← burakoktenli.com

Burak Oktenli / Repositories

Source code repositories for autonomous systems governance architectures. Each repository contains a fully functional browser-based simulation implementing the corresponding patent architecture or research framework. All code runs client-side with zero external dependencies.

15 repositories
19,005 total lines
4 U.S. provisional patent applications filed
1,029KB total
hmaa-governance-engine Public
U.S. Provisional 63/999,105
hmaaai-governanceauthority-computationpatent-filed

Authority-Governed Assured Autonomy Research Platform. 42-file Python package: 98 tests, 7 validated experiments, TLA+ verification (48,751 states), Dempster-Shafer trust fusion, deterministic simulation, browser dashboard.

HTML / JS 4,500+ lines 42 files Mar 7, 2026
cara-recovery-protocol Public
U.S. Provisional 64/000,170
caraauthority-recoverydeterministicnon-compensatory

Control Authority Regulation Architecture. Deterministic recovery protocol with GREP phases, adversary model, 68-state control-flow replay, parameter heatmap, assurance matrix, and non-compensatory terminal gate.

HTML / JS 2,532 lines 129KB Mar 9, 2026
sata-trust-anchoring Public
U.S. Provisional 64/002,453
satasensor-attestationtrust-anchoringtpm

Sensor Attestation and Trust Anchoring. Hardware-anchored τ-Chain protocol with WebCrypto SHA-256, Monte Carlo analysis, FMEA/FTA fault trees, live FSM, DoDAF OV-1, and TLA+ verification.

HTML / JS 3,490 lines 215KB Mar 11, 2026
flame-latency-architecture Public
Patent filing planned
flameflash-warstrategic-latencyescalation-control

Flash War Latency Architecture. Deterministic latency injection middleware with 5-state Circuit Breaker, D(A, tier, domain) delay function, Keep-Alive protocol, and cryptographically signed state transitions.

HTML / JS 3,679 lines 170KB Mar 12, 2026
maiva-trust-verification Public
DOI: 10.5281/zenodo.19015517
maivabyzantine-fault-tolerancemulti-agenttrust-aggregation

Multi-Agent Integrity Verification Architecture. Byzantine-resilient swarm trust aggregation with CUSUM detection, graduated escalation, DoDD 3000.09 action gates, TLA+ spec. 8 files including simulation, formal spec, and documentation.

HTML / JS / TLA+ 2,396 lines 159KB Mar 14, 2026
adara-deception-risk Public
DOI: 10.5281/zenodo.19043924
adaraadversarial-deceptiondeception-priorphantom-fleet

Adversarial Deception-Aware Risk Architecture. Proactive deception prior adjusting authority based on P(adversarial). Deception Probability Engine, Phantom Fleet detection, Bayesian update, cross-sensor consistency.

HTML / JS / JSX 7,296 lines 359KB Mar 14, 2026
eram-escalation-risk Public
SSRN: 6176802
eramescalation-riskcross-domainmonitoring

Escalation Risk Assessment Monitor. Quantifies cross-domain escalation risk with five metrics across six scenarios, seeded PRNG for reproducibility, and a strategic monitoring pipeline. Operates as a standalone cross-domain risk monitor.

HTML / JS 678 lines 84KB Mar 2026
hmaa-uav-governance Public
DOI: 10.5281/zenodo.19128769 · CC BY 4.0
hmaa-uavauthority-governed-autonomyuav-governancedempster-shafercontested-environmentsdrone-swarm

Authority-Governed UAV Autonomy for Contested Environments. Integrating SATA trust fusion, HMAA authority control, and CARA recovery into a 52-component UAV platform. Interactive governance simulator, 250 simulation runs, swarm governance extension.

HTML / JS / PDF / CSV 16 files 6,600+ lines Mar 2026
testbed-rover-governance Public
DOI: 10.5281/zenodo.19143190 · CC BY 4.0
rover-testbedauthority-governed-autonomyassured-autonomydempster-shafertla-plussafety-critical

Authority-Governed Assured Autonomy Rover Testbed. Integrating SATA trust fusion, HMAA authority control, and CARA recovery into a 37-component rover platform. Interactive governance simulator, 350 simulation runs across 7 fault scenarios, TLA+ verified.

HTML / JS / Python / TLA+ 12 files 4,500+ lines Mar 2026
blade-edge-governance-node Public
DOI: 10.5281/zenodo.19177472 · CC BY 4.0
blade-edgedirected-energydefense-governancejetson-orinzynq-fpgamil-std-810gdodd-3000-09

BLADE-EDGE Governance Node: Beam-Layer Authority for Directed Engagements, Edge Node. Defense-grade edge computing implementing 9-module governance pipeline on dual Jetson AGX Orin + Zynq UltraScale+. 72 components, 103 connections, ~$139K BOM, MIL-STD-810G rated.

HTML / JS (React) / SVG / PDF 11 files 1,700+ lines Mar 2026
blade-av-governance-node Public
DOI: 10.5281/zenodo.19232130 · CC BY 4.0
blade-avautonomous-vehicledrive-by-wireiso-26262asil-djetson-orinzynq-fpgav2x

BLADE-AV Governance Node: Authority-Governed Drive-by-Wire Safety Architecture. 9-module pipeline on Jetson AGX Orin + Zynq UltraScale+. Three-leg redundant KILOVAC fail-safe. 62 components, 1,200 simulation runs, zero unsafe actions. ~$16,287 BOM.

HTML / JS / PDF / JSON 10 files 2,800+ lines Mar 2026
blade-maritime-governance-node Public
DOI: 10.5281/zenodo.19246785 · CC BY 4.0
blade-maritimemaritime-defensehydroacousticmad-sensorais-spoofingmil-std-810gip68asv-governance

BLADE-MARITIME Governance Node: Authority-Governed Maritime Surveillance with Hydroacoustic and MAD Sensor Fusion. 9-module pipeline with four maritime extensions. 84 components, $43K total BOM, IP68 / MIL-STD-810G. Third domain instantiation.

HTML / JS / Python / PDF / JSON 12 files 4,900+ lines Mar 2026
blade-infra-governance-node Public
DOI: 10.5281/zenodo.19277887 · CC BY 4.0
blade-infracritical-infrastructureics-scadanerc-cipsil-3power-gridip65fips-140-2

BLADE-INFRA Governance Node: Authority-Governed Critical Infrastructure Protection for ICS/SCADA Systems. 9-module pipeline with SIL 3 safety relay. 92 components, $11,590 BOM, IP65 / NERC CIP / FIPS 140-2. Fourth domain instantiation.

HTML / JS / JSON / CSV 11 files 98KB sim Mar 2026
blade-space-governance-node Public
DOI: 10.5281/zenodo.20183269 · TRL 2-3 Preliminary Design · CC BY 4.0
blade-spaceorbitalleo-400-1200kmrad-tolerantrtg4-fpgaaitech-sbc30krad-tidecdsa-p256nasa-expand-3-s26b

BLADE-SPACE Governance Node: Beam-Layer Authority for Directed Engagements, Space-Edge Node. 9-stage governance pipeline on radiation-tolerant compute for autonomous LEO platforms beyond ground-loop latency. Microchip RTG4 FPGA + Aitech S-A1760 Venus SBC hot redundancy with <200 ms failover. 91 components, $505,440 reference BOM, 11.0 kg / 12.0 kg allocation, 30 krad TID, 5-year LEO mission life. 15-document engineering package. Fifth domain instantiation (orbital).

HTML / JS / SVG / CSV / JSON / Markdown 21 files 269KB sim May 2026
blade-cuas-governance-node Public
DOI: 10.5281/zenodo.20299604 · TRL 2-3 hardware / 3-4 simulation · CC BY 4.0
blade-cuascounter-uaseo-14305safer-skies-actfederal-slttkria-k26jetson-agx-orindempster-shaferecdsa-p256remote-id-spoofing

BLADE-CUAS Governance Node: Beam-Layer Authority for Directed Engagements, Counter-UAS Node. Authority-governed Counter-Unmanned Aircraft Systems node providing federal-SLTT authority arbitration, multi-modal sensor consensus, and court-admissible evidence chains. 9-stage AUTHREX pipeline, four-tier HMAA (T3/T2/T1/T0), Dempster-Shafer fusion across radar, RF, EO/IR, Remote ID, LIDAR. ~75% architectural reuse from BLADE-EDGE, ~$43.5K reference BOM. Aligned with EO 14305 and the FY26 NDAA Safer Skies Act. Sixth domain instantiation (counter-UAS).

HTML / JS / SVG / CSV / JSON / Markdown 16 files 146KB sim May 2026
blade-agent-hsm Public
DOI: 10.5281/zenodo.20299821 · TRL 2-3 silicon / 3-4 emulator · CC BY 4.0
blade-agent-hsmhardware-root-of-trustagentic-aiauthrex-agenttpm-2.0secure-elementeal6ecdsa-p256hkdftamper-evidentndaa-1513

BLADE-AGENT-HSM: Beam-Layer Authority for Directed Engagements, Agent Hardware Security Module. A tamper-evident hardware root of trust for autonomous AI agents and the hardware companion to the AUTHREX-AGENT software shim. Non-exportable ECDSA P-256/P-384 keys in a CC EAL6+ secure element, authority-tier state in a TPM 2.0 PCR bank, HKDF per-tool tokens, spawn-quorum aggregation, multi-modal tamper cascade. Five-opcode 64-byte ABI; USB-A stick and M.2 Key-E module; ~$199 reference BOM. Verified by an adversarial high-assurance emulator (275/275 deterministic checks, P-384 signed golden-trace anchor). Aligned with CISA/NSA/Five Eyes agentic-AI guidance and FY26 NDAA Sections 1513 and 6601. Seventh domain instantiation (agentic AI), first hardware root of trust.

HTML / JS / SVG / CSV / JSON / Markdown / PDF 15 files 166KB sim May 2026