Skip to main content
Researcher in AI Governance and Safety-Critical Autonomous Systems

Burak Oktenli

Governance Architectures for Safe Autonomous Systems Burak Oktenli

Developing operational governance architectures that enable safe, accountable, and controllable deployment of autonomous systems in critical infrastructure, national security, and safety-critical autonomous environments. These architectures function as control layers governing how authority is granted, restricted, and recovered within autonomous systems. This work focuses on authority lifecycle control, decision integrity, and fail-safe recovery mechanisms that maintain human oversight in high-speed human-machine environments.

This research integrates physical testbeds, simulation platforms, and formal architectural design.

4 U.S. Provisional Patents Submitted (HMAA, CARA, SATA, FLAME)
24 Published Works with DOIs and Public Disclosures
Georgetown University, M.P.S. Applied Intelligence (In Progress)
140+ Professional Credentials from 25+ Institutions
Institute of Electrical and Electronics Engineers (IEEE) Member #102193505
American Institute of Aeronautics and Astronautics (AIAA) Member #1936005
Association for Computing Machinery (ACM) Member #9952787
Association for the Advancement of Artificial Intelligence (AAAI) Member #656504
Institute for Operations Research and the Management Sciences (INFORMS) Member #2009712
National Defense Industrial Association (NDIA) Member #1700222
Sigma Beta Delta International Honor Society — Lifetime Member #2007930

Research Mission

The Problem. Autonomous systems in defense and civilian transportation make decisions faster than humans can intervene, yet no standardized architecture enforces real-time authority governance. DoD Directive 3000.09 requires human control over autonomous weapons but lacks a technical enforcement mechanism. Nearly 40,000 Americans die annually in traffic crashes; NHTSA has documented 1,429 AV incidents (2021-2025); and the SELF DRIVE Act of 2026 (H.R. 7390) now mandates cybersecurity plans for "false vehicle control commands" — but no validated reference architecture exists to implement these requirements.

The Gap. Policy frameworks (NIST AI RMF) establish principles but do not enforce them in hardware. Planning-layer safety systems (Mobileye RSS, NVIDIA SFF, SOTIF) constrain behavior but do not govern whether commands reach actuators. Software-only monitors can be bypassed. What is missing: a hardware-enforced architectural layer that continuously evaluates sensor trust, computes graded authority, enforces deliberation windows, and cuts actuator authority through a fail-safe when trust degrades — deterministically, in real-time, without firmware involvement.

My Contribution. Seven governance architectures managing the full authority lifecycle — trust evaluation, authority computation, command gating, consensus, deliberation, deception detection, and recovery:

  • SATA — Sensor trust attestation using weighted Dempster-Shafer fusion with cross-sensor validation (Patent: U.S. Provisional 64/002,453)
  • HMAA — Four-level authority computation (A3-A0) with asymmetric hysteresis: immediate downgrade, 5-15s delayed upgrade (Patent: 63/999,105)
  • CARA — Deterministic GREP-phase recovery: Govern → Restrict → Execute → Persist, with mutual exclusion (Patent: 64/000,170)
  • MAIVA — Byzantine fault-tolerant multi-agent consensus with CUSUM-augmented anomaly detection
  • FLAME — Mandatory deliberation windows preventing safety-critical actions without sustained authority (Patent: 64/005,607)
  • ADARA — Adversarial deception detection computing P(adversarial) from cross-sensor consistency and temporal anomalies
  • ERAM — Escalation risk quantification for AI-enabled command-and-control decision compression

These are documented in four U.S. provisional patent submissions, twelve DOI-registered Zenodo records (including research papers with full simulation data for the rover testbed, UAV platform, BLADE-EDGE defense platform, BLADE-AV automotive platform, BLADE-MARITIME maritime platform, and BLADE-INFRA critical infrastructure platform), and twelve SSRN papers on AI governance and national security policy. Total: 24 published works with public DOIs and permalinks.

Hardware Implementation. Six physical platforms demonstrating governance at increasing operational capability:

  • Rover Testbed — 37 components, ~$484, SATA-HMAA-CARA pipeline, 350 simulation runs across 7 fault scenarios, TLA+ verified (48,751 states, 8 safety properties). DOI: 10.5281/zenodo.19143190.
  • UAV Platform — 52 components, ~$4,200, MAVLink/HIL bridge for Cube Orange+ integration, 250 simulation runs across 5 adversarial scenarios, Monte Carlo campaign. DOI: 10.5281/zenodo.19128769.
  • BLADE-EDGE — 72 components, ~$139K, defense-grade directed-energy weapon governance. Dual Jetson AGX Orin + dual Zynq UltraScale+ FPGA. 9-module pipeline, MIL-STD-810G, hardwired safety interlock relay. DOI: 10.5281/zenodo.19177472.
  • BLADE-AV — 62 components, ~$16K, autonomous vehicle drive-by-wire governance. 9-module pipeline, three-leg redundant KILOVAC LEV200 fail-safe relay. ISO 26262 ASIL-D, SAE J3016 L4. 1,200 runs, zero unsafe actions. DOI: 10.5281/zenodo.19232130.
  • BLADE-MARITIME — 84 components, ~$43K, maritime surveillance governance. 9-module pipeline with hydroacoustic sonar, MAD, AIS spoofing detection, and sea-state authority damping. IP68 / MIL-STD-810G. DOI: 10.5281/zenodo.19246785.
  • BLADE-INFRA — 92 components, ~$12K, critical infrastructure governance. 9-module pipeline with ICS/SCADA integration (IEC 61850, Modbus, PROFINET). SIL 3 / NERC CIP / FIPS 140-2. DOI: 10.5281/zenodo.19277887.

All four BLADE platforms share the same governance pipeline on Zynq UltraScale+ FPGA — demonstrating domain-agnostic portability across defense (DoDD 3000.09), automotive (ISO 26262), maritime (MIL-STD-810G), and critical infrastructure (SIL 3 / NERC CIP). Combined: 2,800+ experimental runs, zero unsafe actions, four domains on one pipeline.

Simulation and Verification. Thirteen browser-based simulations with seeded PRNG for bit-exact reproducibility. G*Power justified sample sizes, Bonferroni correction, Shapiro-Wilk normality tests. All run client-side with zero dependencies — any reviewer can independently verify results.

Current Status. Georgetown University M.P.S. Applied Intelligence (STEM, in progress). B.Sc. Computer Science Engineering (USF, 3.45 GPA). MBA International Business (Lynn, 4.0 GPA). Governance architectures published on Zenodo under CC BY 4.0; ERAM published on SSRN. Next-phase: physical validation, TLA+/UPPAAL formal verification, ROS 2/Gazebo HIL testing, and ASIL-D certification pathway. This research program is informed by progressive professional experience across data governance, infrastructure security, and critical infrastructure systems — see Professional Background below — and sustained engagement with the defense, aerospace, and AI communities through industry conferences and professional societies.

Authority Lifecycle Governance

Assignment, delegation, monitoring, and revocation of operational authority in autonomous decision systems. Implemented in HMAA (U.S. Provisional 63/999,105). 42-file Python package, 98 tests, TLA+ verified (48,751 states). DOI: 10.5281/zenodo.18861653.

Fail-Safe Control Recovery

Deterministic recovery protocol for authority lockout events with GREP phased recovery and terminal non-compensatory policy gate. Implemented in CARA (U.S. Provisional 64/000,170). DOI: 10.5281/zenodo.18917790.

Decision Integrity Monitoring

Hardware-anchored sensor trust computation using weighted Dempster-Shafer fusion with cross-sensor validation and adversarial dynamics. Implemented in SATA (U.S. Provisional 64/002,453). DOI: 10.5281/zenodo.18936251.

Escalation Risk Assessment

Quantitative framework for decision-time compression and escalation pathway modeling in AI-enabled command-and-control systems. Documented in the ERAM framework. Published on SSRN.

Flash War Latency Control

FLAME: deterministic latency injection middleware preventing autonomous escalation in multi-domain command environments. 5-state Circuit Breaker State Machine, Dynamic Delay Function D(A, tier, domain). Patent: U.S. Provisional 64/005,607. DOI: 10.5281/zenodo.19015618.

Multi-Agent Trust Verification

MAIVA: Byzantine-resilient swarm trust aggregation with CUSUM-augmented detection, graduated escalation, and DoDD 3000.09 action gate classification. 37 self-tests, TLA+ specification. DOI: 10.5281/zenodo.19015517.

Adversarial Deception-Aware Risk

ADARA: proactive deception prior adjusting authority based on P(adversarial). Deception Probability Engine with Bayesian update and Phantom Fleet detection. DOI: 10.5281/zenodo.19043924.

UAV Governance Platform

HMAA-UAV: authority-governed flight autonomy for contested environments integrating SATA-HMAA-CARA into a 52-component UAV with Cube Orange+ and Jetson Orin NX. 250 simulation runs across 5 adversarial scenarios. DOI: 10.5281/zenodo.19128769.

Rover Testbed Platform

Authority-governed rover implementing the full 8-stage SATA-HMAA-CARA pipeline on a 37-component dual-compute platform (RPi5 + ESP32). 350 simulation runs, 7 fault scenarios, zero unsafe actions. DOI: 10.5281/zenodo.19143190.

BLADE-EDGE Governance Node

Defense-grade edge computing platform implementing all seven governance architectures on dual-redundant Jetson AGX Orin + Zynq UltraScale+ FPGA. 72 components, 103 connections, MIL-STD-810G rated. Hardware-enforced safety interlock. ~$139K prototype BOM. DOI: 10.5281/zenodo.19177472.

BLADE-AV Governance Node

Authority-governed drive-by-wire safety architecture for autonomous vehicles. 9-module pipeline on Jetson AGX Orin + Zynq UltraScale+. Three-leg redundant KILOVAC fail-safe. 62 components, 1,200 simulation runs, zero unsafe actions. ISO 26262 ASIL-D. ~$16K BOM. Cross-domain portability validated against BLADE-EDGE. DOI: 10.5281/zenodo.19232130.

BLADE-MARITIME Governance Node

Authority-governed maritime surveillance node with hydroacoustic sonar, magnetic anomaly detection (MAD), and AIS spoofing detection. Four maritime mathematical extensions: D-S fused trust, recursive AIS deception-risk, sea-state authority damping α(H), acoustic-delay-aware Byzantine consensus. 84 components, IP68 / MIL-STD-810G / MIL-STD-461G CE102. Third domain instantiation. $43K total BOM. DOI: 10.5281/zenodo.19246785.

BLADE-INFRA Governance Node

Authority-governed critical infrastructure protection node for ICS/SCADA systems, power grid monitoring, water treatment, and pipeline operations. IEC 61850 GOOSE, Modbus TCP/RTU, PROFINET IO. Pilz PNOZ S7.1 SIL-3 safety relay. 92 components, IP65, NERC CIP, FIPS 140-2 Level 3. Fourth domain instantiation. $11,590 BOM. DOI: 10.5281/zenodo.19277887.

Research Mission &
National Interest

This research addresses a critical technical gap: how authority is assigned, monitored, degraded, revoked, and recovered in autonomous systems where decisions occur faster than human reaction time. The proposed endeavor is evaluated under the Dhanasar three-prong framework for EB2-NIW national interest waiver eligibility.

1. Substantial Merit & National Importance

Development of operational governance architectures for autonomous systems deployed in U.S. national security, defense, and critical infrastructure. Addresses priorities identified by DoD Directive 3000.09, DARPA Assured Autonomy, NIST AI RMF, NHTSA AV Framework, and the SELF DRIVE Act of 2026 (H.R. 7390). Cross-domain portability across defense (DoDD 3000.09), automotive (ISO 26262 ASIL-D), maritime (MIL-STD-810G), and critical infrastructure (SIL 3 / NERC CIP).

2. Well Positioned to Advance

Four U.S. provisional patents filed, 24 published works (12 Zenodo DOIs + 12 SSRN papers), seven governance architectures, six hardware research platforms, thirteen interactive simulations producing 2,800+ experimental runs with zero unsafe actions. Advanced degree: Georgetown University M.P.S. Applied Intelligence (STEM). B.Sc. Computer Science Engineering (USF). 140+ professional credentials including IEEE, AIAA, ACM, AAAI, INFORMS, NDIA, and Sigma Beta Delta Honor Society memberships. Active industry engagement across defense, aerospace, AI, and manufacturing trade shows and conferences.

3. Benefit to the United States

Fills gaps identified by Congress (H.R. 7390 cybersecurity requirements), NHTSA (1,429 AV incidents 2021-2025), and DoD (autonomous weapons governance). Supports defense modernization, automotive safety, maritime security, and critical infrastructure resilience. Prevents autonomous escalation (FLAME), detects adversarial manipulation (ADARA), and provides cryptographically auditable authority chains. Cross-domain portability demonstrated across four operational domains on one architectural foundation.

Read Full Proposal

Includes Dhanasar analysis, research programs, future roadmap, policy impact, and deployment scenarios

Independently Verifiable
Documentation

Patent Submissions

HMAA: U.S. Provisional No. 63/999,105 (March 7, 2026)

CARA: U.S. Provisional No. 64/000,170 (March 9, 2026)

SATA: U.S. Provisional No. 64/002,453 (March 11, 2026)

FLAME: U.S. Provisional No. 64/005,607 (March 14, 2026)

All four submitted via USPTO Patent Center. Awaiting review.

University Affiliation

Georgetown University listed on Zenodo publication records. M.P.S. Applied Intelligence program (STEM-designated), School of Continuing Studies.

ORCID Researcher Identity

ORCID 0009-0001-8573-1667, verified researcher identity linking publications, patents, and institutional affiliation.

Verify on ORCID ↗
Google Scholar

Publication index with citation tracking and research metrics.

Verify on Google Scholar ↗
SSRN Author Page

Policy and strategic research papers on AI governance, escalation risk, and national security.

Verify on SSRN ↗
ResearchGate

Research profile with publication metrics, full-text access, and academic networking.

View on ResearchGate ↗
U.S. Work Authorization

STEM-OPT authorized employment at Blue.Cloud (Tampa, FL, 2021–2024). Data governance and cloud infrastructure in regulated environments.

Professional Memberships & Certifications

IEEE Member (#102193505) · AIAA Student Member (#1936005) · ACM Member (#9952787) · AAAI Member (#656504) · INFORMS Member (#2009712) · NDIA Member (#1700222) · Sigma Beta Delta Lifetime Member (#2007930) · CompTIA Security+ · CISSP Domain 1 · NIST RMF · NIST 800-171 · NIST CSF · AI in National Security (SCSP) · AI Strategy (Oxford/Wharton).

View All 140+ Credentials ↗
Industry Engagement

Active participation across defense, manufacturing, and technology sectors: SHOT Show (2024, 2026 — defense and tactical technology), EMO Hannover 2023 (world's leading manufacturing trade fair, Germany), SupplySide West 2025, Israel Tech Week 2025 (defense-tech and AI), and Miami AI Hub community. Seven professional society memberships (IEEE, AIAA, ACM, AAAI, INFORMS, NDIA, Sigma Beta Delta).

View Full Engagement ↗
Technical Simulations

Thirteen browser-based interactive simulations implementing the governance architectures. Evaluation Protocol ↗ and research frameworks (HMAA, CARA, SATA, FLAME, MAIVA, ADARA, ERAM, HMAA-UAV, Rover Testbed, BLADE-EDGE, BLADE-AV, BLADE-MARITIME, and BLADE-INFRA). All run client-side with real-time computation and verifiable outputs.

View Simulations ↗
Hardware Research Platforms

Six physical implementations at increasing capability: Rover Testbed (37 components, ~$484), UAV Platform (52 components, ~$4,200), BLADE-EDGE Governance Node (72 components, ~$139K, MIL-STD-810G, defense-grade), and BLADE-AV Governance Node (62 components, ~$16K, ISO 26262 ASIL-D), BLADE-MARITIME (84 components, ~$43K, IP68/MIL-STD-810G, maritime), and BLADE-INFRA (92 components, ~$12K, SIL 3/NERC CIP, infrastructure). Full BOMs, schematics, and blueprints published.

View Research Projects ↗

Academic Training

In Progress
M.P.S. Applied Intelligence (STEM)
Georgetown University · School of Continuing Studies · Washington, D.C.
Program Details
MBA, International Business
Lynn University · Boca Raton, Florida
GPA: 4.0 / 4.0
Program Details
B.Sc. Computer Science Engineering (STEM)
University of South Florida · Tampa, Florida
GPA: 3.45 / 4.0
Program Details
4
U.S. Patents Submitted
24
Published Works
140+
Professional Credentials
25+
Institutions
2
STEM Degrees
6
Research Platforms

Governance Architectures
for Autonomous Systems

Patent Submitted

Sensor Attestation & Trust Anchoring (SATA)

U.S. Provisional 64/002,453 · Filed March 11, 2026

Hardware-anchored τ-Chain protocol producing continuous trust scalar τ ∈ [0,1] from TPM attestation records for autonomous mission authority.

Application: 64/002,453 · Receipt: 74808459
DOI: 10.5281/zenodo.18936251
Patent Submitted

Human-Machine Authority Architecture (HMAA)

U.S. Provisional 63/999,105 · Filed March 7, 2026

Real-time authority computation engine with six-tier HMAS spectrum. Research platform: 42-file Python package with 98 tests, 7 validated experiments, TLA+ formal verification (48,751 states), Dempster-Shafer trust fusion, and deterministic simulation traces.

Application: 63/999,105 · Receipt: 74759595
DOI: 10.5281/zenodo.18861653
Published on Zenodo

Adversarial Deception-Aware Risk Architecture (ADARA)

DOI: 10.5281/zenodo.19043924 · v10.0 · Author: Burak Oktenli

Proactive deception prior: A_adj = A_hmaa × (1 - λ × P_deception). Computes P(adversarial) from input anomalies, temporal correlation, cross-sensor consistency, and Bayesian mission history. Phantom Fleet detection module.

DOI: 10.5281/zenodo.19043924
Key Formula: A_adj = A_hmaa × (1 - λ × P_deception)
Published on Zenodo

Multi-Agent Integrity Verification (MAIVA)

DOI: 10.5281/zenodo.19015517 · March 14, 2026

Byzantine-resilient swarm trust aggregation (3f+1 BFT), CUSUM-augmented detection, graduated escalation, DoDD 3000.09 action gates. 37 self-tests, TLA+ specification.

DOI: 10.5281/zenodo.19015517
Version: v5.18 · License: MIT
Patent Submitted

Flash War Latency Architecture (FLAME)

U.S. Provisional 64/005,607 · Filed March 14, 2026 · DOI: 10.5281/zenodo.19015618

Strategic Latency as engineered system. Dynamic Delay Function D(A, tier, domain), 5-state Circuit Breaker with crypto-signed transitions, Keep-Alive heartbeat protocol.

Application: 64/005,607 · Receipt: 74858888
Filed: March 14, 2026 · Version: v5.11
DOI: 10.5281/zenodo.19015618
Patent Submitted

Control Authority Regulation Architecture (CARA)

U.S. Provisional 64/000,170 · Filed March 9, 2026

Deterministic authority recovery via GREP phases I-IV with non-compensatory terminal gate. 10M-iteration verification, 68-state control-flow enumeration.

Application: 64/000,170 · Receipt: 74767602
DOI: 10.5281/zenodo.18917790
Published on SSRN

Escalation Risk Assessment Model (ERAM)

SSRN Abstract ID 6176802 · Author: Burak Oktenli

Decision-time compression analysis for AI-enabled C2 systems. Quantitative framework modeling how authority integrity degrades across interconnected multi-domain environments.

SSRN ID: 6176802 · Status: Published
View on SSRN Source Code Architecture Page Launch Simulation

Problem, Solution, Impact

ProblemArchitectureImpact
Sensor spoofing and degraded inputsSATADetects trust collapse and prevents unsafe decisions from corrupted data
Unsafe autonomous actions under uncertaintyHMAAEnforces authority constraints on system behavior based on computed trust
Failure recovery instabilityCARAProvides structured, phased recovery instead of binary reset or crash
Multi-agent trust breakdownMAIVAEnables trust-aware participation control in multi-agent systems
Escalation risk in autonomous decisionsFLAMEIntroduces mandatory deliberation windows before critical actions
Adversarial deception in command systemsADARADetects and mitigates deceptive inputs using Bayesian deception estimation
Decision-time compression in AI-enabled C2ERAMQuantifies escalation risk across interconnected multi-domain command environments

All architectures presented in this work are components of a unified authority-governed autonomy framework. SATA evaluates system trust, HMAA computes authority constraints, CARA enforces recovery behavior, MAIVA governs multi-agent participation, FLAME regulates decision timing, ADARA detects adversarial deception, and ERAM quantifies escalation risk in command-and-control environments. Together, these components form a structured approach to controlling autonomous systems under uncertainty. The BLADE-EDGE Governance Node implements all seven architectures in a single defense-grade device, and the BLADE-AV Governance Node demonstrates automotive portability under ISO 26262, and the BLADE-MARITIME Governance Node extends the pipeline to maritime surveillance under MIL-STD-810G, and the BLADE-INFRA Governance Node extends it to critical infrastructure protection under SIL 3 / NERC CIP.

Interactive Technical
Demonstrations

View All Repositories

Each simulation below is a fully functional, browser-based implementation of the corresponding architecture or technical report. These are not mockups; they execute the actual algorithms described in the filed patent disclosures and published specifications, with real-time computation, cryptographic operations, and verifiable outputs.

Provisional Patent · Interactive Guide

HMAA Simulation

Human-Machine Authority Architecture, Dashboard

Full implementation of the real-time authority computation engine. Includes the six-tier HMAS authority spectrum, live calculator with parameter sliders, escalation sweep analysis, EW hysteresis modeling, Monte Carlo tier distribution (n=1000), determinism proof, RTB failsafe timeline, multi-run overlay comparison, fault-tolerance analysis, uncertainty quantification, and a complete compliance audit with safety case. Companion Python research platform: 42 files, 98 tests, 7 experiments, TLA+ verification (48,751 states), Dempster-Shafer fusion engine.

Live Calculator HMAS 6-Tier Spectrum Monte Carlo n=1000 Determinism Proof EW Hysteresis Fault-Tolerance RTB Failsafe Safety Case Scenario Library Repro Bundle
Provisional Patent · Interactive Guide

CARA Simulation

Control Authority Regulation Architecture, v1.2.2

Full implementation of the deterministic authority recovery protocol. Includes the live GREP phase calculator, adversary model analysis, 68-state control-flow replay, parameter space heatmap, and the non-compensatory terminal gate that makes CARA structurally irreducible to any utility-maximization framework.

Live Calculator GREP Phases Adversary Model Operational Replay Parameter Heatmap Assurance Matrix JSON/CSV Export
Provisional Patent · Interactive Guide

SATA Simulation

Sensor Attestation and Trust Anchoring, τ-Chain Protocol

Real-time sensor attestation engine computing the continuous trust scalar τ ∈ [0,1] consumed by HMAA. Implements TPM-anchored cryptographic chain verification, Monte Carlo trust distribution analysis, FMEA/FTA fault trees, live finite state machine visualization, and DoDAF OV-1 architecture views. All cryptographic operations run in-browser using WebCrypto.

τ-Chain Attestation WebCrypto SHA-256 Monte Carlo FMEA / FTA Live FSM DoDAF OV-1 Report Export
Provisional Patent · Interactive Guide

FLAME Simulation

Flash War Latency Architecture for Multi-domain Escalation Control, v5.11

A novel technical architecture implementing Strategic Latency as an engineered system. Includes a Latency Injection Engine (LIE) middleware, the Dynamic Delay Function D(A, tier, domain), a formal 5-state Circuit Breaker State Machine (NOMINAL, CAUTION, HOLD, FREEZE, LOCKOUT) with cryptographically signed transitions, Keep-Alive heartbeat protocol with safe-mode link failure defaults, domain-tier risk heatmap, and physical interlock reset verification.

Latency Injection Engine D(A, tier, domain) 5-State Circuit Breaker Keep-Alive Protocol Risk Heatmap Crypto-Signed Transitions Interlock Reset Audit Export
Multi-Agent Trust · Interactive Guide

MAIVA Simulation

Multi-Agent Integrity Verification Architecture, v5.18

Byzantine-resilient swarm trust aggregation extending HMAA to multi-agent environments. Implements trimmed weighted median aggregation (3f+1 BFT), three-layer CUSUM-augmented anomaly detection, graduated escalation with per-level action permissions, DoDD 3000.09 action gate classification, sensitivity analysis, WCET profiling, and a 14-tab PDR briefing package. 37 self-tests run automatically on load. TLA+ formal specification included.

BFT Aggregation CUSUM Detection 37 Self-Tests Sensitivity Analysis WCET Profiling Graduated Escalation DoDD 3000.09 TLA+ Spec PDR Briefing State Export
Published on Zenodo · Interactive Guide

ADARA Simulation

Adversarial Deception-Aware Risk Architecture, v10.0

A novel proactive deception prior architecture that adjusts authority downward pre-emptively based on P(adversarial). Implements a Deception Probability Engine computing adversarial likelihood from input distribution anomalies, temporal correlation patterns, cross-sensor consistency, and Bayesian mission history updates. Deception-Adjusted Authority: A_adj = A_hmaa × (1 - λ × P_deception). Includes Phantom Fleet detection module for AI-hallucinated hostile force scenarios.

Deception Probability Engine A_adj Formula Phantom Fleet Detection Bayesian Update Cross-Sensor Consistency Temporal Correlation λ Sensitivity Mission History

Cross-Domain Escalation Risk Monitoring

Strategic monitoring layer that quantifies escalation risk across interconnected autonomous command nodes spanning defense, automotive, maritime, and critical infrastructure domains.

Published on SSRN · Interactive Guide

ERAM Strategic Command Simulator

Escalation Risk Assessment Model, v1.0 — Cross-Domain C2 Monitoring

Quantitative cross-domain escalation risk framework for AI-enabled command and control. Computes Decision Compression Ratio (DCR), Authority Chain Integrity (ACI), Cascade Risk Index (CRI), Escalation Probability P(esc), and Human Recovery Window (HRW) across interconnected multi-domain autonomous nodes in real time. AUTHREX tactical command interface with boot sequence, AUTHREX Triforce logo, hex grid background, and CRT scanline overlay. Live ERAM pipeline monitor overlay tracking SATA, HMAA, CARA, MAIVA, FLAME, and ADARA status across all connected nodes. Six validated scenarios spanning Flash War multi-domain engagement, AV intersection conflict, maritime GPS spoofing, infrastructure cascade, cross-domain defense-to-civilian bleed, and HOTL override under extreme decision compression (DCR=200). 600 Monte Carlo simulation runs with seeded Mulberry32 PRNG (0x4F7A2C1E) for bit-exact reproducibility. Real-time 3D topology visualization using Three.js with dynamic node connections, cascade propagation, and Byzantine injection attack testing.

DCR Computation Cascade Risk Index P(Escalation) Human Recovery Window Authority Chain Integrity FLAME Integration 600 Monte Carlo 6 Scenarios 3D Topology Byzantine Injection Black Box Export TLA+ Export

Hardware Research Platforms

Six physical platforms implementing the governance architectures at increasing operational capability. Each published with full BOM, schematics, and interactive simulators.

Published on Zenodo · Interactive Guide

HMAA-UAV Governance Simulator

Authority-Governed UAV Autonomy for Contested Environments, v1.0

Controlled experimental platform for UAV flight autonomy under adversarial and degraded conditions. Executes the complete SATA trust fusion, HMAA authority computation, command gating, and CARA recovery pipeline in real-time. Includes GPS spoofing/jamming, RF loss, camera obscuration, and compound attack scenarios with MAVLink/HIL bridge support for Cube Orange+ hardware integration. 250 structured simulation runs across 5 scenarios.

GPS Spoofing RF Jamming Motor Cut SATA Trust Fusion HMAA Authority CARA Recovery MAVLink HIL Swarm / MAIVA Monte Carlo
Published on Zenodo · Interactive Guide

Rover Testbed Governance Simulator

Authority-Governed Assured Autonomy Rover Testbed, v1.0

Controlled experimental platform for rover autonomy under adversarial and degraded sensor conditions. Executes the complete 8-stage SATA trust fusion, HMAA authority computation, and CARA recovery pipeline in real-time with configurable fault injection. 350 structured runs across 7 scenarios with zero unsafe actions. TLA+ verified safety properties.

LiDAR Spoofing Camera Occlusion IMU Drift RF Jamming Compound Attack SATA-HMAA-CARA TLA+ Verified 350 Runs
Published on Zenodo · Interactive Guide

BLADE-EDGE Governance Simulator

Beam-Layer Authority for Directed Engagements — Edge Node, v5.0.3

Complete 9-module defense governance pipeline: SATA → ADARA → IFF → HMAA → MAIVA → FLAME → CARA → BDA → EFFECTOR. Multi-target tracking with Hungarian algorithm WTA optimizer assigning laser, kinetic, and dazzle effectors. 6 threat scenarios with real-time beam suitability (β_beam), 3D collateral clearance, thermal management, and battle damage assessment. Defense-grade hardware specification: 72 components, MIL-STD-810G.

Ballistic Saturation Attack IFF Friendly GPS Spoofing Dust Storm HOTL Veto WTA Optimizer 9 Modules
Launch Simulation Repository Zenodo Record
Published on Zenodo · Interactive Guide

BLADE-AV Governance Simulator

Authority-Governed Drive-by-Wire Safety Architecture, v2.2

9-module governance pipeline for autonomous vehicle drive-by-wire control: SATA → ADARA → IFF → HMAA → MAIVA → FLAME → CARA → BDA → EFFECTOR. Three-leg redundant KILOVAC fail-safe relay model. 12 attack scenarios including adversarial ML, V2X spoofing, and compound attacks. 1,200 simulation runs with zero unsafe actions. Seeded PRNG for bit-exact reproducibility. ISO 26262 ASIL-D target architecture.

Radar Spoof Adversarial ML GNSS Spoof V2X Spoof RF Jamming Compound ISO 26262 1,200 Runs
Published on Zenodo · Interactive Guide

BLADE-MARITIME Governance Simulator

Authority-Governed Maritime Surveillance Node, v3.11

9-module maritime governance pipeline with four domain-specific extensions: Dempster-Shafer fused trust (hydroacoustic + MAD), recursive AIS phantom vessel deception detection, continuous sea-state authority damping α(H), and acoustic-delay-aware Byzantine consensus. 84-component hardware specification. Split-screen mission map (GIUK Gap). 13 fault injection scenarios. HITL WebSocket bridge (MAVLink/ROS 2).

Submarine Detection AIS Spoofing Sea-State Damping MAD Sensor COLREGs UNCLOS EEZ Acoustic BFT HITL Bridge
Published on Zenodo · Interactive Guide

BLADE-INFRA Governance Simulator

Critical Infrastructure Governance Node, v6.0

9-module governance pipeline for ICS/SCADA protection with vintage CRT terminal live mode. 92-component hardware specification. Power grid fault (IEC 61850 GOOSE), water treatment overdose (Modbus TCP), and pipeline leak (Modbus RTU) scenarios. Sensitivity analysis, fault tree analysis, and MITRE ATT&CK for ICS mapping.

Power Grid Water Treatment Pipeline SCADA Terminal SIL 3 NERC CIP MITRE ATT&CK Fault Tree

These simulations implement the published architectures and research frameworks. HMAA, CARA, SATA, MAIVA, FLAME, ADARA, ERAM, HMAA-UAV, Rover Testbed, BLADE-EDGE, BLADE-AV, BLADE-MARITIME, and BLADE-INFRA execute published specifications and research architectures. All run entirely client-side with real-time computation and verifiable outputs.

View Evaluation Protocol ↗ — Scenarios, metrics, baselines, and reproducibility

Research Projects

Governance Architecture Projects

Seven governance architectures forming a unified authority lifecycle framework. Each is published with a DOI on Zenodo, implemented as an interactive simulation, and connected to six physical research platforms: Rover Testbed (~$484), UAV Platform (~$4,200), BLADE-EDGE (~$139K), BLADE-AV (~$16K), BLADE-MARITIME (~$43K), and BLADE-INFRA (~$12K).

HMAA
Human-Machine Authority Architecture
Patent Submitted DOI: 10.5281/zenodo.18861653

Real-time authority computation engine. Four-level state machine (A3-A0) with hysteresis transitions. TLA+ verified: 48,751 states, 8 properties, 98 tests.

Authority LevelsTrust GatingTLA+ VerifiedProv. Patent 63/999,105
View Project Details
CARA
Control Authority Regulation Architecture
Patent Submitted DOI: 10.5281/zenodo.18917790

Deterministic recovery for authority lockout. Four-phase GREP pipeline (Guard, Reduce, Evaluate, Promote) with terminal non-compensatory policy gate.

GREP RecoverySafe-StopDeterministicProv. Patent 64/000,170
View Project Details
SATA
Sensor Attestation and Trust Anchoring
Patent Submitted DOI: 10.5281/zenodo.18936251

Foundation trust layer using weighted Dempster-Shafer belief functions. Four diagnostics: internal consistency, cross-sensor agreement, temporal stability, physical plausibility.

Dempster-ShaferSensor TrustCross-ValidationProv. Patent 64/002,453
View Project Details
FLAME
Flash War Latency Architecture
Patent Submitted DOI: 10.5281/zenodo.19015618

Strategic Latency as a formal system. 5-state Circuit Breaker with Dynamic Delay Function D(A, tier, domain) preventing autonomous escalation in multi-domain command.

Circuit BreakerFlash WarJADC2Prov. Patent 64/005,607
View Project Details
MAIVA
Multi-Agent Integrity Verification Architecture
Published on Zenodo DOI: 10.5281/zenodo.19015517

Byzantine-resilient swarm trust aggregation. Trimmed weighted median resistant to f adversaries in 3f+1 rosters, CUSUM anomaly detection, DoDD 3000.09 action gates.

Byzantine ResilientSwarm TrustCUSUMTLA+ Spec
View Project Details
ADARA
Adversarial Deception-Aware Risk Architecture
Published on Zenodo DOI: 10.5281/zenodo.19043924

Proactive deception prior adjusting authority via P(adversarial). Deception Probability Engine with Bayesian update. Phantom Fleet detection for AI-hallucinated hostile scenarios.

Deception PriorPhantom FleetBayesian UpdateAdversarial AI
View Project Details
ERAM
Escalation Risk Assessment Model
Cross-Domain Escalation Risk Quantification for AI-Enabled Command and Control
Published on SSRN SSRN ID: 6176802

Escalation risk quantification across interconnected autonomous command nodes. Models how autonomous actions cascade across domain boundaries. 6 scenarios, 600 Monte Carlo runs.

Decision CompressionCascade RiskJADC2Cross-DomainMonte Carlo
View Project Details

Hardware Research Platforms

Six physical platforms implementing the governance architectures at increasing levels of operational capability. Each is published as a complete reproducible artifact package with full hardware specifications, simulation data, and assembly documentation.

Authority-Governed Autonomy Rover Testbed
Design Complete · Build In Progress DOI: 10.5281/zenodo.19143190
Authority-Governed Assured Autonomy Rover Testbed

A low-cost experimental platform for studying authority-governed autonomy in safety-critical robotic systems under contested conditions. Implements SATA trust evaluation, HMAA mission authority control, and CARA recovery enforcement in a dual-compute rover architecture (Raspberry Pi 5 + ESP32). 37 verified components, 76 electrical connections, 7 defined experiments. Platform cost under $500.

SATA HMAA CARA Trusted Autonomy Sensor Spoofing ROS 2 Raspberry Pi 5 ESP32
View Project Details
HMAA-UAV Authority-Governed Autonomous Drone Platform
Design Complete · Build In Progress DOI: 10.5281/zenodo.19128769
Authority-Governed UAV Platform (HMAA-UAV)

A trust-governed autonomous drone where every flight decision is evaluated by sensor trust fusion (SATA), authority governance (HMAA), and recovery logic (CARA). Cube Orange+ flight controller with NVIDIA Jetson Orin NX AI companion computer. 52 verified components, 48 electrical connections, 49 mechanical assemblies. Carbon fiber quadcopter frame.

SATA HMAA CARA UAV Autonomy Contested Environments Jetson Orin NX ArduPilot
View Project Details
BLADE-EDGE Governance Node — Defense-Grade Edge Computing
Design Complete · Prototype Specification Defense-Grade Hardware
BLADE-EDGE Governance Node

A rugged, portable edge computing device serving as the ethical decision-making authority for autonomous defense platforms. Implements the complete 9-module governance pipeline (SATA → ADARA → IFF → HMAA → MAIVA → FLAME → CARA → BDA → EFFECTOR) on dual-redundant Jetson AGX Orin + Zynq UltraScale+ hardware. 72 components, 103 connections, MIL-STD-810G rated. Hardware-enforced safety interlock (normally-open relay). ~$139K prototype BOM.

SATA HMAA ADARA MAIVA FLAME CARA Jetson Orin Zynq FPGA MIL-STD-810G
View Project Details
BLADE-AV Governance Node — Autonomous Vehicle Safety
Published on Zenodo · DOI: 10.5281/zenodo.19232130 ISO 26262 ASIL-D Target
BLADE-AV Governance Node

Authority-governed drive-by-wire safety architecture for autonomous vehicles. 9-module governance pipeline on Jetson AGX Orin + Zynq UltraScale+. Three-leg redundant KILOVAC fail-safe relay. 62 components, 1,200 simulation runs, zero unsafe actions. ~$16,287 BOM. Cross-domain portability validated against BLADE-EDGE defense variant.

SATA HMAA MAIVA FLAME CARA ISO 26262 V2X KILOVAC Relay
View Project Details
BLADE-MARITIME Governance Node — Maritime Defense
Published on Zenodo · DOI: 10.5281/zenodo.19246785 MIL-STD-810G · IP68 Maritime
BLADE-MARITIME Governance Node

Authority-governed maritime surveillance node with hydroacoustic sonar, magnetic anomaly detection (MAD), and AIS spoofing detection. Four maritime mathematical extensions to the BLADE governance pipeline. 84 components, IP68 enclosure, MIL-STD-461G CE102 power chain. Third domain instantiation: defense → automotive → maritime.

SATA HMAA Hydroacoustic MAD AIS Spoofing Sea-State α(H) Acoustic BFT IP68
View Project Details
BLADE-INFRA Governance Node — Critical Infrastructure
Published on Zenodo · DOI: 10.5281/zenodo.19277887 SIL 3 · NERC CIP · FIPS 140-2
BLADE-INFRA Governance Node

Authority-governed critical infrastructure protection node for ICS/SCADA systems, power grid monitoring, and industrial process control. IEC 61850 GOOSE, Modbus TCP/RTU, PROFINET IO integration. Pilz PNOZ S7.1 SIL-3 safety relay. 92 components, IP65 DIN-rail enclosure. Fourth domain instantiation: defense → automotive → maritime → critical infrastructure.

SATA HMAA ICS/SCADA Power Grid NERC CIP SIL 3 Modbus IEC 61850
View Project Details

Research Papers
& Policy Analysis

Patent Disclosures & Technical Reports, Published with DOI
  • 01
    CARA: A Deterministic Authority Recovery Architecture for Human-Machine Authority-Gated Autonomous Systems
    Zenodo · DOI 10.5281/zenodo.18917790 · Georgetown University 2026 Patent Disclosure
  • 02
    HMAA: An Operational AI Governance Engine for Real-Time Authority Computation in Autonomous Systems
    Zenodo · DOI 10.5281/zenodo.18861653 · Georgetown University 2026 Patent Disclosure
  • 03
    Sensor Attestation and Trust Anchoring (SATA): A Hardware-Anchored τ-Chain Protocol for Autonomous Mission Authority — Technical Assurance Report v3.8.9
    Zenodo · DOI 10.5281/zenodo.18936251 · Georgetown University 2026 Patent Disclosure
  • 04
    MAIVA: Multi-Agent Integrity Verification Architecture — Byzantine-Resilient Trust Aggregation for Autonomous Action Authorization, v5.17
    Zenodo · DOI 10.5281/zenodo.19015517 · Georgetown University 2026 Technical Report
  • 05
    FLAME: Flash War Latency Architecture for Multi-Domain Escalation Control, v5.11
    Zenodo · DOI 10.5281/zenodo.19015618 · Georgetown University 2026 Patent Disclosure
  • 06
    ADARA: Adversarial Deception-Aware Risk Architecture, v10.0-R12
    Zenodo · DOI 10.5281/zenodo.19043924 · Georgetown University 2026 Software
  • 07
    Authority-Governed UAV Autonomy for Contested Environments: Integrating Sensor Trust Fusion, Dynamic Authority Control, and Deterministic Recovery, v1.0
    Zenodo · DOI 10.5281/zenodo.19128769 · Georgetown University 2026 Research Paper Research Project
  • 08
    Authority-Governed Assured Autonomy Rover Testbed: System Architecture, Governance Design, and Reproducible Artifact Package, v1.0
    Zenodo · DOI 10.5281/zenodo.19143190 · Georgetown University 2026 Research Paper Research Project
  • 09
    BLADE-EDGE: A Deterministic Governance Simulation Framework for Multi-Agent Decision Systems, v5.0.3
    Zenodo · DOI 10.5281/zenodo.19177472 · Georgetown University 2026 Research Project
  • 10
    BLADE-AV Governance Node: Authority-Governed Drive-by-Wire Safety Architecture for Autonomous Vehicles, v1.0
    Zenodo · DOI 10.5281/zenodo.19232130 · Georgetown University 2026 Research Paper Research Project
  • 11
    BLADE-MARITIME Governance Node: Authority-Governed Maritime Surveillance Node with Hydroacoustic, MAD, and Multi-Modal Sensor Fusion, v2.3
    Zenodo · DOI 10.5281/zenodo.19246785 · Georgetown University 2026 Research Paper Research Project
  • 12
    BLADE-INFRA Governance Node: Authority-Governed Critical Infrastructure Protection Node for ICS/SCADA Systems, v6.0
    Zenodo · DOI 10.5281/zenodo.19277887 · Georgetown University 2026 Research Project
Policy & Strategy Papers, SSRN

All papers publicly available on SSRN with individual permalink URLs. These are working papers, not peer-reviewed publications.

  • 13
    ERAM: Escalation Risk in AI-Enabled Command and Control
    SSRN · ID 6176802 2026 Policy Paper
  • 14
    The Governance of Velocity: Doctrine, Entanglement, and Risk in the Joint All-Domain Command and Control (JADC2) Era
    SSRN · ID 6083970 2026 Policy Paper
  • 15
    AI-Enabled Military Decision-Making and Escalation Risk: Human-Machine Command Authority in Great Power Competition
    SSRN · ID 6082847 2026 Policy Paper
  • 16
    Strategic Subterranean Domain Awareness: A Comprehensive Technical and Operational Evaluation of Next-Generation AI-Fused Counter-Tunnel Architectures
    SSRN · ID 6046594 2026 Policy Paper
  • 17
    The Strategic Convergence: AI Has Outpaced Human Clearance Models
    SSRN · ID 5940814 2025 Policy Paper
  • 18
    The Strategic Convergence: Risk-Adaptive AI for Reducing Insider Exfiltration and Improving Forensic Readiness
    SSRN · ID 5919022 2025 Policy Paper
  • 19
    Strategic Assessment: The Operationalization of Artificial Intelligence in U.S. Defense Doctrine
    SSRN · ID 5909983 2025 Policy Paper
  • 20
    Shadows in the Marketplace: Operational Doctrine for Project AURELIUS (AI-Driven Economic Counter-Warfare)
    SSRN · ID 5897442 2025 Policy Paper
  • 21
    The Strategic Convergence: Microreactor Technology as the Foundation for AI Hyperscale Autonomy
    SSRN · ID 5867163 2025 Policy Paper
  • 22
    If Snowden Were an AI: Military Defense in the Age of Autonomous Intelligence
    SSRN · ID 6186118 2026 Policy Paper
  • 23
    Physics-Based Analysis of Submarine Surface Signatures: Hydrodynamic Mechanisms, Detection Theory, and Countermeasure Constraints
    SSRN · ID 6233601 2026 Policy Paper
  • 24
    Orbital Authority: Governance Architecture for Autonomous Space Operations
    SSRN · ID 6519544 2026 Policy Paper
Works in Progress
  • Energy Resilience for AI-Dependent Systems: Infrastructure Security in Autonomous Operational Environments

AUTHREX Systems

AUTHREX Systems is a research initiative demonstrating authority lifecycle governance infrastructure for autonomous systems. It integrates the seven governance frameworks, four BLADE hardware platforms, and thirteen validated simulations developed through this research program into a single unified platform — providing end-to-end authority control across defense, maritime, infrastructure, and autonomous vehicle domains.

7
Governance Frameworks
4
BLADE Platforms
13
Validated Simulations

Standards Alignment: DoDD 3000.09 (Autonomy in Weapon Systems), NIST AI RMF 1.0 (AI Risk Management), MIL-STD-882E (System Safety), ISO 26262 ASIL-D (Automotive), IEC 61508 SIL 3 (Industrial), NERC CIP (Energy Grid), FIPS 140-2 Level 3 (Cryptographic).

Visit AUTHREX Systems

Technology Readiness Levels

Current TRL assessment across all governance architectures and hardware platforms, aligned with DoD/NASA TRL definitions. The research program targets TRL 6 (system demonstration in relevant environment) by Q2 2027.

Component TRL Status Evidence (DOI)
HMAA (Authority)TRL 4Validated in lab — 42-file Python package, 98 tests, TLA+ spec10.5281/zenodo.18861653
SATA (Sensor Trust)TRL 4Validated in lab — Dempster-Shafer fusion, cross-sensor attestation10.5281/zenodo.18936251
CARA (Recovery)TRL 3Proof of concept — GREP 4-phase recovery, deterministic state machine10.5281/zenodo.18917790
MAIVA (Consensus)TRL 3Proof of concept — Byzantine fault-tolerant swarm consensus10.5281/zenodo.19015517
FLAME (Deliberation)TRL 3Proof of concept — 5-state circuit breaker, deliberation windows10.5281/zenodo.19015618
ADARA (Deception)TRL 3Proof of concept — cross-sensor anomaly correlation10.5281/zenodo.19043924
ERAM (Escalation Risk)TRL 3Proof of concept — escalation risk quantification for C2 decision compressionSSRN (published)
BLADE-EDGE (Defense)TRL 3Design complete — 72 components, BOM specified, simulation validated10.5281/zenodo.19177472
BLADE-AV (Automotive)TRL 3Design complete — 62 components, ISO 26262 ASIL-D targeted10.5281/zenodo.19232130
BLADE-MARITIME (Maritime)TRL 3Design complete — 84 components, IP68/MIL-STD-810G targeted10.5281/zenodo.19246785
BLADE-INFRA (Infrastructure)TRL 3Design complete — 92 components, SIL 3/NERC CIP targeted10.5281/zenodo.19277887
Rover Testbed (UGV)TRL 4Validated in lab — 37 components, physical platform documented10.5281/zenodo.19143190
UAV PlatformTRL 4Validated in lab — 52 components, physical platform documented10.5281/zenodo.19128769

TRL Progression Target: Current portfolio spans TRL 3–4 (proof of concept through lab validation). FPGA governance bitstream commissioning (Q3 2026) and physical testbed flight validation (Q4 2026) target TRL 5–6. SBIR Phase II proposal planned for Q4 2026.

Terminology Mapping

This research uses domain-specific terminology developed within the AUTHREX framework. The table below maps these terms to equivalent concepts in the broader academic and standards literature, enabling cross-referencing with established research communities.

AUTHREX Term Standard Academic / Industry Equivalent Key References & Communities
Authority Lifecycle GovernanceRuntime Assurance (RTA), Supervisory Control, Safe AutonomyASTM F3269-21, DARPA Assured Autonomy, Simplex Architecture
HMAA (Authority Computation)Adjustable Autonomy, Shared Autonomy, Sliding Autonomy, Levels of Autonomy (LOA)Sheridan & Verplanck (1978), Parasuraman et al. (2000), SAE J3016
SATA (Sensor Trust)Sensor Fusion Integrity, Remote Attestation, Trust Anchoring, Trusted ComputingTPM 2.0 (TCG), Dempster-Shafer Theory, NIST SP 800-193
CARA (Recovery Protocol)Safe Control, Fail-Safe Design, Graceful Degradation, Control Barrier Functions (CBF)IEC 61508 (SIL), ISO 26262 (ASIL), MIL-STD-882E
MAIVA (Multi-Agent Trust)Byzantine Fault Tolerance (BFT), Distributed Trust, Multi-Robot Coordination, Swarm SafetyLamport et al. (1982), PBFT (Castro & Liskov), IEEE RAS
FLAME (Deliberation Windows)Strategic Latency, Human-on-the-Loop (HOTL), Meaningful Human Control, Escalation ManagementDoDD 3000.09, ICRC Position on AWS, Horowitz (2016)
ADARA (Adversarial Detection)Adversarial Machine Learning, Anomaly Detection, Intrusion Detection, Spoofing DetectionGoodfellow et al. (2014), NIST AI 100-2e2023, MITRE ATT&CK
ERAM (Escalation Risk)Decision Compression, C2 Risk Assessment, Flash War Theory, AI Safety in Military SystemsScharre (2018), NSCA Final Report (2021), JADC2 Doctrine
Trust Scalar τ ∈ [0,1]Confidence Score, Belief Mass, Trust Metric, Safety MarginDempster-Shafer (1976), Subjective Logic (Jøsang), DO-178C
BLADE Platform FamilyRuntime Monitor, Safety Controller, Watchdog System, Independent Safety MonitorSimplex (Sha et al.), AEEC RTCA DO-254, UL 4600

Why distinct terminology: The AUTHREX framework introduces new terminology because it addresses the complete authority lifecycle — from sensor trust evaluation through authority computation, deliberation, consensus, recovery, and escalation risk — as a unified architectural stack. Existing terms address individual components (e.g., "runtime assurance" covers monitoring but not authority graduation; "shared autonomy" covers levels but not hardware-enforced trust gating). The AUTHREX vocabulary reflects this end-to-end integration while maintaining precise mappings to established concepts.

Dual-Use Application Matrix

The same governance pipeline that prevents catastrophic failures in military systems directly addresses high-liability scenarios in commercial autonomous operations. Each defense application maps to a corresponding civilian use case through the same underlying framework.

Defense Application Framework Commercial Application Standard
Fratricide prevention under EW spoofingSATA + ADARAAutonomous trucking: forced override during sensor degradationISO 26262 ASIL-D
UAV swarm under Byzantine compromiseMAIVAWarehouse robot fleets: isolating malfunctioning unitsISO 10218
Maritime GPS spoofing into foreign watersADARA + ERAMCommercial shipping: preventing spoofing-induced reroutingIMO MASS Code
SCADA command injection in contested opsFLAME + CARAIndustrial SCADA: deliberation before automated load-sheddingNERC CIP / SIL 3
Directed energy under degraded sensor trustHMAA + SATAAV drive-by-wire authority gating under perception failureSAE J3016 L4
Flash escalation in multi-domain commandFLAME + ERAMFinancial trading: deliberation windows before large automated tradesSEC Rule 15c3-5

Cross-Domain Portability: Every row above uses the same governance SDK with different YAML configuration files. The governance logic is identical — only the sensor types, effector types, and regulatory thresholds change.

Professional Background

This experience reflects progressive work across data governance, infrastructure security, operational technology, and critical infrastructure systems. Each role contributed domain-specific insights that informed the development of the AUTHREX governance framework. Consulting engagements were conducted on a part-time, remote basis during academic breaks while maintaining full-time student and OPT status in the United States.

Data Governance & Trust Architecture Engineer
2021 – 2024
Blue.Cloud · Tampa, Florida · Full-Time, STEM-OPT Authorized Employment
  • Engineered data governance architectures with role-based access control (RBAC) enforcement in regulated cloud environments
  • Executed cloud infrastructure risk assessments aligned with ITAR/EAR need-to-know data handling requirements
  • Developed automated data validation and integrity verification pipelines for enterprise data systems, enforcing trust-gated data flows across multi-tenant environments
  • Designed disaster-recovery and failover architectures for mission-critical data systems, including structured recovery protocols and incident escalation procedures
Infrastructure Security & ICS Governance Consultant
2021 – 2025
SIMA, Advanced Materials & Supply Chain Security · Istanbul, Turkey · Independent Consultant (Part-Time, Remote – Academic Breaks)
  • Advised on security strategy for advanced materials supply chain networks across Eastern European and Middle Eastern corridors
  • Designed Zero Trust governance policies for industrial control systems (ICS) in high-throughput manufacturing environments
  • Conducted threat-modeling assessments and supported transition of legacy infrastructure to NIST-aligned security frameworks
Risk & Infrastructure Resilience Consultant
2023 – 2025
SADEF, Critical Infrastructure & Agricultural Supply Chain Security · Istanbul, Turkey · Independent Consultant (Part-Time, Remote – Academic Breaks)
  • Conducted vulnerability assessments across distributed critical infrastructure nodes in regulated international environments
  • Authored operational continuity frameworks mitigating cyber-physical threats, applying methodologies consistent with U.S. CISA resilience strategies
  • Supported governance of cross-border information flows in regulated markets under international export-constraint regimes
Data Governance & Integrity Consultant
2020 – 2023
FHS, Aerospace & Precision Industrial Engineering · Istanbul, Turkey · Independent Consultant (Part-Time, Remote – Academic Breaks)
  • Implemented data governance frameworks for high-precision aerospace manufacturing in regulated commercial sectors
  • Deployed data loss prevention (DLP) strategies to safeguard proprietary engineering data and enforce integrity boundaries
  • Optimized manufacturing workflows using predictive risk modeling and periodic security audits
Cloud Infrastructure & Data Engineering Intern
Jan 2020 – Aug 2020
Bluenet · Tampa, Florida · CPT-Authorized Internship
  • Supported cloud consulting initiatives including infrastructure design, development, testing, and maintenance
  • Supported application development teams across front-end, back-end, middleware, and database administration workflows
  • Assisted Big Data consultants with data processing operations, gaining early exposure to the data governance and pipeline integrity practices later applied at Blue.Cloud
Operational Technology & Risk Analyst
2017 – 2020
REXOIL, Critical Petrochemical & Energy Infrastructure · Istanbul, Turkey · Independent Consultant (Part-Time, Remote – Academic Breaks)
  • Supported operational risk assessment and supply chain governance for a petrochemical entity in volatile energy markets
  • Redesigned operational technology (OT) reporting protocols to reduce data latency in time-critical operational decision cycles
  • Conducted risk analysis across distributed supply chain networks to identify and remediate systemic vulnerabilities

Technical Credentials
& Domain Expertise

Professional Memberships & Certifications
  • IEEE Member (#102193505)
  • AIAA Student Member (#1936005)
  • ACM Member (#9952787)
  • AAAI Member (#656504)
  • INFORMS Member (#2009712)
  • NDIA Member (#1700222)
  • Sigma Beta Delta Honor Society — Lifetime Member (#2007930)
  • CompTIA Security+
  • CISSP Domain 1: Security & Risk Management
  • NIST Risk Management Framework (RMF)
  • NIST 800-171 Awareness
  • NIST Cybersecurity Framework (CSF)
Executive & University Programs
  • AI Strategy (Oxford / Wharton Executive Education)
  • AI in National Security (SCSP)
  • Generative AI Governance (University of Michigan)
  • Open-Source Intelligence (Basel Institute on Governance)
Specializations & Training
  • Advanced System Security Design (University of Colorado)
  • AI for Cybersecurity (Johns Hopkins University)
  • NYU Cybersecurity Specialization
  • Cloud Computing Security (University of Colorado)
View All Certifications & Licenses (140+)

Conferences, Forums & Professional Development

Active participation in defense, aerospace, AI, and autonomous systems communities through trade shows, technical conferences, professional society events, and continuing education. Sustained engagement across these communities ensures that AUTHREX governance architectures remain aligned with operational requirements, emerging standards, and the evolving needs of the U.S. defense and critical infrastructure sectors.

Top Past Events
  • SHOT Show 2026 — NSSF · Las Vegas, NV
    Jan 20–23, 2026 · Defense, law enforcement, tactical technology
  • Israel Tech Week 2025 · Miami, FL
    2025 · Israeli tech innovation, defense-tech, AI, cybersecurity
  • Miami AI Hub — Meetup Community · Miami, FL
    Multiple sessions 2024–2025 · AI applications, networking, industry talks
  • SupplySide West & Fi North America 2025 — Informa · Las Vegas, NV
    Oct 27–30, 2025 · Supply chain, industrial technology, 20,000+ professionals
  • SHOT Show 2024 — NSSF · Las Vegas, NV
    Jan 23–26, 2024 · Defense industry, firearms, law enforcement technology
  • EMO Hannover 2023 — Deutsche Messe · Hannover, Germany
    Sep 18–23, 2023 · World's leading metalworking & manufacturing technology trade fair
Upcoming 2026
  • AAAI Summer Symposium Series 2026 — Burlingame, CA
    May 19–21, 2026 · Safe AI, autonomous systems safety, multi-agent teamwork
  • AUVSI XPONENTIAL 2026 — Detroit, MI
    May 11–14, 2026 · Autonomous systems, UAS, NDIA/MDEX defense theater
  • AIAA AVIATION Forum 2026
    May 19–21, 2026 · Aerospace systems, autonomy, defense innovation
  • NDIA Emerging Technologies Conference 2026
    2026 · AI, autonomous systems, cyber, next-gen defense technology
  • NDIA Future Force Capabilities (FFC) 2026
    2026 · Robotics, autonomous systems, munitions technology
  • SHOT Show 2027 — NSSF · Las Vegas, NV
    Jan 19–22, 2027 · Defense and tactical technology trade show
Professional Development
  • AIAA: The Anatomy of Autonomy
    Online Short Course · Technology, integration & applications across aviation & space
  • AIAA: Generative AI for Code Generation
    Online Short Course · AI-driven engineering and evaluation methods
  • AIAA: Flight Test Techniques for UAS
    Online Short Course · Development, qualification, and acceptance tests
  • AAAI-26 Conference Content
    On-demand access via Underline.io · AI research presentations and workshops
Professional Society Engagement
  • IEEE — Webinars, technical publications, standards development
    Member #102193505 · Autonomous systems, safety-critical engineering
  • AIAA — Forums, short courses, student conferences
    Member #1936005 · Aerospace, defense, uncrewed systems
  • ACM — TechTalks, digital library, computing research
    Member #9952787 · AI governance, formal verification, algorithms
  • AAAI — Conference content, symposia, AI safety research
    Member #656504 · Artificial intelligence, multi-agent systems
  • INFORMS — Analytics, operations research, decision science
    Member #2009712 · Monte Carlo methods, decision-making under uncertainty
  • NDIA — Defense conferences, emerging tech, acquisition
    Member #1700222 · Defense industry, autonomous systems, cyber

Cite This Research

To reference this research portfolio or individual architectures, use the citations below. Each architecture has a permanent identifier on Zenodo (DOI) or SSRN.

Full Research Portfolio

APA

Oktenli, B. (2026). Authority-Governed Autonomy: Governance Architectures for Safe Autonomous Systems [Research portfolio]. Georgetown University. https://burakoktenli.com

Individual Architectures

HMAA — Human-Machine Authority Architecture
Oktenli, B. (2026). Human-Machine Authority Architecture. Zenodo. https://doi.org/10.5281/zenodo.18861653
CARA — Control Authority Regulation Architecture
Oktenli, B. (2026). Control Authority Regulation Architecture. Zenodo. https://doi.org/10.5281/zenodo.18917790
SATA — Sensor Attestation and Trust Anchoring
Oktenli, B. (2026). Sensor Attestation and Trust Anchoring. Zenodo. https://doi.org/10.5281/zenodo.18936251
FLAME — Flash War Latency Architecture
Oktenli, B. (2026). Flash War Latency Architecture for Multi-Domain Escalation Control. Zenodo. https://doi.org/10.5281/zenodo.19015618
MAIVA — Multi-Agent Integrity Verification
Oktenli, B. (2026). Multi-Agent Integrity Verification Architecture. Zenodo. https://doi.org/10.5281/zenodo.19015517
ADARA — Adversarial Deception-Aware Risk
Oktenli, B. (2026). Adversarial Deception-Aware Risk Architecture. Zenodo. https://doi.org/10.5281/zenodo.19043924
ERAM — Escalation Risk Assessment Model
Oktenli, B. (2026). ERAM: Escalation Risk in AI-Enabled Command and Control. SSRN. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=6176802
HMAA-UAV — Authority-Governed UAV Autonomy
Oktenli, B. (2026). Authority-Governed UAV Autonomy for Contested Environments (v1.0). Zenodo. https://doi.org/10.5281/zenodo.19128769
Rover Testbed — Assured Autonomy Testbed
Oktenli, B. (2026). Authority-Governed Assured Autonomy Rover Testbed (v1.0). Zenodo. https://doi.org/10.5281/zenodo.19143190
BLADE-EDGE — Governance Node
Oktenli, B. (2026). BLADE-EDGE: Deterministic Governance for Multi-Agent Decision Systems (5.0.3). Zenodo. https://doi.org/10.5281/zenodo.19177472
BLADE-AV — Autonomous Vehicle Governance
Oktenli, B. (2026). BLADE-AV: Drive-by-Wire Safety Architecture (v1.0). Zenodo. https://doi.org/10.5281/zenodo.19232130
BLADE-MARITIME — Maritime Governance
Oktenli, B. (2026). BLADE-MARITIME: Maritime Surveillance Governance Node (v2.3). Zenodo. https://doi.org/10.5281/zenodo.19246785
BLADE-INFRA — Infrastructure Governance
Oktenli, B. (2026). BLADE-INFRA: Critical Infrastructure Governance Node (v6.0). Zenodo. https://doi.org/10.5281/zenodo.19277887

Zenodo works licensed under CC BY 4.0. SSRN papers: All Rights Reserved. ORCID: 0009-0001-8573-1667.

Get In Touch

Available for research collaborations, expert advisory engagements, and discussions on AI governance, autonomous systems safety, and national security technology policy.

Location

Washington, D.C. / Miami, Florida

Languages

English (Professional) · Turkish (Native) · Russian (Reading Proficiency)

Research Focus

AI Governance · Autonomous Systems Safety · National Security Technology · Escalation Risk Modeling · Human-Machine Teaming

Patent Status

HMAA: U.S. Provisional 63/999,105 (March 7, 2026) · CARA: U.S. Provisional 64/000,170 (March 9, 2026) · SATA: U.S. Provisional 64/002,453 (March 11, 2026) · FLAME: U.S. Provisional 64/005,607 (March 14, 2026) · All submitted via USPTO Patent Center, awaiting review