This growing collection consists of scholarly works authored by ASU-affiliated faculty, staff, and community members, and it contains many open access articles. ASU-affiliated authors are encouraged to Share Your Work in KEEP.

Displaying 21 - 30 of 58
Filtering by

Clear all filters

Description

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term “spatio” refers to the IP address space. In particular, we focus on analyzing macroscopic properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic and stochastic. Strikingly, there are very few sets of major attackers committing almost all the attacks, since their attack “fingerprints” and target selection scheme can be unequivocally identified according to the very limited number of unique spatiotemporal characteristics, each of which only exists on a consecutive IP region and differs significantly from the others. We utilize a number of quantitative measures, including the flux-fluctuation law, the Markov state transition probability matrix, and predictability measures, to characterize the attack patterns in a comprehensive manner. A general finding is that the attack patterns possess high degrees of predictability, potentially paving the way to anticipating and, consequently, mitigating or even preventing large-scale cyberattacks using macroscopic approaches.

ContributorsChen, Yu-Zhong (Author) / Huang, Zi-Gang (Author) / Xu, Shouhuai (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-05-20
Description

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low efficiency, resource scarcity, and partial system failures. Under certain conditions global catastrophe on the scale of the whole system can occur through the dynamical process of cascading failures. We investigate optimization and resilience of time-varying supply-demand systems by constructing network models of such systems, where resources are transported from the supplier sites to users through various links. Here by optimization we mean minimization of the maximum load on links, and system resilience can be characterized using the cascading failure size of users who fail to connect with suppliers.

We consider two representative classes of supply schemes: load driven supply and fix fraction supply. Our findings are: (1) optimized systems are more robust since relatively smaller cascading failures occur when triggered by external perturbation to the links; (2) a large fraction of links can be free of load if resources are directed to transport through the shortest paths; (3) redundant links in the performance of the system can help to reroute the traffic but may undesirably transmit and enlarge the failure size of the system; (4) the patterns of cascading failures depend strongly upon the capacity of links; (5) the specific location of the trigger determines the specific route of cascading failure, but has little effect on the final cascading size; (6) system expansion typically reduces the efficiency; and (7) when the locations of the suppliers are optimized over a long expanding period, fewer suppliers are required. These results hold for heterogeneous networks in general, providing insights into designing optimal and resilient complex supply-demand systems that expand constantly in time.

ContributorsZhang, Si-Ping (Author) / Huang, Zi-Gang (Author) / Dong, Jia-Qi (Author) / Eisenberg, Daniel (Author) / Seager, Thomas (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-06-23
128312-Thumbnail Image.png
Description

A significant challenge of our time is conserving biological diversity while maintaining economic development and cultural values. The United Nations Educational, Scientific and Cultural Organization has established biosphere reserves within its Man and the Biosphere program as a model means for accomplishing this very challenge. The East Carpathians Biosphere Reserve

A significant challenge of our time is conserving biological diversity while maintaining economic development and cultural values. The United Nations Educational, Scientific and Cultural Organization has established biosphere reserves within its Man and the Biosphere program as a model means for accomplishing this very challenge. The East Carpathians Biosphere Reserve (ECBR), spreading across Poland, Slovakia, and Ukraine, represents a large social-ecological system (SES) that has been protected under the biosphere reserve designation since 1998. We have explored its successes and failures in improving human livelihoods while safeguarding its ecosystems. The SES framework, which includes governance system, actors, resources, and external influences, was used as a frame of analysis. The outcomes of this protected area have been mixed; its creation led to national and international collaboration, yet some actor groups remain excluded. Implementation of protocols arising from the Carpathian Convention has been slow, while deforestation, hunting, erosion, temperature extremes, and changes in species behavior remain significant threats but have also been factors in ecological adaptation. The loss of cultural links and traditional knowledge has also been significant. Nevertheless, this remains a highly biodiverse area. Political barriers and institutional blockages will have to be removed to ensure this reserve fulfills its role as a model region for international collaboration and capacity building. These insights drawn from the ECBR demonstrate that biosphere reserves are indeed learning sites for sustainable development and that this case is exemplary in illustrating the challenges, but more importantly, the opportunities that arise when ensuring parallel care and respect for people and ecosystems through the model of transboundary protected areas around the world.

Created2016
128119-Thumbnail Image.png
Description

Dynamical processes occurring on the edges in complex networks are relevant to a variety of real-world situations. Despite recent advances, a framework for edge controllability is still required for complex networks of arbitrary structure and interaction strength. Generalizing a previously introduced class of processes for edge dynamics, the switchboard dynamics,

Dynamical processes occurring on the edges in complex networks are relevant to a variety of real-world situations. Despite recent advances, a framework for edge controllability is still required for complex networks of arbitrary structure and interaction strength. Generalizing a previously introduced class of processes for edge dynamics, the switchboard dynamics, and exploit- ing the exact controllability theory, we develop a universal framework in which the controllability of any node is exclusively determined by its local weighted structure. This framework enables us to identify a unique set of critical nodes for control, to derive analytic formulas and articulate efficient algorithms to determine the exact upper and lower controllability bounds, and to evaluate strongly structural controllability of any given network. Applying our framework to a large number of model and real-world networks, we find that the interaction strength plays a more significant role in edge controllability than the network structure does, due to a vast range between the bounds determined mainly by the interaction strength. Moreover, transcriptional regulatory networks and electronic circuits are much more strongly structurally controllable (SSC) than other types of real-world networks, directed networks are more SSC than undirected networks, and sparse networks are typically more SSC than dense networks.

ContributorsPang, Shao-Peng (Author) / Wang, Wen-Xu (Author) / Hao, Fei (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2017-06-26
128138-Thumbnail Image.png
Description

Evolutionary games of cyclic competitions have been extensively studied to gain insights into one of the most fundamental phenomena in nature: biodiversity that seems to be excluded by the principle of natural selection. The Rock-Paper-Scissors (RPS) game of three species and its extensions [e.g., the Rock-Paper-Scissors-Lizard-Spock (RPSLS) game] are paradigmatic

Evolutionary games of cyclic competitions have been extensively studied to gain insights into one of the most fundamental phenomena in nature: biodiversity that seems to be excluded by the principle of natural selection. The Rock-Paper-Scissors (RPS) game of three species and its extensions [e.g., the Rock-Paper-Scissors-Lizard-Spock (RPSLS) game] are paradigmatic models in this field. In all previous studies, the intrinsic symmetry associated with cyclic competitions imposes a limitation on the resulting coexistence states, leading to only selective types of such states. We investigate the effect of nonuniform intraspecific competitions on coexistence and find that a wider spectrum of coexistence states can emerge and persist. This surprising finding is substantiated using three classes of cyclic game models through stability analysis, Monte Carlo simulations and continuous spatiotemporal dynamical evolution from partial differential equations. Our finding indicates that intraspecific competitions or alternative symmetry-breaking mechanisms can promote biodiversity to a broader extent than previously thought.

ContributorsPark, Junpyo (Author) / Do, Younghae (Author) / Jang, Bongsoo (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2017-08-07
128246-Thumbnail Image.png
Description

Protected areas are a cornerstone of biodiversity conservation, and increasingly, conservation science is integrating ecological and social considerations in park management. Indeed, both social and ecological factors need to be considered to understand processes that lead to changes in environmental conditions. Here, we use a social-ecological systems lens to examine

Protected areas are a cornerstone of biodiversity conservation, and increasingly, conservation science is integrating ecological and social considerations in park management. Indeed, both social and ecological factors need to be considered to understand processes that lead to changes in environmental conditions. Here, we use a social-ecological systems lens to examine changes in governance through time in an extensive regional protected area network, the Great Barrier Reef Marine Park. We studied the peer-reviewed and nonpeer-reviewed literature to develop an understanding of governance of the Great Barrier Reef Marine Park and its management changes through time. In particular, we examined how interacting and changing property rights, as designated by the evolving marine protected area network and other institutional changes (e.g., fisheries management), defined multiple goods and ecosystem services and altered who could benefit from them.

The rezoning of the Great Barrier Reef Marine Park in 2004 substantially altered the types and distribution of property rights and associated benefits from ecosystem goods and services. Initially, common-pool resources were enjoyed as common and private benefits at the expense of public goods (overexploited fisheries and reduced biodiversity and ecosystem health). The rezoning redefined the available goods and benefits and who could benefit, prioritizing public goods and benefits (i.e., biodiversity conservation), and inducing private costs (through reduced fishing). We also found that the original conceptualization of the step-wise progression of property rights from user to owner oversimplifies property rights based on its division into operational and collective-choice rule-making levels. Instead, we suggest that a diversity of available management tools implemented simultaneously can result in interactions that are seldom fully captured by the original conceptualization of the bundling of property rights. Understanding the complexities associated with overlapping property rights and multiple goods and ecosystem services, particularly within large-scale systems, can help elucidate the source and nature of some of the governance challenges that large protected areas are facing.

Created2015
128248-Thumbnail Image.png
Description

In order to improve the efficiency of government spending, it is necessary for the decentralized irrigation management to gain support from local institutions. Efficient institutions take on several distinct configurations in different irrigation districts. In this research, we upgrade Tang’s (1992) framework focusing on incentives, to a framework that includes

In order to improve the efficiency of government spending, it is necessary for the decentralized irrigation management to gain support from local institutions. Efficient institutions take on several distinct configurations in different irrigation districts. In this research, we upgrade Tang’s (1992) framework focusing on incentives, to a framework that includes institutional incentives and coordination. Within the framework, we then classify 5 institutional variables: water pricing reform (P), government funding (F), coordination by administration (C), having formal monitors (M) and self-organized management (S). This article processes the data obtained through a field survey (2009–2011) in 20 of China’s southern counties, where they implement the “Small-scale Irrigation and Water Conservancy Key Counties Construction (Key Counties Construction)”, a national project supported by the central government. Next, it applies Data Envelopment Analysis (DEA) to measure the efficiency of government spending and uses Qualitative Comparative Analysis (QCA) to extract efficient institutional configurations. It concludes that there are generally three types of institutional configurations able to improve the efficiency of government spending, which are respectively: “government funding combined with coordination by administration”, “water pricing reform combined with self-organized management and coordination by administration or water pricing reform combined with self-organized management and government funding and formal monitors” and “self-organized management”. Among these, the second configuration is a mixed governance structure with multiple institutions coexisting, and this configuration occurs in the most efficient key counties. For that reason, it is viewed as the mainstream irrigation management approach, and we expect it to be the development trend in the future. Although Chinese irrigation policies are formalizing effective local institutions, they are still not sufficient. Future policies are needed to 1) promote institutions of government support for water laws in order to build stable expectations for both water user associations (WUAs) and farmers, 2) guide water pricing reform by ensuring farmers’ water rights and regulating water markets, and 3) provide opportunities for hiring professional monitors and crafting formal rules.

Created2016-02-01
128389-Thumbnail Image.png
Description

Recent works revealed that the energy required to control a complex network depends on the number of driving signals and the energy distribution follows an algebraic scaling law. If one implements control using a small number of drivers, e.g. as determined by the structural controllability theory, there is a high

Recent works revealed that the energy required to control a complex network depends on the number of driving signals and the energy distribution follows an algebraic scaling law. If one implements control using a small number of drivers, e.g. as determined by the structural controllability theory, there is a high probability that the energy will diverge. We develop a physical theory to explain the scaling behaviour through identification of the fundamental structural elements, the longest control chains (LCCs), that dominate the control energy. Based on the LCCs, we articulate a strategy to drastically reduce the control energy (e.g. in a large number of real-world networks). Owing to their structural nature, the LCCs may shed light on energy issues associated with control of nonlinear dynamical networks.

ContributorsChen, Yu-Zhong (Author) / Wang, Le-Zhi (Author) / Wang, Wen-Xu (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2016-04-20
128390-Thumbnail Image.png
Description

We develop a framework to uncover and analyse dynamical anomalies from massive, nonlinear and non-stationary time series data. The framework consists of three steps: preprocessing of massive datasets to eliminate erroneous data segments, application of the empirical mode decomposition and Hilbert transform paradigm to obtain the fundamental components embedded in

We develop a framework to uncover and analyse dynamical anomalies from massive, nonlinear and non-stationary time series data. The framework consists of three steps: preprocessing of massive datasets to eliminate erroneous data segments, application of the empirical mode decomposition and Hilbert transform paradigm to obtain the fundamental components embedded in the time series at distinct time scales, and statistical/scaling analysis of the components. As a case study, we apply our framework to detecting and characterizing high-frequency oscillations (HFOs) from a big database of rat electroencephalogram recordings. We find a striking phenomenon: HFOs exhibit on–off intermittency that can be quantified by algebraic scaling laws. Our framework can be generalized to big data-related problems in other fields such as large-scale sensor data and seismic data analysis.

ContributorsHuang, Liang (Author) / Ni, Xuan (Author) / Ditto, William L. (Author) / Spano, Mark (Author) / Carney, Paul R. (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2017-01-18
128391-Thumbnail Image.png
Description

Given a complex geospatial network with nodes distributed in a two-dimensional region of physical space, can the locations of the nodes be determined and their connection patterns be uncovered based solely on data? We consider the realistic situation where time series/signals can be collected from a single location. A key

Given a complex geospatial network with nodes distributed in a two-dimensional region of physical space, can the locations of the nodes be determined and their connection patterns be uncovered based solely on data? We consider the realistic situation where time series/signals can be collected from a single location. A key challenge is that the signals collected are necessarily time delayed, due to the varying physical distances from the nodes to the data collection centre. To meet this challenge, we develop a compressive-sensing-based approach enabling reconstruction of the full topology of the underlying geospatial network and more importantly, accurate estimate of the time delays. A standard triangularization algorithm can then be employed to find the physical locations of the nodes in the network. We further demonstrate successful detection of a hidden node (or a hidden source or threat), from which no signal can be obtained, through accurate detection of all its neighbouring nodes. As a geospatial network has the feature that a node tends to connect with geophysically nearby nodes, the localized region that contains the hidden node can be identified.

ContributorsSu, Riqi (Author) / Wang, Wen-Xu (Author) / Wang, Xiao (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2016-01-06