Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 237

Full-Text Articles in Physical Sciences and Mathematics

Analysis Of The Effect Of Different Surface Preparation Methods On Corrosion Resistance And Adhesion Strength Of Astm A36 Steel Substrate With Surface Tolerant Epoxy Paint As Coating Material, Irwan Wijaya Santoso, Daffa Aqila, Rini Riastuti, Rizal Tresna Ramadhani May 2024

Analysis Of The Effect Of Different Surface Preparation Methods On Corrosion Resistance And Adhesion Strength Of Astm A36 Steel Substrate With Surface Tolerant Epoxy Paint As Coating Material, Irwan Wijaya Santoso, Daffa Aqila, Rini Riastuti, Rizal Tresna Ramadhani

Journal of Materials Exploration and Findings

In the industrial world, to extend the service life of materials, protection methods are carried out to slow down the material's corrosion rate. The protection method that is often used is the coating method. The coating method is a protection method by coating the substrate material using a coating material to prevent contact between the substrate material and the environment. In this research, the substrate material used is ASTM A36 steel and the coating material used is Surface Tolerant Epoxy paint. The independent variable used in this study lies in the surface preparation method which consists of: solvent cleaning, hand …


Cost-Risk Analysis Of The Ercot Region Using Modern Portfolio Theory, Megan Sickinger May 2024

Cost-Risk Analysis Of The Ercot Region Using Modern Portfolio Theory, Megan Sickinger

Master's Theses

In this work, we study the use of modern portfolio theory in a cost-risk analysis of the Electric Reliability Council of Texas (ERCOT). Based upon the risk-return concepts of modern portfolio theory, we develop an n-asset minimization problem to create a risk-cost frontier of portfolios of technologies within the ERCOT electricity region. The levelized cost of electricity for each technology in the region is a step in evaluating the expected cost of the portfolio, and the historical data of cost factors estimate the variance of cost for each technology. In addition, there are several constraints in our minimization problem to …


Bidding Strategy For A Wind Power Producer In Us Energy And Reserve Markets, Anne Stratman May 2024

Bidding Strategy For A Wind Power Producer In Us Energy And Reserve Markets, Anne Stratman

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Wind power is one of the world's fastest-growing renewable energy resources and has expanded quickly within the US electric grid. Currently, wind power producers (WPPs) may sell energy products in US markets but are not allowed to sell reserve products, due to the uncertain and intermittent nature of wind power. However, as wind’s share of the power supply grows, it may eventually be necessary for WPPs to contribute to system-wide reserves. This paper proposes a stochastic optimization model to determine the optimal offer strategy for a WPP that participates in the day-ahead and real-time energy and spinning reserve markets. The …


Innovative Rate Design As A Free Market Solution To Climate, Resiliency, And Economic Challenges, Brendan J. Moore May 2024

Innovative Rate Design As A Free Market Solution To Climate, Resiliency, And Economic Challenges, Brendan J. Moore

University of New Orleans Theses and Dissertations

A century-old problem of electricity rate design is cost-shifting between ratepayers (Wellinghoff, J. & Tong, J., 2015). A much newer cost-shifting example of great and increasing importance happens whenever ratepayer generated “renewable energy” is sold to the grid—all too often, this is accused of being unfairly rewarded (Ritchie, 2016). ProRate resolves both these concerns and ProRate can actually be derived simply from the premise of avoiding “all” cost shifts between ratepayers (Katz, CLEPm Rewards to Arrest Demand Cost-Shifting, 2019; Katz, CLEP5 Rewards to Arrest Energy Cost-Shifting, 2019). Another major problem with the Old Utility Model is the lack of price …


Bay Water Level Influences On Inundation And Morphological Changes Of A Semi-Connected Barrier Island During A Hurricane, Sydney D. Goodman May 2024

Bay Water Level Influences On Inundation And Morphological Changes Of A Semi-Connected Barrier Island During A Hurricane, Sydney D. Goodman

<strong> Theses and Dissertations </strong>

This research aims to identify flooding and erosion changes along a semi-connected barrier island system due to varying bay water levels during storm conditions. The numerical model XBeach is used to simulate Hurricane Michael conditions and the resulting inundation and morphological change near Tyndall Air Force Base (Tyndall AFB). The installation is located 12 miles southeast of Panama City Beach along the panhandle of Florida and is vulnerable to flooding due to its proximity to the Gulf of Mexico (GoM), Saint Andrew Sound and Saint Andrew Bay. A land bridge connects the barrier island to the mainland of Tyndall AFB …


Multi-Objective Radiological Analysis In Real Environments, David Raji May 2024

Multi-Objective Radiological Analysis In Real Environments, David Raji

Doctoral Dissertations

Designing systems to solve problems arising in real-world radiological scenarios is a highly challenging task due to the contextual complexities that arise. Among these are emergency response, environmental exploration, and radiological threat detection. An approach to handling problems for these applications with explicitly multi-objective formulations is advanced. This is brought into focus with investigation of a number of case studies in both natural and urban environments. These include node placement in and path planning through radioactivity-contaminated areas, radiation detection sensor network measurement update sensitivity, control schemes for multi-robot radioactive exploration in unknown environments, and adversarial analysis for an urban nuclear …


Stability Of Quantum Computers, Samudra Dasgupta May 2024

Stability Of Quantum Computers, Samudra Dasgupta

Doctoral Dissertations

Quantum computing's potential is immense, promising super-polynomial reductions in execution time, energy use, and memory requirements compared to classical computers. This technology has the power to revolutionize scientific applications such as simulating many-body quantum systems for molecular structure understanding, factorization of large integers, enhance machine learning, and in the process, disrupt industries like telecommunications, material science, pharmaceuticals and artificial intelligence. However, quantum computing's potential is curtailed by noise, further complicated by non-stationary noise parameter distributions across time and qubits. This dissertation focuses on the persistent issue of noise in quantum computing, particularly non-stationarity of noise parameters in transmon processors. It …


Containerization Of Seafarers In The International Shipping Industry: Contemporary Seamanship, Maritime Social Infrastructures, And Mobility Politics Of Global Logistics, Liang Wu Feb 2024

Containerization Of Seafarers In The International Shipping Industry: Contemporary Seamanship, Maritime Social Infrastructures, And Mobility Politics Of Global Logistics, Liang Wu

Dissertations, Theses, and Capstone Projects

This dissertation discusses the mobility politics of container shipping and argues that technological development, political-economic order, and social infrastructure co-produce one another. Containerization, the use of standardized containers to carry cargo across modes of transportation that is said to have revolutionized and globalized international trade since the late 1950s, has served to expand and extend the power of international coalitions of states and corporations to control the movements of commodities (shipments) and labor (seafarers). The advent and development of containerization was driven by a sociotechnical imaginary and international social contract of seamless shipping and cargo flows. In practice, this liberal, …


Developing Machine Learning And Time-Series Analysis Methods With Applications In Diverse Fields, Muhammed Aljifri Jan 2024

Developing Machine Learning And Time-Series Analysis Methods With Applications In Diverse Fields, Muhammed Aljifri

Theses and Dissertations

This dissertation introduces methodologies that combine machine learning models with time-series analysis to tackle data analysis challenges in varied fields. The first study enhances the traditional cumulative sum control charts with machine learning models to leverage their predictive power for better detection of process shifts, applying this advanced control chart to monitor hospital readmission rates. The second project develops multi-layer models for predicting chemical concentrations from ultraviolet-visible spectroscopy data, specifically addressing the challenge of analyzing chemicals with a wide range of concentrations. The third study presents a new method for detecting multiple changepoints in autocorrelated ordinal time series, using the …


Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia Dec 2023

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia

Journal of Nonprofit Innovation

Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.

Imagine Doris, who is …


Combined Risk Based Inspection And Fault Tree Analysis For Repetitive 3-Phase Line Piping Leakage At West Java Offshore Topside Facility, Dona Yuliati, Akhmad Herman Yuwono, Datu Rizal Asral, Donanta Dhaneswara Dec 2023

Combined Risk Based Inspection And Fault Tree Analysis For Repetitive 3-Phase Line Piping Leakage At West Java Offshore Topside Facility, Dona Yuliati, Akhmad Herman Yuwono, Datu Rizal Asral, Donanta Dhaneswara

Journal of Materials Exploration and Findings

Hydrocarbon releases might result in serious consequences in various aspects. In addition to the contribution to environmental pollution, repetitive leakages need high repair costs. This study aim is to minimize potential repetitive leakage for other typical 3-phase piping systems. We conducted the risk assessment by adopting Risk Based Inspection (RBI) API 581 to identify risk level, calculating piping lifetime, recommended inspection plan and mitigations. The most relevant root causes can be obtained through quantitative Fault Tree Analysis (FTA). Observation and investigation was taken from eight 3-phase piping systems that experienced repetitive leakages. It has been found that the risk level …


Nitrogen Gas Quenching Pressure Effect On Bs S155 Alloy Steel In Vacuum Furnace, Agus Mulyadi Hasanudin, Eddy Sumarno Siradj Dec 2023

Nitrogen Gas Quenching Pressure Effect On Bs S155 Alloy Steel In Vacuum Furnace, Agus Mulyadi Hasanudin, Eddy Sumarno Siradj

Journal of Materials Exploration and Findings

The production of metal and alloy products requires the use of heat treatment, when during the heat treatment process, quenching is a crucial step. The quenching medium can be anything from water, a salt bath, oil, air and gas. In a vacuum furnace, pressurized gas, most frequently nitrogen (N2) gas, serves as one of the quenching mediums. One of the drawbacks of the quenching process is the distortion and dimensional change of the parts. This paper aims to investigate the influence of nitrogen gas quenching pressure on the distortion and dimensional change of aerospace actuator gear planet parts …


The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati Dec 2023

The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati

Cybersecurity Undergraduate Research Showcase

This paper explores the transformative potential of integrating Artificial Intelligence (AI) with established cybersecurity frameworks such as the Cybersecurity Maturity Model Certification (CMMC) and the National Institute of Standards and Technology (NIST) Special Publication 800-171. The thesis argues that the relationship between AI and these frameworks has the capacity to transform risk management in cybersecurity, where it could serve as a critical element in threat mitigation. In addition to addressing AI’s capabilities, this paper acknowledges the risks and limitations of these systems, highlighting the need for extensive research and monitoring when relying on AI. One must understand boundaries when integrating …


Climate Change Impact On Bridge Scour Risk In Ny State: A Gis-Based Risk Analysis Model, Muhammad Hassan Butt Dec 2023

Climate Change Impact On Bridge Scour Risk In Ny State: A Gis-Based Risk Analysis Model, Muhammad Hassan Butt

Publications and Research

Bridge scour, the primary cause of bridge failure in the United States, escalates post-severe storms, necessitating effective mitigation. This study employs a GIS-based risk analysis model to assess climate change's impact on bridge scour and associated risks in New York State. Data from the National Bridge Inventory, climate hazard maps, and geospatial data are integrated.


Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater Aug 2023

Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater

SMU Data Science Review

Static and dynamic analyses are the two primary approaches to analyzing malicious applications. The primary distinction between the two is that the application is analyzed without execution in static analysis, whereas the dynamic approach executes the malware and records the behavior exhibited during execution. Although each approach has advantages and disadvantages, dynamic analysis has been more widely accepted and utilized by the research community whereas static analysis has not seen the same attention. This study aims to apply advancements in static analysis techniques to demonstrate the identification of fine-grained functionality, and show, through clustering, how malicious applications may be grouped …


Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh Jul 2023

Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh

Journal of Police and Legal Sciences

Addressing the mechanisms of reducing cyber threats and risks Research Because cyberspace is an important arena for various international interactions, especially in recent times in light of the increase in cyber-attacks between some countries, which affects their national security. In this context, many countries are trying to make an effort to develop their capabilities to be used in any cyber-attack, or to take adequate preventive measures to protect them from any possible cyberattacks, especially in light of the impact of these attacks on vital places and institutions such as banks and ministries or on important facilities such as water and …


Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani Jun 2023

Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani

Electronic Thesis and Dissertation Repository

In today’s data-driven world, Information Systems, particularly the ones operating in regulated industries, require comprehensive security frameworks to protect against loss of confidentiality, integrity, or availability of data, whether due to malice, accident or otherwise. Once such a security framework is in place, an organization must constantly monitor and assess the overall compliance of its systems to detect and rectify any issues found. This thesis presents a technique and a supporting toolkit to first model dependencies between security policies (referred to as controls) and, second, devise models that associate risk with policy violations. Third, devise algorithms that propagate risk when …


Machine Learning-Based Data And Model Driven Bayesian Uncertanity Quantification Of Inverse Problems For Suspended Non-Structural System, Zhiyuan Qin May 2023

Machine Learning-Based Data And Model Driven Bayesian Uncertanity Quantification Of Inverse Problems For Suspended Non-Structural System, Zhiyuan Qin

All Dissertations

Inverse problems involve extracting the internal structure of a physical system from noisy measurement data. In many fields, the Bayesian inference is used to address the ill-conditioned nature of the inverse problem by incorporating prior information through an initial distribution. In the nonparametric Bayesian framework, surrogate models such as Gaussian Processes or Deep Neural Networks are used as flexible and effective probabilistic modeling tools to overcome the high-dimensional curse and reduce computational costs. In practical systems and computer models, uncertainties can be addressed through parameter calibration, sensitivity analysis, and uncertainty quantification, leading to improved reliability and robustness of decision and …


Quantification Of Various Types Of Biases In Large Language Models, Sudhashree Sayenju Apr 2023

Quantification Of Various Types Of Biases In Large Language Models, Sudhashree Sayenju

Doctor of Data Science and Analytics Dissertations

Natural Language Processing (NLP) systems are included everywhere on the internet from search engines, language translations to more advanced systems like voice assistant and customer service. Since humans are always on the receiving end of NLP technologies, it is very important to analyze whether or not the Large Language Models (LLMs) in use have bias and are therefore unfair. The majority of the research in NLP bias has focused on societal stereotype biases embedded in LLMs. However, our research focuses on all types of biases, namely model class level bias, stereotype bias and domain bias present in LLMs. Model class …


Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn Mar 2023

Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn

SMU Data Science Review

Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …


Modeling Radiation Exposure On Flight Missions To Analyze Aircrew Risk, Camila V. Quintero Hilsaca Mar 2023

Modeling Radiation Exposure On Flight Missions To Analyze Aircrew Risk, Camila V. Quintero Hilsaca

Theses and Dissertations

GCR and SPE comprise the majority of the ionizing radiation experienced in the upper atmosphere within flight-altitude environments. Although previous studies have analyzed radiation doses from single sources on civilian flight operations, there is a lack of research focused on dose received by military personnel during flight from both sources simultaneously. In-flight radiation environments are modeled through the MCNP6 for two separate aircraft, an Air Force A-10 and a Boeing 737. Particle fluence values for galactic cosmic rays and solar particle events for four separate flight paths are determined using the CARI-7A software and the SIRE2 toolkit, respectively. MCNP6 code …


Fragility Of The Florida Panhandle's Electrical Transmission Grid To Hurricanes, Zachary D. Schumann Mar 2023

Fragility Of The Florida Panhandle's Electrical Transmission Grid To Hurricanes, Zachary D. Schumann

Theses and Dissertations

The increased frequency and intensity of extreme weather events from climate change necessitates understanding impacts on critical infrastructure, particularly electrical transmission grids. One of the foundational concepts of a grid’s resilience is its robustness to extreme weather events, such as hurricanes. Resilience of the electric grid to high wind speeds is predicated upon the location and physical characteristics of the system components. Previous modeling assessments of electric grid failure were done at the systems level with assumptions on location and type of specific components. To facilitate more explicit adaptation metrics, accurate component-level information is needed. In this study, we build …


Examining Fuel Service System Failures Of The Usaf R11 Using Survival Analysis, Roed M.S. Mejia Mar 2023

Examining Fuel Service System Failures Of The Usaf R11 Using Survival Analysis, Roed M.S. Mejia

Theses and Dissertations

Recent events show that fuel supply is a large contributor to the success or failure of a military operation in response to a contingency. Any future near-peer conflict will stress the supply chain and require fully operational vehicles to be ready for the primary mission sets they support. In the United States Air Force (USAF), the readiness of fuel distribution trucks is crucial to meeting those mission sets in global operations. Utilizing non-parametric and semi-parametric survival models, which do not assume specific probability distributions, this study analyzes maintenance data for R-11 trucks that refuel aircraft.


Improving The Health And Safety Of Manufacturing Workers By Detecting And Addressing Personal Protective Equipment (Ppe) Violations In Real-Time With The Use Of Automated Ppe Detection Technology, Joseph Olufemi Fasinu Jan 2023

Improving The Health And Safety Of Manufacturing Workers By Detecting And Addressing Personal Protective Equipment (Ppe) Violations In Real-Time With The Use Of Automated Ppe Detection Technology, Joseph Olufemi Fasinu

Graduate Theses, Dissertations, and Problem Reports

The Centers for Disease Control and Prevention (CDC) emphasized that Personal Protective Equipment (PPE) can significantly reduce the risk of occupational injuries and illnesses. However, improper use, failure to use, and other PPE-related violations can still result in injuries and fatalities. Eye and face protection violation has been one of the top 10 most frequently violated OSHA standards in fiscal years 2018, 2019, 2020, 2021 and 2022 consecutively. A common practice among safety professionals to ensure PPE compliance has been to physically inspect or monitor PPE usage among workers, which has been found to be unsustainable on a continuous real-time …


Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun Jan 2023

Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun

Electronic Theses and Dissertations

Data science plays a crucial role in enabling organizations to optimize data-driven opportunities within financial risk management. It involves identifying, assessing, and mitigating risks, ultimately safeguarding investments, reducing uncertainty, ensuring regulatory compliance, enhancing decision-making, and fostering long-term sustainability. This thesis explores three facets of Data Science projects: enhancing customer understanding, fraud prevention, and predictive analysis, with the goal of improving existing tools and enabling more informed decision-making. The first project examined leveraged big data technologies, such as Hadoop and Spark, to enhance financial risk management by accurately predicting loan defaulters and their repayment likelihood. In the second project, we investigated …


Dynamic Rbi With Central Difference Method Approach In Calculation Of Uniform Corrosion Rate: A Casestudy On Gas Pipelines, M.Riefqi Dwi Alviansyah, Fernanda Hartoyo, Zahra Nadia Nurullia, Ari Kurniawan Dec 2022

Dynamic Rbi With Central Difference Method Approach In Calculation Of Uniform Corrosion Rate: A Casestudy On Gas Pipelines, M.Riefqi Dwi Alviansyah, Fernanda Hartoyo, Zahra Nadia Nurullia, Ari Kurniawan

Journal of Materials Exploration and Findings

The oil and gas industry generally uses a piping system to drain fluids. Even though the pipes used have been well designed, the use of pipes as a means of fluid transportation still provides the possibility of failure that can occur at any time, one of which is due to uniform corrosion. The use of standard Risk Based Inspection (RBI) according to the API RBI 581 document has been widely used to anticipate potential failures to pipe components. The use of standard RBI can reduce the risk of failure significantly. Because the standard RBI considers the component risk value to …


Cloud Container Security’ Next Move, Vishakha Sadhwani Dec 2022

Cloud Container Security’ Next Move, Vishakha Sadhwani

Dissertations and Theses

In the last few years, it is apparent to cybersecurity experts everywhere that the proverbial container tech genie is out of the bottle, and has been widely embraced across multiple organizations. To achieve the flexibility of building and deploying applications anywhere and everywhere, cloud native environments have gained great momentum and made the development lifecycle simpler than ever. However, container environments brings with them a range of cybersecurity issues that includes images, containers, hosts, runtimes, registries, and orchestration platforms, which needs the necessity to focus on investing in securing your container stack.

According to this report[1], released by cloud-native …


Towards Structured Planning And Learning At The State Fisheries Agency Scale, Caleb A. Aldridge Dec 2022

Towards Structured Planning And Learning At The State Fisheries Agency Scale, Caleb A. Aldridge

Theses and Dissertations

Inland recreational fisheries has grown philosophically and scientifically to consider economic and sociopolitical aspects (non-biological) in addition to the biological. However, integrating biological and non-biological aspects of inland fisheries has been challenging. Thus, an opportunity exists to develop approaches and tools which operationalize planning and decision-making processes which include biological and non-biological aspects of a fishery. This dissertation expands the idea that a core set of goals and objectives is shared among and within inland fisheries agencies; that many routine operations of inland fisheries managers can be regimented or standardized; and the novel concept that current information and operations can …


Scale Modeling Of An Appearance Of Downwash Pattern Of Hot Smoke Ejected From Chimney In The Turbulent Cross Flow, Xangpheuak Inthavideth, Nobumasa Sekishita, Sounthisack Phommachanh, Yuji Nakamura Nov 2022

Scale Modeling Of An Appearance Of Downwash Pattern Of Hot Smoke Ejected From Chimney In The Turbulent Cross Flow, Xangpheuak Inthavideth, Nobumasa Sekishita, Sounthisack Phommachanh, Yuji Nakamura

Progress in Scale Modeling, an International Journal

This study aims to elucidate the scaling law to provide the critical condition on appearance of the downwash pattern of the hot smoke ejected from a chimney in a turbulent cross flow. A specially designed wind tunnel with an active turbulence generator developed by Makita was adopted to offer a quasi-isotropic turbulence field in a lab-scale test facility. A heated jet with smoke is issued into the cross flow from the vertically oriented chimney placed in the test section of the wind tunnel. In this study, the experimental parameters considered are temperature of the heated jet (smoke), jet ejected velocity, …


Adaptive Risk Network Dependency Analysis Of Complex Hierarchical Systems, Katherine L. Smith Aug 2022

Adaptive Risk Network Dependency Analysis Of Complex Hierarchical Systems, Katherine L. Smith

Computational Modeling & Simulation Engineering Theses & Dissertations

Recently the number, variety, and complexity of interconnected systems have been increasing while the resources available to increase resilience of those systems have been decreasing. Therefore, it has become increasingly important to quantify the effects of risks and the resulting disruptions over time as they ripple through networks of systems. This dissertation presents a novel modeling and simulation methodology which quantifies resilience, as impact on performance over time, and risk, as the impact of probabilistic disruptions. This work includes four major contributions over the state-of-the-art which are: (1) cyclic dependencies are captured by separation of performance variables into layers which …