Thomas A. Mazzuchi
YOU?
Author Swipe
View article: Study of Deep learning Architectures for Network Intrusion Detection
Study of Deep learning Architectures for Network Intrusion Detection Open
View article: State Machine Model for The Update Framework (TUF)
State Machine Model for The Update Framework (TUF) Open
The Update Framework or TUF was developed to address several known weaknesses that have been observed in software update distribution and validation systems. Unlike conventional secure software distribution methods where there may be a sin…
View article: Stateful Hash-Based Signature (SHBS) Benchmark Data for XMSS and LMS
Stateful Hash-Based Signature (SHBS) Benchmark Data for XMSS and LMS Open
The National Institute of Standards and Technology (NIST) has recommended the use of stateful hash-based digital signatures for long-term applications that may require protection from future threats that use quantum computers. XMSS and LMS…
View article: Mitigating Cybersecurity Risks in Grids With a High Penetration of Distributed Renewables
Mitigating Cybersecurity Risks in Grids With a High Penetration of Distributed Renewables Open
The increasing penetration of distributed renewables creates new threats to the optimal planning, management, and operation of the electric grid. In particular, new standards that mandate real‐time visibility and communications to grid ope…
View article: Fairness-Optimized Dynamic Aggregation (Foda): A Novel Approach to Equitable Federated Learning in Heterogeneous Environments
Fairness-Optimized Dynamic Aggregation (Foda): A Novel Approach to Equitable Federated Learning in Heterogeneous Environments Open
View article: Leveraging publicly available data to evaluate health reform: establishing a methodology to assess the future impact of over-the-counter hearing aids
Leveraging publicly available data to evaluate health reform: establishing a methodology to assess the future impact of over-the-counter hearing aids Open
View article: Risk Model for Choosing Signature Thresholds for Software Update in a Critical Infrastructure Application
Risk Model for Choosing Signature Thresholds for Software Update in a Critical Infrastructure Application Open
View article: A Bayesian generalized Eyring‐Weibull accelerated life testing model
A Bayesian generalized Eyring‐Weibull accelerated life testing model Open
In this paper, a novel approach to a Bayesian accelerated life testing model is presented. The Weibull distribution is used as the life distribution and the generalized Eyring model as the time transformation function. This is a model that…
View article: A Literature Review of the Construction and Utilization of Risk Matrices: A U.S. Aerospace Industry Perspective
A Literature Review of the Construction and Utilization of Risk Matrices: A U.S. Aerospace Industry Perspective Open
View article: Python Source Code Vulnerability Detection with Named Entity Recognition
Python Source Code Vulnerability Detection with Named Entity Recognition Open
View article: Preliminary Evolutionary Network Model for Efficient Collaboration in Systems-of-Systems
Preliminary Evolutionary Network Model for Efficient Collaboration in Systems-of-Systems Open
Collaborative systems-of-systems (CSoSs) are defined by the Systems Engineering Body of Knowledge as groups of constituent systems that voluntarily work with each other toward a common goal. As the complexity, sociotechnical interactions, …
View article: An improved real time detection of data poisoning attacks in deep learning vision systems
An improved real time detection of data poisoning attacks in deep learning vision systems Open
The practice of using deep learning methods in safety critical vision systems such as autonomous driving has come a long way. As vision systems supported by deep learning methods become ubiquitous, the possible security threats faced by th…
View article: An improved real time detection of data poisoning attacks in Deep Learning Vision systems
An improved real time detection of data poisoning attacks in Deep Learning Vision systems Open
The practice of using deep learning methods in safety critical vision systems such as autonomous driving has come a long way. As vision systems supported by deep learning methods become ubiquitous, the possible security threats faced by th…
View article: Performance Analysis of IPv6 Transition Mechanisms over MPLS
Performance Analysis of IPv6 Transition Mechanisms over MPLS Open
Exhaustion of current version of Internet Protocol version 4 (IPv4) addresses initiated development of next-generation Internet Protocol version 6 (IPv6). IPv6 is acknowledged to provide more address space, better address design, and great…
View article: APPLYING THE ANALYTIC HIERARCHY PROCESS (AHP) TO EXPERT DOCUMENTS
APPLYING THE ANALYTIC HIERARCHY PROCESS (AHP) TO EXPERT DOCUMENTS Open
This paper explores an innovative technique to elicit prioritization from expert documents using the Analytic Hierarchy Process (AHP). Practitioners within domains that have a large quantity of expert literature can utilize these prior eff…
View article: A Multi-Objective Evolutionary Approach Towards Automated Online Controlled Experiments
A Multi-Objective Evolutionary Approach Towards Automated Online Controlled Experiments Open
View article: A Launch Decision-Making Framework for Online Controlled Experiments Using Multi-Criteria Decision-Making
A Launch Decision-Making Framework for Online Controlled Experiments Using Multi-Criteria Decision-Making Open
View article: A Generative Approach to Open Set Recognition Using Distance-Based Probabilistic Anomaly Augmentation
A Generative Approach to Open Set Recognition Using Distance-Based Probabilistic Anomaly Augmentation Open
Machine learning (ML) algorithms that are used in decision support (DS) and autonomous systems commonly train on labeled categorical samples from a closed set. This, however, poses a problem for deployed DS and autonomous systems when they…
View article: Distance-based Probabilistic Data Augmentation for Synthetic Minority Oversampling
Distance-based Probabilistic Data Augmentation for Synthetic Minority Oversampling Open
Class imbalance can adversely affect the performance of machine learning for prediction and classification. One approach to address the class imbalance problem is synthetic minority oversampling. Oversampling approaches can be broadly cate…
View article: Risk Management Application in an Oil and Gas Company for Projects
Risk Management Application in an Oil and Gas Company for Projects Open
Oil and gas projects are at high risk and the reasons can be the adoption of complex technology, participation of different parties, etc. Oil and gas industries are often vulnerable to risks and hazards, but they overcome these problems by…
View article: A Simulation-based Optimization Approach to Logistic and Supply Chain Network Design
A Simulation-based Optimization Approach to Logistic and Supply Chain Network Design Open
The Department of Defense (DoD) operates a world-wide supply chain, which in 2017 contained nearly 5 million items collectively valued at over $90 billion. Since at least 1990, designing and operating this supply chain, and adapting it to …
View article: Predicting long-time contributors for GitHub projects using machine learning
Predicting long-time contributors for GitHub projects using machine learning Open
Many organizations develop software systems using open source software (OSS), which is risky due to the high possibility of losing support. Contributors are critical for the survival of OSS projects, but very few new contributors remain wi…
View article: Effective Decision-Making Behaviors for Defense R&D: Accounting for Dynamic Competition
Effective Decision-Making Behaviors for Defense R&D: Accounting for Dynamic Competition Open
Research and Development (R&D) in the Department of Defense (DoD) is shaped by competition. Competition is a complex, interactive process that is difficult to predict and has significant effects on the value of R&D investments over time. I…
View article: Managing in a Post-COVID-19 World: A Stakeholder Network Perspective
Managing in a Post-COVID-19 World: A Stakeholder Network Perspective Open
This article argues that technical leaders in a post-COVID-19 world should adopt stakeholder-oriented management techniques tailored to complex, chaotic, and disordered domains. In part, this is because the unprecedented breadth of the nov…
View article: Expert forecasting with and without uncertainty quantification and weighting: What do the data say?
Expert forecasting with and without uncertainty quantification and weighting: What do the data say? Open
Post-2006 expert judgment data has been extended to 530 experts assessing 580 calibration variables from their fields. New analysis shows that point predictions as medians of combined expert distributions outperform combined medians, and m…
View article: Using Adaptive Replacement to Minimize Risk in the Oil and Gas Industry
Using Adaptive Replacement to Minimize Risk in the Oil and Gas Industry Open
This abstract book contains abstracts of the various research ideas presented at The Second Eurasian RISK-2020 Conference and Symposium.The RISK-2020 Conference and Symposium served as a perfect venue for practitioners, engineers, research…
View article: Generalized trapezoidal ogive curves for fatality rate modeling
Generalized trapezoidal ogive curves for fatality rate modeling Open
The construction of a continuous family of distributions on a compact set is demonstrated by concatenating, in a continuous manner, three probability density functions with bounded support using a modified mixture technique. The constructi…
View article: Open Source Software Survivability Prediction Using Multi Layer Perceptron
Open Source Software Survivability Prediction Using Multi Layer Perceptron Open
Many organizations develop software systems using Open Source Software (OSS) components. OSS components have a high risk of going out of support, making dependency on OSS components risky. So, it is imperative to perform risk assessment du…
View article: Managing Complexity with Design Structure Matrices – An Operational Life Integration Challenge
Managing Complexity with Design Structure Matrices – An Operational Life Integration Challenge Open
The study is investigating the application of Design Structure Matrices (DSM) to a new domain. The idea is to use this tool to expand the application of model-based engineering into a new domain, operation integration of human crews with d…
View article: Proceedings of the 21st International DSM Conference
Proceedings of the 21st International DSM Conference Open