
Filter News
Area of Research
News Topics
- (-) Cybersecurity (35)
- (-) Fossil Energy (8)
- 3-D Printing/Advanced Manufacturing (146)
- Advanced Reactors (40)
- Artificial Intelligence (130)
- Big Data (79)
- Bioenergy (112)
- Biology (128)
- Biomedical (73)
- Biotechnology (39)
- Buildings (74)
- Chemical Sciences (86)
- Clean Water (33)
- Composites (35)
- Computer Science (226)
- Coronavirus (48)
- Critical Materials (29)
- Education (5)
- Element Discovery (1)
- Emergency (4)
- Energy Storage (114)
- Environment (218)
- Exascale Computing (67)
- Frontier (64)
- Fusion (66)
- Grid (74)
- High-Performance Computing (130)
- Hydropower (12)
- Irradiation (3)
- Isotopes (62)
- ITER (9)
- Machine Learning (68)
- Materials (157)
- Materials Science (158)
- Mathematics (12)
- Mercury (12)
- Microelectronics (4)
- Microscopy (56)
- Molten Salt (10)
- Nanotechnology (64)
- National Security (86)
- Neutron Science (171)
- Nuclear Energy (122)
- Partnerships (67)
- Physics (69)
- Polymers (35)
- Quantum Computing (53)
- Quantum Science (92)
- Security (31)
- Simulation (65)
- Software (1)
- Space Exploration (26)
- Statistics (4)
- Summit (71)
- Transportation (102)
Media Contacts
Connect with ORNL
Get ORNL News

As leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory, Kerekes heads an accelerated lab-directed research program to build virtual models of critical infrastructure systems like the power grid that can be used to develop ways to detect and repel cyber-intrusion and to make the network resilient when disruption occurs.

A new Oak Ridge National Laboratory-developed method promises to protect connected and autonomous vehicles from possible network intrusion. Researchers built a prototype plug-in device designed to alert drivers of vehicle cyberattacks. The prototype is coded to learn regular timing...

Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.