SlideShare a Scribd company logo
Optimization with impact:
my journey in public sector
operations research
Professor Laura Albert
Industrial & Systems Engineering
University of Wisconsin-Madison
laura@engr.wisc.edu
punkrockOR.com
@lauraalbertphd
Buena noches 
Es un placer hablar con todos ustedes hoy.
22 September 2020 Laura Albert 2
A brief bio
Professor of Industrial &
Systems Engineering
University of Wisconsin-
Madison.
From Chicago
Punk Rock Operations
Research blogger.
Former INFORMS VP of
Marketing, Communication,
and Outreach (2016 – 19)
22 September 2020 Laura Albert 3
Advances in operations research:
My research journey
22 September 2020 Laura Albert 4
Public safety:
Fire and emergency
medical services
Aviation security
policy
Infrastructure
protection /
resilience
Policing and illicit
opioid network
interdiction
Cybersecurity
Ingredients for a fulfilling academic
career in applied optimization
A good
problem
Collaborative
partners & real
data
Courage
Real world
impact!
22 September 2020 Laura Albert 5
Impact Achievement Highlights
• National Association of Counties
Achievement Award Winner, 2010
• Interfaces article
• INFORMS Impact Prize 2018
• Ragnar E. Onstad Service to Society
Award, College of Engineering, University
of Wisconsin-Madison, 2019.
• Boards and Commissions
• Wisconsin Emergency Medical Service Board
• Middleton Police Commission
22 September 2020 Laura Albert 6
Optimizers want to allocate scarce resources
to design and operate systems.
A system is a set of things—people, ambulances, computer
networks, vehicles, or whatever—interconnected in such a way
that they produce their own pattern of behavior over time.
Systems span people, resources, and processes.
Decisions are interconnected and cannot be made in isolation
22 September 2020 Laura Albert 7
Ingredient #1: good problems
A good
problem
Collaborative
partners & real
data
Courage
Real world
impact!
22 September 2020 Laura Albert 8
Aviation security
22 September 2020 Laura Albert 9
Passenger screening in the US
• 1996
• Checked baggage for high-
risk/selectee passengers
screened for explosives (run
by airlines)
• Goal: use limited
baggage screening devices
22 September 2020 Laura Albert 10
Early checked baggage security models
Baggage screening performance measures developed in
conjunction with the Federal Aviation Administration:
Policy implications?
22 September 2020 Laura Albert 11
Cover the most
flights
Cover the most
passengers on
covered flights
Cover flights by
fully utilizing the
devices
Passenger screening in the US
• November 2001 – Aviation
Transportation & Security Act
• Required all checked baggage
to be screened for explosives
• December 2001
• Remove shoes
• August 2006
• Liquids bans
22 September 2020 Laura Albert 12
• 2009 - 2010
• Explosive trace portals
• September 2012
• Less screening for seniors
(75+) and children (<12)
• December 2013
• TSA PreCheck for reduced
security
Moving beyond baggage screening:
How to screen passengers and baggage with
the right mix of screening equipment?
22 September 2020 Laura Albert 13
Risk-based Screening Framework
• How do match limited screening resources to passengers?
• Know everyone’s risk before they enter security screening;
allocate security resources to match risk.
• Risk-based security: Captured in the Dynamic Aviation Risk
Management System (DARMS) paradigm.
Assumptions:
• Most passengers are low-risk.
• Security resources are limited.
• Screening procedures make errors
(False alarms, False clears)
22 September 2020 Laura Albert 14
How can passengers be assigned?
Ahead of time (static models):
Integer programming models
Select the security classes to
use using Integer Programming
22 September 2020 Laura Albert 15
In real-time (dynamic models
for allocation decisions):
Markov Decision Processes &
Control Theory models
Key policy insights
(1) Better security is achieved by targeting scarce screening
resources at the “riskiest” passengers and doing less screening
on most passengers.
(2) Risk based screening more effective than random or uniform
screening in a resource-constrained environment.
(3) TSA Precheck implicitly does this,
which is why it reduces risk in low risk,
cost-constrained environments.
22 September 2020 Laura Albert 16
INFORMS Impact Prize (2018)
“For their pivotal role in the creation and widespread
adoption of risk-based aviation security strategies”
22 September 2020 Laura Albert 17
Ingredient #2: collaborative partners and
real data
A good
problem
Collaborative
partners & real
data
Courage
Real world
impact!
22 September 2020 Laura Albert 18
Fire and Emergency Medical Services
22 September 2020 Laura Albert 19
Collaborative partners
22 September 2020 Laura Albert 20
Anatomy of a 911 call
(110 call in Guatemala?)
Goal: faster response times
Service provider:
Emergency Call placed
Vehicle(s)
dispatched
Vehicle(s) en
route
Vehicle(s)
arrive at
scene
Service/care
provided
Vehicle(s)
leave scene
Vehicle(s)
arrive at
hospital
Patient
transferred
21
Response time from the patient’s point of view
Ambulance unavailable for other patients
Ambulance planning must consider tradeoffs across time and space
22 September 2020 Laura Albert
Call center:
Triage
Research questions
Which response time goals are best for patient health outcomes?
22 September 2020 Laura Albert 22
Lossfunction
Research questions
Which response time goals are best for patient health outcomes?
How to dispatch ambulances when triage is imperfect?
How to dispatch vehicles in equitable ways?
How can we consider location and dispatch decisions together?
How many ambulances should we keep in reserve for high-
priority patients when there is congestion?
22 September 2020 Laura Albert 23
More research questions
How to locate and dispatch ambulances in tiered systems?
When should we send multiple types of ambulances?
How to locate and dispatch non-transport vehicles?
22 September 2020 Laura Albert 24
Let’s illustrate some of the ideas with an
example using emojis
22 September 2020 Laura Albert 25
Research methods used:
• Markov decision processes
• Integer programming
• Stochastic programming
• Spatial queuing models
How to route vehicles to patients?
22 September 2020 Laura Albert 26
How to route vehicles to patients?
22 September 2020 Laura Albert 27
Better ways to route vehicles to patients?
22 September 2020 Laura Albert 28
Multiple response is sometimes best
22 September 2020 Laura Albert 29
It is sometimes best to send non-transport
vehicles
22 September 2020 Laura Albert 30
Routing multiple fire engines/ladders to calls
22 September 2020 Laura Albert 31
Ingredient #3: courage
A good
problem
Collaborative
partners & real
data
Courage Real world
impact!
22 September 2020 Laura Albert 32
To protect cyber-infrastructure, we must
protect their supply chains
“The operation of critical networks and information infrastructures
depends on the assured availability of trustworthy hardware and
software. Vulnerabilities in the supply chain can enable attacks
on the integrity, availability, or confidentiality of networks and the
data they contain.”
President Obama’s Strategy for Cyberspace, 2011
Enayaty-Ahangar, F., Albert, L.A., DuBois, E. 2020. A survey of optimization models and
methods for cyberinfrastructure security. To appear in IISE Transactions.
https://doi.org/10.1080/24725854.2020.178130622 September 2020 Laura Albert 33
Protecting critical information technology (IT)
infrastructure
• IT infrastructure relies on a globalized supply chain that is
vulnerable to numerous risks.
• Goal: reduce risk to critical infrastructure by identifying a mix of
security mitigations that enhance supply chain security.
Laura Albert
Supply chain
layer
Physical
infrastructure
layer
Designer
SupplierSupplier
Manufacturer Assembly
Distribution
Steal@A
Change@C Inject@
DESteal@B
Entry
Insertion
Points
Attack layer
Mitigations
Steal@B
Entry
Insertion
Points
22 September 2020 34
Attack paths
1 2 6
1 2 7
1 3 9 14 15 16
1 3 10 17
1 3 10 18
1 4
1 5 13
1 5 18
1 5 8 11 12 18
1 5 8 11 12 19
1 5 8 11 12 20
Laura Albert22 September 2020 35
Attack paths with mitigations
1 2 6
1 2 7
1 3 9 14 15 16
1 3 10 17
1 3 10 18
1 4
1 5 13
1 5 18
1 5 8 11 12 18
1 5 8 11 12 19
1 5 8 11 12 20
Laura Albert22 September 2020 36
Models with adaptive adversaries
Attack paths
Expected coverage models
(Deterministic, stochastic, worst-case)
Attack graphs
Project management / interdiction
With adaptive adversaries
Laura Albert22 September 2020 37
Stackelberg game approach
• One shot game representing cyber-security planning
• Defender/Leader acts first by interdicting
components of the network (i.e., selects a set of
mitigations that maximally delay the weighted
completion of individual exploits/arcs)
• Attackers/Follower(s) acts second by performing
recourse (i.e., completing project in response to the
mitigations as quickly as possible through project
management / critical path).
Attack graph: graph representation of an attack project
• Nodes: intermediate project objectives
• Arcs: attack exploits
• Longest path: represents the attacker's critical path
Laura Albert22 September 2020 38
Example
1
2
3
Attacker 1 Attacker 2
5
2
2
4
5
7
2
3
1
6
2
2
Arc lengths
Completion time = 5 Completion time = 6 Total time = 11
22 September 2020 Laura Albert 39
Example
1
2
3
Attacker 1 Attacker 2
5
2
2
4
5
7
2
3
1
6
2
2
Arc lengths with critical paths shown in boldface
Completion time = 5 Completion time = 6 Total time = 11
22 September 2020 Laura Albert 40
Example
1
2
3
Attacker 1 Attacker 2
5 + 2 (𝑚𝑚3)
2 + 2 (𝑚𝑚2)
2 + 2 (𝑚𝑚1)
4
5
7
2 + 1 (𝑚𝑚3)
3 + 2 (𝑚𝑚2)
1 + 2 (𝑚𝑚1, 𝑚𝑚2)
6
2
2
Arc lengths with delay times caused by three mitigations 𝑚𝑚1, 𝑚𝑚2, 𝑚𝑚3
Completion time = 5 Completion time = 6 Total time = 11
22 September 2020 Laura Albert 41
Example
1
2
3
Attacker 1 Attacker 2
5
2
2 + 2
4
5
7
2
3
1 + 2
6
2
2
Arc lengths when mitigation 𝑚𝑚1 selected:
The critical path in attacker 1’s graph changes. The critical path in attacker 2’s
graph is unchanged and the total project is not lengthened
Completion time = 6 Completion time = 6 Total time = 12
22 September 2020 Laura Albert 42
Example
1
2
3
Attacker 1 Attacker 2
5
2 + 2
2
4
5
7
2
3 + 2
1 + 2
6
2
2
Completion time = 6 Completion time = 7
Arc lengths when mitigation 𝑚𝑚2 selected:
The critical paths in both graphs change and both completion times are longer.
Total time = 13
22 September 2020 Laura Albert 43
Example
1
2
3
Attacker 1 Attacker 2
5 + 2
2
2
4
5
7
2 + 1
3
1
6
2
2
Completion time = 7 Completion time = 7
Arc lengths when mitigation 𝑚𝑚3 selected:
The critical paths in both graphs are the same and both completion times are
longer.
Total time = 14
22 September 2020 Laura Albert 44
Example
1
2
3
Attacker 1 Attacker 2
5
2 + 2
2 + 2
4
5
7
2
3 + 2
1 + 2
6
2
2
Completion time = 8 Completion time = 7 Total time = 15
Arc lengths when mitigations 𝑚𝑚1 and 𝑚𝑚2 selected:
The critical paths in both graphs change and both completion times are longer.22 September 2020 Laura Albert 45
The resulting bi-level stochastic interdiction
problem is hard to solve
22 September 2020 Laura Albert 46
Real world impact
A good
problem
Collaborative
partners & real
data
Courage
Real
world
impact!
22 September 2020 Laura Albert 47
Operations research with impact
Good
research
Media
outreach
Industrial
practices
Legisla-
tion
Influence
policy
22 September 2020 Laura Albert 48
My research has had impact
22 September 2020 Laura Albert 49
Adoption of the use of
non-transport vehicles
In software to route fire
engines
Wisconsin EMS Board
TSA PreCheck
Cyber-security
consortium to
develop industrial
standards
Expanding diversion programs
Middleton Police Commissioner
INFORMS Advocacy Efforts
2019 Government & Analytics Summit
22 September 2020 Laura Albert 50
Media
outreach
22 September 2020 Laura Albert 51
Our research and stORies sometimes
capture the attention of the general public
• Small window of opportunity to disseminate the real-world
impact of our research
• But we must package our messages for public consumption
• Viewers/readers want to learn something new.
What will they learn from us?
22 September 2020 Laura Albert 52
The general public’s reaction to seeing math,
modeling, and analytics in the news
22 September 2020 Laura Albert 53
Applied operations research should not
be a well kept secret
22 September 2020 Laura Albert 54
Final messages
A good
problem
Collabora-
tive partners Real data Courage
Real world
impact!
22 September 2020 Laura Albert 55
I’ve talked about research impact in
different applications
22 September 2020 Laura Albert 56
The COVID-19 pandemic has affected all
of these application areas
22 September 2020 Laura Albert 57
Public safety:
Fire and emergency
medical services
Aviation security
policy
Infrastructure
protection /
resilience
Policing and illicit
opioid network
interdiction
Cybersecurity
Making a difference with operations
research and analytics
OR and analytics can lead to tools.
OR and analytics can introduce ideas.
OR and analytics can influence policy.
OR and analytics are optimistic.
22 September 2020 Laura Albert 58
Questions?
Thank you!
Laura Albert
University of Wisconsin-Madison
laura@engr.wisc.edu
punkrockOR.com
bracketology.engr.wisc.edu
@lauraalbertphd
22 September 2020 Laura Albert 59
References
Cyber-security
Zheng, K., and Albert, L.A. 2019. Interdiction models for delaying
adversarial attacks against critical information technology
infrastructure. Naval Research Logistics 66(5), 411 – 429.
Enayaty-Ahangar, F., Albert, L.A., DuBois, E. 2020. A survey of
optimization models and methods for cyberinfrastructure security. To
appear in IISE Transactions.
https://doi.org/10.1080/24725854.2020.1781306
Aviation security
McLay, L. A., S. H. Jacobson, and J. E. Kobza, 2006. A Multilevel
Passenger Prescreening Problem for Aviation Security, Naval
Research Logistics 53 (3), 183 – 197.
Lee, A.J., L.A. McLay, and S.H. Jacobson, 2009. Designing Aviation
Security Passenger Screening Systems using Nonlinear Control.
SIAM Journal on Control and Optimization 48(4), 2085 – 2105.
McLay, L. A., S. H. Jacobson, and A. G. Nikolaev, 2009. A
Sequential Stochastic Passenger Screening Problem for Aviation
Security, IIE Transactions 41(6), 575 – 591.
McLay, L.A., S.H. Jacobson, A.J. Lee, 2010. Risk-Based Policies for
Aviation Security Checkpoint Screening. Transportation Science
44(3), 333-349.
Albert, L.A., Nikolaev, A., Lee, A.J., Fletcher, K., and Jacobson,
S.H., 2020. A Review of Risk-Based Security and Its Impact on TSA
PreCheck, To appear in IISE Transactions.
Media Engagement
L. A. Albert. 2020. Engaging the media: Telling our operations
research stories to the public. SN Operations Research Forum 1
(14) https://doi.org/10.1007/s43069-020-00017-0
Emergency Medical Services
McLay, L.A., 2009. A Maximum Expected Covering Location Model
with Two Types of Servers, IIE Transactions 41(8), 730 – 741.
McLay, L.A. and M.E. Mayorga, 2010. Evaluating Emergency
Medical Service Performance Measures. Health Care Management
Science 13(2), 124 – 136.
Ansari, S., McLay, L.A., Mayorga, M.E., 2015. A maximum expected
covering problem for locating and dispatching servers. To appear in
Transportation Science.
McLay, L.A., Moore, H. 2012. Hanover County Improves Its
Response to Emergency Medical 911 Calls. Interfaces 42(4), 380-
394.
Ansari, S., Yoon, S., Albert, L. A., 2017. An approximate Hypercube
model for public service systems with co-located servers and
multiple response. Transportation Research Part E: Logistics and
Transportation Review. 103, 143 – 157
Yoon, S., and Albert, L.A. 2020. A dynamic ambulance routing
model with multiple response. To appear in Transportation
Research Part E: Logistics at Transportation Science.
Yoon, S., Albert, L.A., and V.M. White 2020. A Scenario-Based
Ambulance Location Model for Emergency Response with Two
Types of Vehicles. To appear in Transportation Science.
22 September 2020 Laura Albert 60

More Related Content

PDF
2018 INFORMS Government & Analytics Summit Overview
PDF
Delivering emergency medical services:Research, theory, and application
PPTX
Adversarial Attacks and Defense
PPTX
Protecting the Energy Supply Chain - Dubai
PDF
Overview of IoT and Security issues
PDF
Translating Engineering and Operations Analyses into Effective Homeland Secur...
DOCX
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
PDF
AM Briefing: Security for the internet of things
2018 INFORMS Government & Analytics Summit Overview
Delivering emergency medical services:Research, theory, and application
Adversarial Attacks and Defense
Protecting the Energy Supply Chain - Dubai
Overview of IoT and Security issues
Translating Engineering and Operations Analyses into Effective Homeland Secur...
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
AM Briefing: Security for the internet of things

Similar to Optimization with impact: my journey in public sector operations research (20)

PDF
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
PDF
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
PDF
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...
PDF
Internet of things_by_economides_keynote_speech_at_ccit2014_final
PPT
AGILE - Adoptive Gateways for dIverse MuLtiple Environments
PPT
Adoptive Gateways for dIverse MuLtiple Environments
PPTX
Leveraging MITRE ATT&CK - Speaking the Common Language
PDF
Helping Utilities with Cybersecurity Preparedness: The C2M2
PPTX
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
PPTX
Internet of things(iot)
PPTX
Addressing Current Challenges and Preparing for Emerging Threats A secure d...
PPTX
Digital Transformation - AI Agents Interface Layer in the Computational Infra...
PDF
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
PDF
Capstone Paper
PDF
Developed Model with Integrated Project for Sustainable Cities & Communities
PPTX
20TL045_IDS for Cyber Security AI,ML Based (1).pptx
PPTX
Implications of GDPR for IoT Big Data Security and Privacy Fabric
PPSX
Deep Learning Analytics for IoT Security over a Configurable Big Data Platform
PPTX
Presales-Present_GravityZone Products_June2023.pptx
PPTX
Presales-Present_GravityZone Products_June2023.pptx
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
Call for Paper - 3rd International Conference on IOT, Big Data and Security (...
Internet of things_by_economides_keynote_speech_at_ccit2014_final
AGILE - Adoptive Gateways for dIverse MuLtiple Environments
Adoptive Gateways for dIverse MuLtiple Environments
Leveraging MITRE ATT&CK - Speaking the Common Language
Helping Utilities with Cybersecurity Preparedness: The C2M2
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
Internet of things(iot)
Addressing Current Challenges and Preparing for Emerging Threats A secure d...
Digital Transformation - AI Agents Interface Layer in the Computational Infra...
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Capstone Paper
Developed Model with Integrated Project for Sustainable Cities & Communities
20TL045_IDS for Cyber Security AI,ML Based (1).pptx
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Deep Learning Analytics for IoT Security over a Configurable Big Data Platform
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
Ad

More from Laura Albert (20)

PDF
Tackling hard problems: On the evolution of operations research
PDF
Should a football team go for a one or two point conversion? A dynamic progra...
PDF
On designing public sector systems in emergency medical services, disaster re...
PDF
Volleyball analytics: Modeling volleyball using Markov chains
PDF
Designing emergency medical service systems to enhance community resilience
PDF
Modeling Service networks
PDF
Advanced analytics for supporting public policy, bracketology, and beyond!
PDF
Bracketology talk at the Crossroads of ideas
PDF
Wicked problems in operations research
PDF
Spring new educators orientation
PPTX
engineering systems: critical infrastructure and logistics
PDF
Operations Research for Homeland Security and Beyond!
PDF
Discrete Optimization Models for Homeland Security and Disaster Management
PDF
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
PDF
Should a football team run or pass? A linear programming approach to game theory
PDF
Integer programming for locating ambulances
PDF
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
PDF
Delivering emergency medical services: research, application, and outreach
PDF
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
PDF
So you're thinking about graduate school in operations research, math, or eng...
Tackling hard problems: On the evolution of operations research
Should a football team go for a one or two point conversion? A dynamic progra...
On designing public sector systems in emergency medical services, disaster re...
Volleyball analytics: Modeling volleyball using Markov chains
Designing emergency medical service systems to enhance community resilience
Modeling Service networks
Advanced analytics for supporting public policy, bracketology, and beyond!
Bracketology talk at the Crossroads of ideas
Wicked problems in operations research
Spring new educators orientation
engineering systems: critical infrastructure and logistics
Operations Research for Homeland Security and Beyond!
Discrete Optimization Models for Homeland Security and Disaster Management
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
Should a football team run or pass? A linear programming approach to game theory
Integer programming for locating ambulances
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
Delivering emergency medical services: research, application, and outreach
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
So you're thinking about graduate school in operations research, math, or eng...
Ad

Recently uploaded (20)

PDF
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
PPTX
neck nodes and dissection types and lymph nodes levels
PPTX
Introduction to Cardiovascular system_structure and functions-1
PPTX
2. Earth - The Living Planet earth and life
PPT
POSITIONING IN OPERATION THEATRE ROOM.ppt
PDF
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
PDF
Biophysics 2.pdffffffffffffffffffffffffff
PDF
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
PDF
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
PDF
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
PDF
Sciences of Europe No 170 (2025)
PDF
Assessment of environmental effects of quarrying in Kitengela subcountyof Kaj...
PDF
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...
PPTX
C1 cut-Methane and it's Derivatives.pptx
PDF
Looking into the jet cone of the neutrino-associated very high-energy blazar ...
PDF
Placing the Near-Earth Object Impact Probability in Context
PPTX
Vitamins & Minerals: Complete Guide to Functions, Food Sources, Deficiency Si...
PPTX
Pharmacology of Autonomic nervous system
PDF
Lymphatic System MCQs & Practice Quiz – Functions, Organs, Nodes, Ducts
PPTX
2Systematics of Living Organisms t-.pptx
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
neck nodes and dissection types and lymph nodes levels
Introduction to Cardiovascular system_structure and functions-1
2. Earth - The Living Planet earth and life
POSITIONING IN OPERATION THEATRE ROOM.ppt
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
Biophysics 2.pdffffffffffffffffffffffffff
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
Sciences of Europe No 170 (2025)
Assessment of environmental effects of quarrying in Kitengela subcountyof Kaj...
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...
C1 cut-Methane and it's Derivatives.pptx
Looking into the jet cone of the neutrino-associated very high-energy blazar ...
Placing the Near-Earth Object Impact Probability in Context
Vitamins & Minerals: Complete Guide to Functions, Food Sources, Deficiency Si...
Pharmacology of Autonomic nervous system
Lymphatic System MCQs & Practice Quiz – Functions, Organs, Nodes, Ducts
2Systematics of Living Organisms t-.pptx

Optimization with impact: my journey in public sector operations research

  • 1. Optimization with impact: my journey in public sector operations research Professor Laura Albert Industrial & Systems Engineering University of Wisconsin-Madison laura@engr.wisc.edu punkrockOR.com @lauraalbertphd
  • 2. Buena noches  Es un placer hablar con todos ustedes hoy. 22 September 2020 Laura Albert 2
  • 3. A brief bio Professor of Industrial & Systems Engineering University of Wisconsin- Madison. From Chicago Punk Rock Operations Research blogger. Former INFORMS VP of Marketing, Communication, and Outreach (2016 – 19) 22 September 2020 Laura Albert 3
  • 4. Advances in operations research: My research journey 22 September 2020 Laura Albert 4 Public safety: Fire and emergency medical services Aviation security policy Infrastructure protection / resilience Policing and illicit opioid network interdiction Cybersecurity
  • 5. Ingredients for a fulfilling academic career in applied optimization A good problem Collaborative partners & real data Courage Real world impact! 22 September 2020 Laura Albert 5
  • 6. Impact Achievement Highlights • National Association of Counties Achievement Award Winner, 2010 • Interfaces article • INFORMS Impact Prize 2018 • Ragnar E. Onstad Service to Society Award, College of Engineering, University of Wisconsin-Madison, 2019. • Boards and Commissions • Wisconsin Emergency Medical Service Board • Middleton Police Commission 22 September 2020 Laura Albert 6
  • 7. Optimizers want to allocate scarce resources to design and operate systems. A system is a set of things—people, ambulances, computer networks, vehicles, or whatever—interconnected in such a way that they produce their own pattern of behavior over time. Systems span people, resources, and processes. Decisions are interconnected and cannot be made in isolation 22 September 2020 Laura Albert 7
  • 8. Ingredient #1: good problems A good problem Collaborative partners & real data Courage Real world impact! 22 September 2020 Laura Albert 8
  • 9. Aviation security 22 September 2020 Laura Albert 9
  • 10. Passenger screening in the US • 1996 • Checked baggage for high- risk/selectee passengers screened for explosives (run by airlines) • Goal: use limited baggage screening devices 22 September 2020 Laura Albert 10
  • 11. Early checked baggage security models Baggage screening performance measures developed in conjunction with the Federal Aviation Administration: Policy implications? 22 September 2020 Laura Albert 11 Cover the most flights Cover the most passengers on covered flights Cover flights by fully utilizing the devices
  • 12. Passenger screening in the US • November 2001 – Aviation Transportation & Security Act • Required all checked baggage to be screened for explosives • December 2001 • Remove shoes • August 2006 • Liquids bans 22 September 2020 Laura Albert 12 • 2009 - 2010 • Explosive trace portals • September 2012 • Less screening for seniors (75+) and children (<12) • December 2013 • TSA PreCheck for reduced security
  • 13. Moving beyond baggage screening: How to screen passengers and baggage with the right mix of screening equipment? 22 September 2020 Laura Albert 13
  • 14. Risk-based Screening Framework • How do match limited screening resources to passengers? • Know everyone’s risk before they enter security screening; allocate security resources to match risk. • Risk-based security: Captured in the Dynamic Aviation Risk Management System (DARMS) paradigm. Assumptions: • Most passengers are low-risk. • Security resources are limited. • Screening procedures make errors (False alarms, False clears) 22 September 2020 Laura Albert 14
  • 15. How can passengers be assigned? Ahead of time (static models): Integer programming models Select the security classes to use using Integer Programming 22 September 2020 Laura Albert 15 In real-time (dynamic models for allocation decisions): Markov Decision Processes & Control Theory models
  • 16. Key policy insights (1) Better security is achieved by targeting scarce screening resources at the “riskiest” passengers and doing less screening on most passengers. (2) Risk based screening more effective than random or uniform screening in a resource-constrained environment. (3) TSA Precheck implicitly does this, which is why it reduces risk in low risk, cost-constrained environments. 22 September 2020 Laura Albert 16
  • 17. INFORMS Impact Prize (2018) “For their pivotal role in the creation and widespread adoption of risk-based aviation security strategies” 22 September 2020 Laura Albert 17
  • 18. Ingredient #2: collaborative partners and real data A good problem Collaborative partners & real data Courage Real world impact! 22 September 2020 Laura Albert 18
  • 19. Fire and Emergency Medical Services 22 September 2020 Laura Albert 19
  • 20. Collaborative partners 22 September 2020 Laura Albert 20
  • 21. Anatomy of a 911 call (110 call in Guatemala?) Goal: faster response times Service provider: Emergency Call placed Vehicle(s) dispatched Vehicle(s) en route Vehicle(s) arrive at scene Service/care provided Vehicle(s) leave scene Vehicle(s) arrive at hospital Patient transferred 21 Response time from the patient’s point of view Ambulance unavailable for other patients Ambulance planning must consider tradeoffs across time and space 22 September 2020 Laura Albert Call center: Triage
  • 22. Research questions Which response time goals are best for patient health outcomes? 22 September 2020 Laura Albert 22 Lossfunction
  • 23. Research questions Which response time goals are best for patient health outcomes? How to dispatch ambulances when triage is imperfect? How to dispatch vehicles in equitable ways? How can we consider location and dispatch decisions together? How many ambulances should we keep in reserve for high- priority patients when there is congestion? 22 September 2020 Laura Albert 23
  • 24. More research questions How to locate and dispatch ambulances in tiered systems? When should we send multiple types of ambulances? How to locate and dispatch non-transport vehicles? 22 September 2020 Laura Albert 24
  • 25. Let’s illustrate some of the ideas with an example using emojis 22 September 2020 Laura Albert 25 Research methods used: • Markov decision processes • Integer programming • Stochastic programming • Spatial queuing models
  • 26. How to route vehicles to patients? 22 September 2020 Laura Albert 26
  • 27. How to route vehicles to patients? 22 September 2020 Laura Albert 27
  • 28. Better ways to route vehicles to patients? 22 September 2020 Laura Albert 28
  • 29. Multiple response is sometimes best 22 September 2020 Laura Albert 29
  • 30. It is sometimes best to send non-transport vehicles 22 September 2020 Laura Albert 30
  • 31. Routing multiple fire engines/ladders to calls 22 September 2020 Laura Albert 31
  • 32. Ingredient #3: courage A good problem Collaborative partners & real data Courage Real world impact! 22 September 2020 Laura Albert 32
  • 33. To protect cyber-infrastructure, we must protect their supply chains “The operation of critical networks and information infrastructures depends on the assured availability of trustworthy hardware and software. Vulnerabilities in the supply chain can enable attacks on the integrity, availability, or confidentiality of networks and the data they contain.” President Obama’s Strategy for Cyberspace, 2011 Enayaty-Ahangar, F., Albert, L.A., DuBois, E. 2020. A survey of optimization models and methods for cyberinfrastructure security. To appear in IISE Transactions. https://doi.org/10.1080/24725854.2020.178130622 September 2020 Laura Albert 33
  • 34. Protecting critical information technology (IT) infrastructure • IT infrastructure relies on a globalized supply chain that is vulnerable to numerous risks. • Goal: reduce risk to critical infrastructure by identifying a mix of security mitigations that enhance supply chain security. Laura Albert Supply chain layer Physical infrastructure layer Designer SupplierSupplier Manufacturer Assembly Distribution Steal@A Change@C Inject@ DESteal@B Entry Insertion Points Attack layer Mitigations Steal@B Entry Insertion Points 22 September 2020 34
  • 35. Attack paths 1 2 6 1 2 7 1 3 9 14 15 16 1 3 10 17 1 3 10 18 1 4 1 5 13 1 5 18 1 5 8 11 12 18 1 5 8 11 12 19 1 5 8 11 12 20 Laura Albert22 September 2020 35
  • 36. Attack paths with mitigations 1 2 6 1 2 7 1 3 9 14 15 16 1 3 10 17 1 3 10 18 1 4 1 5 13 1 5 18 1 5 8 11 12 18 1 5 8 11 12 19 1 5 8 11 12 20 Laura Albert22 September 2020 36
  • 37. Models with adaptive adversaries Attack paths Expected coverage models (Deterministic, stochastic, worst-case) Attack graphs Project management / interdiction With adaptive adversaries Laura Albert22 September 2020 37
  • 38. Stackelberg game approach • One shot game representing cyber-security planning • Defender/Leader acts first by interdicting components of the network (i.e., selects a set of mitigations that maximally delay the weighted completion of individual exploits/arcs) • Attackers/Follower(s) acts second by performing recourse (i.e., completing project in response to the mitigations as quickly as possible through project management / critical path). Attack graph: graph representation of an attack project • Nodes: intermediate project objectives • Arcs: attack exploits • Longest path: represents the attacker's critical path Laura Albert22 September 2020 38
  • 39. Example 1 2 3 Attacker 1 Attacker 2 5 2 2 4 5 7 2 3 1 6 2 2 Arc lengths Completion time = 5 Completion time = 6 Total time = 11 22 September 2020 Laura Albert 39
  • 40. Example 1 2 3 Attacker 1 Attacker 2 5 2 2 4 5 7 2 3 1 6 2 2 Arc lengths with critical paths shown in boldface Completion time = 5 Completion time = 6 Total time = 11 22 September 2020 Laura Albert 40
  • 41. Example 1 2 3 Attacker 1 Attacker 2 5 + 2 (𝑚𝑚3) 2 + 2 (𝑚𝑚2) 2 + 2 (𝑚𝑚1) 4 5 7 2 + 1 (𝑚𝑚3) 3 + 2 (𝑚𝑚2) 1 + 2 (𝑚𝑚1, 𝑚𝑚2) 6 2 2 Arc lengths with delay times caused by three mitigations 𝑚𝑚1, 𝑚𝑚2, 𝑚𝑚3 Completion time = 5 Completion time = 6 Total time = 11 22 September 2020 Laura Albert 41
  • 42. Example 1 2 3 Attacker 1 Attacker 2 5 2 2 + 2 4 5 7 2 3 1 + 2 6 2 2 Arc lengths when mitigation 𝑚𝑚1 selected: The critical path in attacker 1’s graph changes. The critical path in attacker 2’s graph is unchanged and the total project is not lengthened Completion time = 6 Completion time = 6 Total time = 12 22 September 2020 Laura Albert 42
  • 43. Example 1 2 3 Attacker 1 Attacker 2 5 2 + 2 2 4 5 7 2 3 + 2 1 + 2 6 2 2 Completion time = 6 Completion time = 7 Arc lengths when mitigation 𝑚𝑚2 selected: The critical paths in both graphs change and both completion times are longer. Total time = 13 22 September 2020 Laura Albert 43
  • 44. Example 1 2 3 Attacker 1 Attacker 2 5 + 2 2 2 4 5 7 2 + 1 3 1 6 2 2 Completion time = 7 Completion time = 7 Arc lengths when mitigation 𝑚𝑚3 selected: The critical paths in both graphs are the same and both completion times are longer. Total time = 14 22 September 2020 Laura Albert 44
  • 45. Example 1 2 3 Attacker 1 Attacker 2 5 2 + 2 2 + 2 4 5 7 2 3 + 2 1 + 2 6 2 2 Completion time = 8 Completion time = 7 Total time = 15 Arc lengths when mitigations 𝑚𝑚1 and 𝑚𝑚2 selected: The critical paths in both graphs change and both completion times are longer.22 September 2020 Laura Albert 45
  • 46. The resulting bi-level stochastic interdiction problem is hard to solve 22 September 2020 Laura Albert 46
  • 47. Real world impact A good problem Collaborative partners & real data Courage Real world impact! 22 September 2020 Laura Albert 47
  • 48. Operations research with impact Good research Media outreach Industrial practices Legisla- tion Influence policy 22 September 2020 Laura Albert 48
  • 49. My research has had impact 22 September 2020 Laura Albert 49 Adoption of the use of non-transport vehicles In software to route fire engines Wisconsin EMS Board TSA PreCheck Cyber-security consortium to develop industrial standards Expanding diversion programs Middleton Police Commissioner
  • 50. INFORMS Advocacy Efforts 2019 Government & Analytics Summit 22 September 2020 Laura Albert 50
  • 52. Our research and stORies sometimes capture the attention of the general public • Small window of opportunity to disseminate the real-world impact of our research • But we must package our messages for public consumption • Viewers/readers want to learn something new. What will they learn from us? 22 September 2020 Laura Albert 52
  • 53. The general public’s reaction to seeing math, modeling, and analytics in the news 22 September 2020 Laura Albert 53
  • 54. Applied operations research should not be a well kept secret 22 September 2020 Laura Albert 54
  • 55. Final messages A good problem Collabora- tive partners Real data Courage Real world impact! 22 September 2020 Laura Albert 55
  • 56. I’ve talked about research impact in different applications 22 September 2020 Laura Albert 56
  • 57. The COVID-19 pandemic has affected all of these application areas 22 September 2020 Laura Albert 57 Public safety: Fire and emergency medical services Aviation security policy Infrastructure protection / resilience Policing and illicit opioid network interdiction Cybersecurity
  • 58. Making a difference with operations research and analytics OR and analytics can lead to tools. OR and analytics can introduce ideas. OR and analytics can influence policy. OR and analytics are optimistic. 22 September 2020 Laura Albert 58
  • 59. Questions? Thank you! Laura Albert University of Wisconsin-Madison laura@engr.wisc.edu punkrockOR.com bracketology.engr.wisc.edu @lauraalbertphd 22 September 2020 Laura Albert 59
  • 60. References Cyber-security Zheng, K., and Albert, L.A. 2019. Interdiction models for delaying adversarial attacks against critical information technology infrastructure. Naval Research Logistics 66(5), 411 – 429. Enayaty-Ahangar, F., Albert, L.A., DuBois, E. 2020. A survey of optimization models and methods for cyberinfrastructure security. To appear in IISE Transactions. https://doi.org/10.1080/24725854.2020.1781306 Aviation security McLay, L. A., S. H. Jacobson, and J. E. Kobza, 2006. A Multilevel Passenger Prescreening Problem for Aviation Security, Naval Research Logistics 53 (3), 183 – 197. Lee, A.J., L.A. McLay, and S.H. Jacobson, 2009. Designing Aviation Security Passenger Screening Systems using Nonlinear Control. SIAM Journal on Control and Optimization 48(4), 2085 – 2105. McLay, L. A., S. H. Jacobson, and A. G. Nikolaev, 2009. A Sequential Stochastic Passenger Screening Problem for Aviation Security, IIE Transactions 41(6), 575 – 591. McLay, L.A., S.H. Jacobson, A.J. Lee, 2010. Risk-Based Policies for Aviation Security Checkpoint Screening. Transportation Science 44(3), 333-349. Albert, L.A., Nikolaev, A., Lee, A.J., Fletcher, K., and Jacobson, S.H., 2020. A Review of Risk-Based Security and Its Impact on TSA PreCheck, To appear in IISE Transactions. Media Engagement L. A. Albert. 2020. Engaging the media: Telling our operations research stories to the public. SN Operations Research Forum 1 (14) https://doi.org/10.1007/s43069-020-00017-0 Emergency Medical Services McLay, L.A., 2009. A Maximum Expected Covering Location Model with Two Types of Servers, IIE Transactions 41(8), 730 – 741. McLay, L.A. and M.E. Mayorga, 2010. Evaluating Emergency Medical Service Performance Measures. Health Care Management Science 13(2), 124 – 136. Ansari, S., McLay, L.A., Mayorga, M.E., 2015. A maximum expected covering problem for locating and dispatching servers. To appear in Transportation Science. McLay, L.A., Moore, H. 2012. Hanover County Improves Its Response to Emergency Medical 911 Calls. Interfaces 42(4), 380- 394. Ansari, S., Yoon, S., Albert, L. A., 2017. An approximate Hypercube model for public service systems with co-located servers and multiple response. Transportation Research Part E: Logistics and Transportation Review. 103, 143 – 157 Yoon, S., and Albert, L.A. 2020. A dynamic ambulance routing model with multiple response. To appear in Transportation Research Part E: Logistics at Transportation Science. Yoon, S., Albert, L.A., and V.M. White 2020. A Scenario-Based Ambulance Location Model for Emergency Response with Two Types of Vehicles. To appear in Transportation Science. 22 September 2020 Laura Albert 60