Learn More
Recently, a stochastic automaton known as the influence model was advanced as a tool for flexible and distributed graph partitioning, which can find optimal solutions to numerous hard partitioning problems in an almost-sure sense. Here, we provide a performance analysis of the influence model-based partitioner, for the hard problem of m-way partitioning(More)
We study the detection of link failures in network synchronization processes. In particular, for a canonical linear network synchronization model, we consider detection of a critical link's failure by a monitor that makes noisy local measurements of the process. We characterize Maximum A-Posteriori (MAP) detection of the link failure, for both the case that(More)
— We characterize the vulnerability of a linear network synchronization process to intrusion by an adversary that can actuate a single network component. Specifically, we model the intruder as seeking to move the state of the synchronization process to an undesirable value or set (which may or may not be known to system operators) via a local actuation. We(More)
A comprehensive framework for analyzing the security and robustness of airborne networks is envisioned, that acknowledges both their physical dynamics and cyber- functions. The framework is developed in three aspects, first by developing models for meshed physical- and cyber- dynamics, then envisioning possible adversarial conduct, and finally defining(More)
Increasingly, incidental sensing capabilities are being leveraged for wide-area situational awareness of complex network processes. For instance, sensors embedded on miners' body suits are envisioned for sensing for chemical hazards, blog data is being used to track disease spread, and autonomous vehicle platforms can incidentally measure environmental(More)
We explore the manipulation of networked cyber-physical devices via external actuation or feedback control at a single location, in the context of a canonical multi-agent system model known as the double integrator network. One main focus is to understand whether or not, and how easily, a stakeholder can manipulate network's full dynamics by designing the(More)