Mark Yampolskiy

Learn More
—Cyber-Physical Systems (CPSs) consist of as well as interact with cyber and physical elements. This creates multiple vectors for CPS-internal (i.e., within CPS) as well as for CPS-external (i.e., between CPS itself and its environment) Cyber-Physical Attacks. We argue that an effective Cyber-Physical Defense can only be elaborated if possible attacks on(More)
Modern large-scale research projects require a tight international cooperation and have exceeding network bandwidth demands. Dedicated optical multi gigabit End-to-End (E2E) Links offer a possible way to meet these requirements. These links generally are realized with layer 1 and 2 technologies and cross multiple networks operated by different(More)
The growing amount of international collaborations in research, education, and business fields has raised once again the demand for quality assurance of network connections, which the projects and applications are realized upon. A large spectrum of examples with diverse requirements is found in areas such as \emph{GRID} and \emph{cloud computing},(More)
The pervasiveness of Cyber-Physical Systems (CPS) in various aspects of the modern society grows rapidly. This makes CPS to increasingly attractive targets for various kinds of attacks. We consider cyber-security as an integral part of CPS security. Additionally, the necessity exists to investigate the CPS-specific aspects which are out of scope of(More)
The allocation of resources to jobs running on e-Science infrastruc-tures is a key issue for scientific communities. In order to provide a better efficiency of computational jobs we propose an SLA-aware architecture. The core of this architecture is a scheduler relying on resource performance information. For performance characterization we propose a(More)
—Graphs are often used to model interconnected topological objects with different connection properties. Path finding in a weighted graph belongs to the classical problems of graph theory. Whereas the addition of the edges' weights as an aggregation and the interpretation of a smaller resulting sum as the preferable path works very well in applications like(More)
Many services provided over the Internet, like voice over IP and video on demand, increase the demand for assurances concerning the quality of the underlying network. A score of techniques for assurance of quality of service (QoS) have been devised for use within administrative domains. However, when paths cross the border of autonomous systems, assurance(More)
Additive Layer Manufacturing (ALM) is a new technology to produce 3D objects adding layer by layer. Agencies and companies like NASA, ESA, and SpaceX are exploring a broad range of application areas of ALM, which includes printing of device components, replacement parts, houses, and even food. They expect that this technology will greatly reduce production(More)
Beyond the classic hierarchical customer/provider relationship , service providers are more and more cooperating with each other on an equal footing. Service modeling techniques have been applied successfully to hierarchical sourcing strategies as a blueprint for service management processes and to define the basis for describing the communication and(More)