Katy Bradford: Cassette approach offers compelling construction solution
Filter News
Area of Research
- (-) Clean Energy (89)
- (-) Computational Engineering (1)
- (-) Nuclear Science and Technology (2)
- Advanced Manufacturing (6)
- Biology and Environment (40)
- Building Technologies (2)
- Computer Science (7)
- Electricity and Smart Grid (1)
- Energy Sciences (1)
- Functional Materials for Energy (1)
- Fusion and Fission (4)
- Fusion Energy (2)
- Materials (34)
- Materials for Computing (9)
- National Security (32)
- Neutron Science (7)
- Quantum information Science (3)
- Supercomputing (30)
News Topics
- (-) Cybersecurity (9)
- (-) Machine Learning (8)
- (-) Polymers (11)
- (-) Sustainable Energy (69)
- 3-D Printing/Advanced Manufacturing (81)
- Advanced Reactors (15)
- Artificial Intelligence (9)
- Big Data (6)
- Bioenergy (26)
- Biology (11)
- Biomedical (9)
- Biotechnology (4)
- Buildings (38)
- Chemical Sciences (14)
- Clean Water (8)
- Climate Change (21)
- Composites (17)
- Computer Science (29)
- Coronavirus (13)
- Critical Materials (9)
- Decarbonization (33)
- Energy Storage (72)
- Environment (54)
- Exascale Computing (2)
- Fossil Energy (2)
- Frontier (2)
- Fusion (9)
- Grid (40)
- High-Performance Computing (7)
- Hydropower (2)
- Isotopes (6)
- Materials (35)
- Materials Science (29)
- Mathematics (2)
- Mercury (3)
- Microelectronics (1)
- Microscopy (8)
- Molten Salt (5)
- Nanotechnology (8)
- National Security (5)
- Net Zero (3)
- Neutron Science (15)
- Nuclear Energy (41)
- Partnerships (12)
- Physics (3)
- Quantum Science (2)
- Renewable Energy (1)
- Security (6)
- Simulation (4)
- Space Exploration (7)
- Statistics (1)
- Summit (5)
- Transformational Challenge Reactor (5)
- Transportation (66)
Media Contacts
As leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory, Kerekes heads an accelerated lab-directed research program to build virtual models of critical infrastructure systems like the power grid that can be used to develop ways to detect and repel cyber-intrusion and to make the network resilient when disruption occurs.