Filter News
Area of Research
News Type
News Topics
- (-) Security (13)
- 3-D Printing/Advanced Manufacturing (53)
- Advanced Reactors (13)
- Artificial Intelligence (53)
- Big Data (25)
- Bioenergy (55)
- Biology (63)
- Biomedical (32)
- Biotechnology (10)
- Buildings (22)
- Chemical Sciences (32)
- Clean Water (14)
- Climate Change (54)
- Composites (10)
- Computer Science (97)
- Coronavirus (21)
- Critical Materials (2)
- Cybersecurity (20)
- Decarbonization (46)
- Education (1)
- Emergency (2)
- Energy Storage (43)
- Environment (114)
- Exascale Computing (26)
- Fossil Energy (4)
- Frontier (26)
- Fusion (37)
- Grid (26)
- High-Performance Computing (53)
- Hydropower (5)
- Irradiation (1)
- Isotopes (33)
- ITER (3)
- Machine Learning (23)
- Materials (71)
- Materials Science (63)
- Mathematics (5)
- Mercury (7)
- Microelectronics (2)
- Microscopy (28)
- Molten Salt (2)
- Nanotechnology (28)
- National Security (41)
- Net Zero (9)
- Neutron Science (59)
- Nuclear Energy (65)
- Partnerships (20)
- Physics (34)
- Polymers (13)
- Quantum Computing (22)
- Quantum Science (34)
- Renewable Energy (1)
- Simulation (34)
- Software (1)
- Space Exploration (13)
- Summit (32)
- Sustainable Energy (51)
- Transformational Challenge Reactor (4)
- Transportation (37)
Media Contacts
A typhoon strikes an island in the Pacific Ocean, downing power lines and cell towers. An earthquake hits a remote mountainous region, destroying structures and leaving no communication infrastructure behind.
As technology continues to evolve, cybersecurity threats do as well. To better safeguard digital information, a team of researchers at the US Department of Energy’s (DOE’s) Oak Ridge National Laboratory (ORNL) has developed Akatosh, a security analysis tool that works in conjunctio...
As leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory, Kerekes heads an accelerated lab-directed research program to build virtual models of critical infrastructure systems like the power grid that can be used to develop ways to detect and repel cyber-intrusion and to make the network resilient when disruption occurs.