Skip to main content
Ryan Kerekes is leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory. Photos by Genevieve Martin, ORNL.

As leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory, Kerekes heads an accelerated lab-directed research program to build virtual models of critical infrastructure systems like the power grid that can be used to develop ways to detect and repel cyber-intrusion and to make the network resilient when disruption occurs.

Materials—Polymer-theory-problem

Scientists at Oak Ridge National Laboratory have conducted a series of breakthrough experimental and computational studies that cast doubt on a 40-year-old theory describing how polymers in plastic materials behave during processing.

ORNL’s Steven Young (left) and Travis Johnston used Titan to prove the design and training of deep learning networks could be greatly accelerated with a capable computing system.

A team of researchers from the Department of Energy’s Oak Ridge National Laboratory has married artificial intelligence and high-performance computing to achieve a peak speed of 20 petaflops in the generation and training of deep learning networks on the

Arjun Shankar

The field of “Big Data” has exploded in the blink of an eye, growing exponentially into almost every branch of science in just a few decades. Sectors such as energy, manufacturing, healthcare and many others depend on scalable data processing and analysis for continued in...

Methanotroph_OB3b_cells

A team led by the Department of Energy’s Oak Ridge National Laboratory has identified a novel microbial process that can break down toxic methylmercury in the environment, a fundamental scientific discovery that could potentially reduce mercury toxicity levels and sup...

ORNL-Lenvio_tech_license_signing_ceremony2

Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.