Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Engineering

Risk Management And Biases In How Drivers Respond To Nuisance Flooding, Saige Hill, Juita-Elena (Wie) Yusuf, Burton St. John Iii, Pragati Rawat, Carol Considine Nov 2021

Risk Management And Biases In How Drivers Respond To Nuisance Flooding, Saige Hill, Juita-Elena (Wie) Yusuf, Burton St. John Iii, Pragati Rawat, Carol Considine

School of Public Service Faculty Publications

Nuisance flooding, or recurrent flooding, occurs during high tide and may be exacerbated when combined with other events such as heavy precipitation, strong winds, or storm surge. Sea level rise has contributed to increased frequency and duration of nuisance flooding in low-lying coastal areas and is causing community-specific impacts such as transportation disruption, road closures, compromises to life and property, overwhelmed storm water systems, and infrastructure damage. This chapter focuses on how drivers respond during nuisance flooding events. Specifically, we discuss how drivers in the Hampton Roads region of southeastern coastal Virginia obtain information about road flooding, how they respond, …


Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett Nov 2021

Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett

Cybersecurity Undergraduate Research Showcase

The DoD is currently taking a supply-chain risk management strategy to foster cybersecurity. This unique strategy is often referred to as CMMC which stands for “Cybersecurity Maturity Model Certification”. The approach requires that all the 300,000 DoD contractors acquire third-party authentication that may attain the requirements for the CMMC maturity level suitable to the work they desire to do for the DoD. CMMC typically examines the organization's capability to safeguard Federal Contract Information as well as CUI. It integrates various cybersecurity standards already in place and plots the best practices alongside processes to five maturity levels that range from the …


Quantifying Cyber Risk By Integrating Attack Graph And Impact Graph, Omer F. Keskin Jul 2021

Quantifying Cyber Risk By Integrating Attack Graph And Impact Graph, Omer F. Keskin

Engineering Management & Systems Engineering Theses & Dissertations

Being a relatively new risk source, models to quantify cyber risks are not well developed; therefore, cyber risk management in most businesses depends on qualitative assessments. With the increase in the economic consequences of cyber incidents, the importance of quantifying cyber risks has increased. Cyber risk quantification is also needed to establish communication among decision-makers of different levels of an enterprise, from technical personnel to top management.

The goal of this research is to build a probabilistic cybersecurity risk analysis model that relates attack propagation with impact propagation through internal dependencies and allows temporal analysis.

The contributions of the developed …


Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya Apr 2021

Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya

Engineering Management & Systems Engineering Theses & Dissertations

The cyber domain is a great business enabler providing many types of enterprises new opportunities such as scaling up services, obtaining customer insights, identifying end-user profiles, sharing data, and expanding to new communities. However, the cyber domain also comes with its own set of risks. Cybersecurity risk assessment helps enterprises explore these new opportunities and, at the same time, proportionately manage the risks by establishing cyber situational awareness and identifying potential consequences. Anomaly detection is a mechanism to enable situational awareness in the cyber domain. However, anomaly detection also requires one of the most extensive sets of data and features …


Fuzzy Cognitive Map-Based Knowledge Representation Of Hazardous Industrial Operations, Francesco Longo, Antonio Padovano, Letizia Nicoletti, Caterina Fusto, Mohaiad Elbasheer, Rafael Diaz Jan 2021

Fuzzy Cognitive Map-Based Knowledge Representation Of Hazardous Industrial Operations, Francesco Longo, Antonio Padovano, Letizia Nicoletti, Caterina Fusto, Mohaiad Elbasheer, Rafael Diaz

VMASC Publications

Hazardous industrial operations are highly stochastic, still human-dependent, and risky. Operators working in such an environment must understand the complex interrelation between several factors contributing to safe and effective operations. Therefore, being able to predict the effects of their actions on provoking or mitigating possible accidents is crucial. This study aims to utilize fuzzy cognitive maps (FCM) to model the expert’s reasoning about occupational health and safety (OHS) in confined space. This knowledge is used by operators to build their mental models. The developed FCM displays all the possible incidents of a confined space and links these incidents with all …


Developing An Artificial Intelligence Framework To Assess Shipbuilding And Repair Sub-Tier Supply Chains Risk, Rafael Diaz, Katherine Smith, Beatriz Acero, Francesco Longo, Antonio Padovano Jan 2021

Developing An Artificial Intelligence Framework To Assess Shipbuilding And Repair Sub-Tier Supply Chains Risk, Rafael Diaz, Katherine Smith, Beatriz Acero, Francesco Longo, Antonio Padovano

VMASC Publications

The defense shipbuilding and repair industry is a labor-intensive sector that can be characterized by low-product volumes and high investments in which a large number of shared resources, technology, suppliers, and processes asynchronously converge into large construction projects. It is mainly organized by the execution of a complex combination of sequential and overlapping stages. While entities engaged in this large-scale endeavor are often knowledgeable about their first-tier suppliers, they usually do not have insight into the lower tiers suppliers. A sizable part of any supply chain disruption is attributable to instabilities in sub-tier suppliers. This research note conceptually delineates a …


Influence Of The Inherent Safety Principles On Quantitative Risk In Process Industry: Application Of Genetic Algorithm Process Optimization (Gapo), Mehdi Jahangiri, Abolfazl Moghadasi, Mojtaba Kamalinia, Farid Sadeghianjahromi, Sean Banaee Jan 2021

Influence Of The Inherent Safety Principles On Quantitative Risk In Process Industry: Application Of Genetic Algorithm Process Optimization (Gapo), Mehdi Jahangiri, Abolfazl Moghadasi, Mojtaba Kamalinia, Farid Sadeghianjahromi, Sean Banaee

Community & Environmental Health Faculty Publications

Inherent safety (IS) refers to a set of measures that enhance the safety level of processes and equipment, rendering additional equipment and/or add-ons. The early design phase of processes is suited best for implementation of IS strategies as some of such strategies either are impossible to be implemented at the operation phase or substantially increase costs. The purpose of this study is to present a new approach called genetic algorithm process optimization (GAPO), by which processes can be made inherently safer even at the operation phase. This study simulates the IS principle, assessing its impact on quantitative risk and the …