to security performance from increasingly complex risk environments, adversary innovation, and disruptive technologies. Leveraging key concepts from resilience science offers an opportunity to advance next-generation systems security engineering to better describe the complexities, dynamism, and non-linearity observed in security performance—particularly in response to these challenges. This article introduces a multilayer network model and modified Continuous Time Markov Chain model that explicitly captures interdependencies in systems security engineering. The results and insights from a multilayer network model of security for a hypothetical nuclear power plant introduce how network-based metrics can incorporate resilience concepts into performance metrics for next generation systems security engineering.

More Details

Leveraging Resilience Metrics to Support Security System Analysis

2021 IEEE Virtual IEEE International Symposium on Technologies for Homeland Security, HST 2021

Caskey, Susan A.; Gunda, Thushara G.; Wingo, Jamie; Williams, Adam D.

Resilience has been defined as a priority for the US critical infrastructure. This paper presents a process for incorporating resiliency-derived metrics into security system evaluations. To support this analysis, we used a multi-layer network model (MLN) reflecting the defined security system of a hypothetical nuclear power plant to define what metrics would be useful in understanding a system's ability to absorb perturbation (i.e., system resilience). We defined measures focusing on the system's criticality, rapidity, diversity, and confidence at each network layer, simulated adversary path, and the system as a basis for understanding the system's resilience. For this hypothetical system, our metrics indicated the importance of physical infrastructure to overall system criticality, the relative confidence of physical sensors, and the lack of diversity in assessment activities (i.e., dependence on human evaluations). Refined model design and data outputs will enable more nuanced evaluations into temporal, geospatial, and human behavior considerations. Future studies can also extend these methodologies to capture respond and recover aspects of resilience, further supporting the protection of critical infrastructure.

More Details

A Complex Systems Approach to Develop a Multilayer Network Model for High Consequence Facility Security

Springer Proceedings in Complexity

Williams, Adam D.; Birch, Gabriel C.; Caskey, Susan A.; Gunda, Aravinda S.; Wingo, Jamie; Adams, Thomas A.

Protecting high consequence facilities (HCF) from malicious attacks is challenged by today’s increasingly complex, multi-faceted, and interdependent operational environments and threat domains. Building on current approaches, insights from complex systems and network science can better incorporate multidomain interactions observed in HCF security operations. These observations and qualitative HCF security expert data support invoking a multilayer modeling approach for HCF security to shift from a “reactive” to a “proactive” paradigm that better explores HCF security dynamics and resilience not captured in traditional approaches. After exploring these multi-domain interactions, this paper introduces how systems theory and network science insights can be leveraged to describe HCF security as complex, interdependent multilayer directed networks. A hypothetical example then demonstrates the utility of such an approach, followed by a discussion on key insights and implications of incorporating multilayer network analytical performance measures into HCF security.

More Details

RSVP - Flu Like Illness and Respiratory Syndromes COVID-19 Syndromic Reporting Tool Prototype

Caskey, Susan A.; Finley, Melissa F.; Makvandi, Monear M.; Bynum, Leo B.; Edgar, Pablo A.

Individuals infected with SARS-CoV-2, the virus that causes COVID-19, may be infectious between 1-3 days prior to symptom onset. People may delay seeking medical care after symptom development due to multiple determinants of health seeking behavior like availability of testing, accessibility of providers, and ability to pay. Therefore, understanding symptoms in the general public is important to better predict and inform resource management plans and engage in reopening. As the influenza season looms, the ability to differentiate between clinical presentation of COVID-19 and seasonal influenza will also be important to health providers and public health response efforts. This project has developed an algorithm that when used with captured syndromic trends can help provide both differentiation to various influenza-like illnesses (ILI) as well as provide public health decision makers a better understanding regarding spatial and temporal trends. This effort has also developed a web-based tool to allow for the capturing of generalized syndromic trends and provide both spatial and temporal outputs on these trends. This page left blank

More Details

Chemical Safety and Security Education in ACS-Approved Chemistry Programs

Journal of Chemical Education

Thompson, Chalita E.; Nelson, Andrew W.; Gribble, Lisa A.; Caskey, Susan A.; Eitrheim, Eric S.

To date, chemical security education practices in postsecondary institutions are poorly understood. The purpose of this study is to provide an initial understanding of the practices, attitudes, and barriers toward chemical security education for undergraduate and graduate programs in the United States (US) by surveying representatives of American Chemical Society (ACS)-approved programs. All programs with ACS-approved undergraduate chemistry programs (n = 691) were contacted for participation: 21% (n = 148) fully completed and 6% (n = 41) partially completed the survey for a combined total of 27% complete and/or partially complete surveys (n = 189). We observed that most programs currently teach chemical safety (undergraduate >99%, graduate 73%); however, only about one-third of programs teach chemical security at any education level (undergraduate 32%, graduate 34%). We also observed that safety education is provided more frequently than security education. Further, ACS-approved programs reported that their chemical safety culture was stronger than chemical security culture and felt that safety should be taught differently than security. The overwhelming majority of respondents (96%) indicated that chemical safety should be mandatory at some level, while only about half of respondents (57%) indicated that chemical security should be mandatory at some level. More efforts are needed by the chemistry community to raise awareness of the importance of chemical security education so that more institutions commit to training their faculty and students on the topic. The authors suggest that adoption of chemical security education could be increased if ACS were to advocate for chemical security by including it in its guidelines for educational program approval.

More Details

COVID-19 LDRD Project Summaries

Treece, Amy T.; Corbin, William C.; Caskey, Susan A.; Krishnakumar, Raga K.; Williams, Kelly P.; Branch, Darren W.; Harmon, Brooke N.; Polsky, Ronen P.; Bauer, Travis L.; Finley, Patrick D.; Jeffers, Robert F.; Safta, Cosmin S.; Makvandi, Monear M.; Laird, Carl D.; Domino, Stefan P.; Ho, Clifford K.; Grillet, Anne M.; Pacheco, Jose L.; Nemer, Martin N.; Rossman, Grant A.; Koplow, Jeffrey P.; Celina, Mathias C.; Jones, Brad H.; Burton, Patrick D.; Haggerty, Ryan P.; Jacobs-Gedrim, Robin B.; Thelen, Paul M.

Sandia National Laboratories currently has 27 COVID-related Laboratory Directed Research & Development (LDRD) projects focused on helping the nation during the pandemic. These LDRD projects cross many disciplines including bioscience, computing & information sciences, engineering science, materials science, nanodevices & microsystems, and radiation effects & high energy density science.

More Details

Risk Evaluation for Identification and Intervention in Dual Use Research of Concern (DURC) for International Biological R&D Activity

Jones, Katherine A.; DeMenno, Mercy D.; Hoffman, Matthew J.; Pierson, Adam J.; Nozick, Linda K.; Gearhart, Jared L.; Meyer, Lozanne M.; Caskey, Susan A.; Astuto Gribble, Lisa A.; Lopez, Elizabeth L.; Arguello, Bryan A.

This report summarizes the work performed as part of a Laboratory Directed Research and Development project focused on evaluating and mitigating risk associated with biological dual use research of concern. The academic and scientific community has identified the funding stage as the appropriate place to intervene and mitigate risk, so the framework developed here uses a portfolio-level approach and balances biosafety and biosecurity risks, anticipated project benefits, and available mitigations to identify the best available investment strategies subject to cost constraints. The modeling toolkit was designed for decision analysis for dual use research of concern, but is flexible enough to support a wide variety of portfolio-level funding decisions where risk/benefit tradeoffs are involved. Two mathematical optimization models with two solution methods are included to accommodate stakeholders with varying levels of certainty about priorities between metrics. An example case study is presented.

More Details
Results 26–50 of 99
Results 26–50 of 99