Full directory of every page, architecture, hardware platform, simulation, repository, publication, and supporting document across the AUTHREX research program. Use this as your navigation hub.
Seven operational governance architectures forming the AUTHREX stack. Each addresses a specific layer of the authority lifecycle: trust attestation, authority computation, deception filtering, multi-agent consensus, deliberation latency, recovery, and escalation risk.
Hardware-anchored τ-chain protocol producing continuous sensor trust scalar via Dempster-Shafer fusion.
Four-level authority computation (A3-A0) with asymmetric hysteresis: immediate downgrade, 5-15s delayed upgrade.
Computes P(adversarial) from cross-sensor consistency and temporal anomalies before swarm aggregation.
Byzantine fault-tolerant multi-agent consensus with CUSUM-augmented anomaly detection across 3f+1 agents.
Mandatory deliberation windows preventing safety-critical actions without sustained authority.
Deterministic GREP-phase recovery: Govern → Restrict → Execute → Persist, with mutual exclusion.
Escalation risk quantification for AI-enabled command-and-control decision compression across C2 environments.
Six physical research platforms at increasing capability. All share the same Zynq UltraScale+ FPGA governance core, demonstrating cross-domain portability.
37 components. SATA-HMAA-CARA pipeline. 350 simulation runs, TLA+ verified (48,751 states).
52 components. MAVLink/HIL bridge for Cube Orange+. 250 simulation runs across 5 adversarial scenarios.
72 components. Defense-grade DEW governance. Dual Jetson AGX Orin + dual Zynq UltraScale+, MIL-STD-810G.
62 components. 9-module pipeline, ARS540 radar, OS1-64 LiDAR, ISO 26262 ASIL-D.
84 components. Hydroacoustic sonar, MAD, AIS spoofing detection, IP68, MIL-STD-810G.
92 components. ICS/SCADA (IEC 61850, Modbus), SIL 3, NERC CIP, FIPS 140-2 L3.
Thirteen browser-based simulations with seeded PRNG for bit-exact reproducibility. G*Power justified sample sizes, 2,800+ experimental runs.
Real-time authority computation engine with trust-proportional tiering and hysteresis.
Open Simulation →Dempster-Shafer sensor trust fusion with cross-sensor validation.
Open Simulation →Four-phase deterministic recovery protocol with mutual exclusion.
Open Simulation →Byzantine fault-tolerant multi-agent trust consensus.
Open Simulation →Mandatory deliberation windows with 5-state circuit breaker.
Open Simulation →Adversarial deception detection via cross-sensor anomaly correlation.
Open Simulation →Escalation risk assessment for human-machine command authority.
Open Simulation →Source code, datasets, and build artifacts for every architecture and hardware platform. MIT and CC BY 4.0 licensed.
Source code for the real-time authority computation engine.
Open Repository →Hardware-anchored sensor trust fusion implementation.
Open Repository →Standalone portfolio pages covering documentation, verification, and supporting material for the EB2-NIW petition.
Full Dhanasar framework analysis: Prong 1 (Substantial Merit), Prong 2 (Well Positioned), Prong 3 (National Benefit).
Open Endeavor →Evidence cards, professional background (7 roles), academic training (3 degrees, 2 STEM).
Open Credentials →Five independent citations: University of Toronto LexAI, Colombia Ministries of Defense, SSRN Community (Elsevier), Wargaming Weekly, Haberler.com.
Open Impact →140+ professional credentials from 25+ institutions. IEEE, AIAA, ACM, AAAI, INFORMS, NDIA, Sigma Beta Delta + 12 Developer Communities.
Open Certifications →Central index of all 13 code repositories across architectures and hardware platforms.
Open Repository Index →Formal evaluation protocol for the 13 simulations. Seeded PRNG, 2,800+ runs, G*Power justified sample sizes.
Open Evaluation →Two-page professional resume with all 7 jobs, publications, third-party recognition, and technical competencies.
Download Resume ↓All sections available on the main portfolio page (index.html). Click any to jump directly to that section.
Summary of the three Dhanasar prongs with evidence bullet points.
Jump to Endeavor →Compact promo card linking to full Credentials page.
Jump to Evidence →Table mapping specific problems to architectures that solve them.
Jump to Impact →Overview of the integrated AUTHREX research platform.
Jump to AUTHREX →Technology Readiness Level classification for each artifact.
Jump to TRL →Maps AUTHREX terms to standard academic equivalents.
Jump to Terminology →Demonstrates portability across defense and civilian domains.
Jump to Dual-Use →Summary of professional memberships and credentials.
Jump to Certifications →Past and upcoming industry conferences and societies.
Jump to Engagement →Third-party citations and recognition summary.
Jump to Impact Section →External research profile links (ORCID, Scholar, SSRN, etc).
Jump to Profiles →All research output: 12 Zenodo deposits with DOIs (CC BY 4.0) and 12 SSRN papers on AI governance, escalation risk, and national security.
Architecture papers, hardware platform papers, and testbed papers. All CC BY 4.0 licensed with permanent DOIs.
View All on Zenodo ↗Defense AI doctrine, escalation risk, counter-tunnel architectures, submarine surface signatures, and national security strategy.
View All on SSRN ↗Complete research profile with publication metrics, full-text access, and academic networking.
Open ResearchGate ↗External profiles where independent verification and research metrics can be accessed. Each profile is operated by an independent third party.
Verified researcher identity linking publications, patents, and institutional affiliation. ORCID 0009-0001-8573-1667.
Verify on ORCID ↗Publication index with citation tracking and research metrics.
View Scholar ↗Policy and strategic research papers on AI governance, escalation risk, and national security.
View SSRN ↗Full research profile with publication metrics and academic networking.
View RG ↗Open-access repository hosted by CERN. 12 deposits with permanent DOIs.
View Zenodo ↗Alternative Git hosting for redundancy and enterprise environments.
View GitLab ↗Professional network profile with work history and endorsements.
View LinkedIn ↗