Rahul Dhal

  • Citations Per Year
Learn More
We study the detection of link failures in network synchronization processes. In particular, for a canonical linear network synchronization model, we consider detection of a critical link's failure by a monitor that makes noisy local measurements of the process. We characterize Maximum A-Posteriori (MAP) detection of the link failure, for both the case that(More)
We characterize the vulnerability of a linear network synchronization process to intrusion by an adversary that can actuate a single network component. Specifically, we model the intruder as seeking to move the state of the synchronization process to an undesirable value or set (which may or may not be known to system operators) via a local actuation. We(More)
Recently, a stochastic automaton known as the influence model was advanced as a tool for flexible and distributed graph partitioning, which can find optimal solutions to numerous hard partitioning problems in an almost-sure sense. Here, we provide a performance analysis of the influence model-based partitioner, for the hard problem of m-way partitioning(More)
For strategic traffic flow management, models are needed that allow NAS stakeholders to characterize the joint evolution of weather (and/or its impact on air traffic operating capabilities) in conjunction with the evolution of traffic flows. While queueing models show some promise for permitting meshed analysis of weather and traffic (including flow(More)
Increasingly, incidental sensing capabilities are being leveraged for wide-area situational awareness of complex network processes. For instance, sensors embedded on miners' body suits are envisioned for sensing for chemical hazards, blog data is being used to track disease spread, and autonomous vehicle platforms can incidentally measure environmental(More)
A comprehensive framework for analyzing the security and robustness of airborne networks is envisioned, that acknowledges both their physical dynamics and cyber- functions. The framework is developed in three aspects, first by developing models for meshed physical- and cyber- dynamics, then envisioning possible adversarial conduct, and finally defining(More)
The energy required for manipulation of a doubleintegrator network model via local external actuation is examined. Some previous results on the controllability Gramian, which specifies the required energy, are briefly reviewed. Three new results are then developed. First, the energy required for manipulation along the synchronization manifold over an(More)
This paper studies a detection problem for network systems, where changes in the statistical properties of an input driving certain network nodes has to be detected by sparse and remotely located sensors. We explicitly derive the Maximum A Posteriori (MAP) detector, and characterize its performance as a function of the network parameters, and the location(More)