Artificial intelligence tools secure tomorrow’s electric grid
Filter News
Area of Research
- (-) Clean Energy (41)
- (-) Functional Materials for Energy (2)
- Advanced Manufacturing (1)
- Biology and Environment (39)
- Computer Science (1)
- Electricity and Smart Grid (1)
- Fusion and Fission (2)
- Isotopes (2)
- Materials (16)
- Materials for Computing (2)
- National Security (10)
- Neutron Science (3)
- Nuclear Science and Technology (2)
- Supercomputing (8)
News Type
News Topics
- (-) Artificial Intelligence (3)
- (-) Bioenergy (5)
- (-) Cybersecurity (3)
- (-) Energy Storage (23)
- (-) Environment (14)
- (-) Machine Learning (2)
- (-) Mercury (1)
- (-) Security (2)
- (-) Summit (1)
- 3-D Printing/Advanced Manufacturing (22)
- Advanced Reactors (2)
- Big Data (3)
- Biology (3)
- Biomedical (2)
- Buildings (9)
- Chemical Sciences (5)
- Clean Water (1)
- Climate Change (4)
- Composites (2)
- Computer Science (4)
- Coronavirus (6)
- Critical Materials (2)
- Decarbonization (10)
- Frontier (1)
- Fusion (1)
- Grid (8)
- High-Performance Computing (2)
- Isotopes (1)
- Materials (11)
- Materials Science (7)
- Mathematics (1)
- Microscopy (3)
- Molten Salt (1)
- Nanotechnology (4)
- National Security (1)
- Net Zero (1)
- Neutron Science (3)
- Nuclear Energy (1)
- Partnerships (1)
- Physics (1)
- Polymers (2)
- Simulation (1)
- Sustainable Energy (13)
- Transformational Challenge Reactor (1)
- Transportation (16)
Media Contacts
Sometimes solutions to the biggest problems can be found in the smallest details. The work of biochemist Alex Johs at Oak Ridge National Laboratory bears this out, as he focuses on understanding protein structures and molecular interactions to resolve complex global problems like the spread of mercury pollution in waterways and the food supply.
As leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory, Kerekes heads an accelerated lab-directed research program to build virtual models of critical infrastructure systems like the power grid that can be used to develop ways to detect and repel cyber-intrusion and to make the network resilient when disruption occurs.