Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Emilie Purvine is active.

Publication


Featured researches published by Emilie Purvine.


Archive | 2018

A Complete Characterization of the One-Dimensional Intrinsic Čech Persistence Diagrams for Metric Graphs

Ellen Gasparovic; Maria Gommel; Emilie Purvine; Bei Wang; Yusu Wang; Lori Ziegelmeier

Metric graphs are special types of metric spaces used to model and represent simple, ubiquitous, geometric relations in data such as biological networks, social networks, and road networks. We are interested in giving a qualitative description of metric graphs using topological summaries. In particular, we provide a complete characterization of the one-dimensional intrinsic Cech persistence diagrams for finite metric graphs using persistent homology. Together with complementary results by Adamaszek et al., which imply the results on intrinsic Cech persistence diagrams in all dimensions for a single cycle, our results constitute the important steps toward characterizing intrinsic Cech persistence diagrams for arbitrary finite metric graphs across all dimensions.


2016 IEEE Symposium on Technologies for Homeland Security (HST) | 2016

Applying the scientific method to cybersecurity research

Mark F. Tardiff; George T. Bonheyo; Katherine A. Cort; Thomas W. Edgar; Nancy J. Hess; William J. Hutton; Erin A. Miller; Kathleen Nowak; Christopher S. Oehmen; Emilie Purvine; Gregory K. Schenter; D. Paul

The cyber environment has rapidly evolved from a curiosity to an essential component of the contemporary world. As the cyber environment has expanded and become more complex, so have the nature of adversaries and styles of attacks. Today, cyber incidents are an expected part of life. As a result, cybersecurity research emerged to address adversarial attacks interfering with or preventing normal cyber activities. Historical response to cybersecurity attacks is heavily skewed to tactical responses with an emphasis on rapid recovery. While threat mitigation is important and can be time critical, a knowledge gap exists with respect to developing the science of cybersecurity. Such a science will enable the development and testing of theories that lead to understanding the broad sweep of cyber threats and the ability to assess trade-offs in sustaining network missions while mitigating attacks. The Asymmetric Resilient Cybersecurity Initiative at Pacific Northwest National Laboratory is a multi-year, multi-million dollar investment to develop approaches for shifting the advantage to the defender and sustaining the operability of systems under attack. The initiative established a Science Council to focus attention on the research process for cybersecurity. The Council shares science practices, critiques research plans, and aids in documenting and reporting reproducible research results. The Council members represent ecology, economics, statistics, physics, computational chemistry, microbiology and genetics, and geochemistry. This paper reports the initial work of the Science Council to implement the scientific method in cybersecurity research. The second section describes the scientific method. The third section in this paper discusses scientific practices for cybersecurity research. Section four describes initial impacts of applying the science practices to cybersecurity research.


2016 Cybersecurity Symposium (CYBERSEC) | 2016

Anomaly Detection Using Persistent Homology

Paul Bruillard; Kathleen Nowak; Emilie Purvine

Many aspects of our daily lives now rely on computers, including communications, transportation, government, finance, medicine, and education. However, with increased dependence comes increased vulnerability. Therefore recognizing attacks quickly is critical. In this paper, we introduce a new anomaly detection algorithm based on persistent homology, a tool which computes summary statistics of a manifold. The idea is to represent a cyber network with a dynamic point cloud and compare the statistics over time. The robustness of persistent homology makes for a very strong comparison invariant.


Order | 2017

Interval-Valued Rank in Finite Ordered Sets

Cliff Joslyn; Alex Pogel; Emilie Purvine

We consider the concept of rank as a measure of the vertical levels and positions of elements of partially ordered sets (posets). We are motivated by the need for algorithmic measures on large, real-world hierarchically-structured data objects like the semantic hierarchies of ontological databases. These rarely satisfy the strong property of gradedness, which is required for traditional rank functions to exist. Representing such semantic hierarchies as finite, bounded posets, we recognize the duality of ordered structures to motivate rank functions with respect to verticality both from the bottom and from the top. Our rank functions are thus interval-valued, and always exist, even for non-graded posets, providing order homomorphisms to an interval order on the interval-valued ranks. The concept of rank width arises naturally, allowing us to identify the poset region with point-valued width as its longest graded portion (which we call the “spindle”). A standard interval rank function is naturally motivated both in terms of its extremality and on pragmatic grounds. Its properties are examined, including the relationship to traditional grading and rank functions, and methods to assess comparisons of standard interval-valued ranks.


automated decision making for active cyber defense | 2016

A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks

Emilie Purvine; John R. Johnson; Chaomei Lo

Most cyber network attacks begin with an adversary gaining a foothold within the network and proceed with lateral movement until a desired goal is achieved. The mechanism by which lateral movement occurs varies but the basic signature of hopping between hosts by exploiting vulnerabilities is the same. Because of the nature of the vulnerabilities typically exploited, lateral movement is very difficult to detect and defend against. In this paper we define a dynamic reachability graph model of the network to discover possible paths that an adversary could take using different vulnerabilities, and how those paths evolve over time. We use this reachability graph to develop dynamic machine-level and network-level impact scores. Lateral movement mitigation strategies which make use of our impact scores are also discussed, and we detail an example using a freely available data set.


international conference on human-computer interaction | 2018

A Topological Approach to Representational Data Models

Emilie Purvine; Sinan Aksoy; Cliff A. Joslyn; Kathleen Nowak; Brenda Praggastis; Michael Robinson

As data accumulate faster and bigger, building representational models has turned into an art form. Despite sharing common data types, each scientific discipline often takes a different approach. In this work, we propose representational models grounded in the mathematics of algebraic topology to understand foundational data types. We present hypergraphs for multi-relational data, point clouds for vector data, and sheaf models when both data types are present and interrelated. These three models use similar principles from algebraic topology and provide a domain-agnostic framework. We will discuss each method, provide references to their foundational mathematical papers, and give examples of their use.


Journal of Complex Networks | 2018

A generative graph model for electrical infrastructure networks

Sinan Aksoy; Emilie Purvine; Eduardo Cotilla-Sanchez; Mahantesh Halappanavar

We propose a generative graph model for electrical infrastructure networks that accounts for heterogeneity in both node and edge type. To inform the design of this model, we analyze the properties of power grid graphs derived from the U.S. Eastern Interconnection, Texas Interconnection, and Poland transmission system power grids. Across these datasets, we find subgraphs induced by nodes of the same voltage level exhibit shared structural properties atypical to small-world networks, including low local clustering, large diameter and large average distance. On the other hand, we find subgraphs induced by transformer edges linking nodes of different voltage types contain a more limited structure, consisting mainly of small, disjoint star graphs. The goal of our proposed model is to match both these inter and intra-network properties by proceeding in two phases: we first generate subgraphs for each voltage level and then generate transformer edges that connect these subgraphs. The first phase of the model adapts the Chung-Lu random graph model, taking desired vertex degrees and desired diameter as inputs, while the second phase of the model is based on a simpler random star graph generation process. We test the performance of our model by comparing its output across many runs to the aforementioned real data. In nearly all categories tested, we find our model is more accurate in reproducing the unusual mixture of properties apparent in the data than the Chung-Lu model. We also include graph visualization comparisons, as well as a brief analysis of edge-deletion resiliency. Ultimately, our model may be used to generate synthetic graph data, test hypotheses and algorithms at different scales, and serve as a baseline model on top of which further electrical network properties, device models, and interdependencies to other networks, may be appended.


Archive | 2016

Information Measures of Frequency Distributions with an Application to Labeled Graphs

Cliff Joslyn; Emilie Purvine

The problem of describing the distribution of labels over a set of objects is common in many domains. Cyber security, social media, and protein interactions all care about the manner in which labels are distributed among different objects. In this paper we present three interacting statistical measures on label distributions, thought of as integer partitions, inspired by entropy and information theory. Of central concern to us is how the open- versus closed-world semantics of one’s problem leads to different ways that information about the support of a distribution is accounted for. In particular, we can consider the number of labels seen in a particular data set in relation to both the number of items and the number of labels available, if known. This will lead us to consider both two alternate entropy normalizations, and a new measure specifically of support size, based not on entropy but on nonspecificity measures as used in nontraditional information theory. The entropy- and nonspecificity-based measures are related in their ability to index integer partitions within Young’s lattice. Labeled graphs are discussed as a specific case of labels distributed over a set of edges. We describe a use case in cyber security using a labeled directed multigraph of IPFLOW. Finally, we show how these measures respond when labels are updated in certain ways corresponding to particular changes of the Young’s diagram of an integer partition.


symposium on computational geometry | 2018

Vietoris-Rips and Cech Complexes of Metric Gluings

Michal Adamaszek; Henry Adams; Ellen Gasparovic; Maria Gommel; Emilie Purvine; Bei Wang; Yusu Wang; Lori Ziegelmeier


Journal of Physical Chemistry B | 2016

Energy Minimization of Discrete Protein Titration State Models Using Graph Theory

Emilie Purvine; Kyle E. Monson; Elizabeth Jurrus; Keith T. Star; Nathan A. Baker

Collaboration


Dive into the Emilie Purvine's collaboration.

Top Co-Authors

Avatar

Cliff Joslyn

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Kathleen Nowak

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Brenda Praggastis

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Cliff A. Joslyn

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mahantesh Halappanavar

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge