BackgroundCheck.run
Search For

Thomas J Tantillo, 375 Turtle Ct, Flemington, NJ 08822

Thomas Tantillo Phones & Addresses

Flemington, NJ   

Baltimore, MD   

River Edge, NJ   

156 Webb Ave, River Edge, NJ 07661   

Social networks

Thomas J Tantillo

Linkedin

Work

Company: Johns hopkins university Sep 2012 to Sep 2018 Position: Ph.d student

Education

Degree: Doctorates, Doctor of Philosophy School / High School: The Johns Hopkins University 2012 to 2018 Specialities: Computer Science, Philosophy

Skills

Software Development • C • C++ • Python • Distributed Systems • Critical Infrastructure • Algorithms • Computer Security

Industries

Computer Software

Mentions for Thomas J Tantillo

Thomas Tantillo resumes & CV records

Resumes

Thomas Tantillo Photo 22

Software Engineer

Location:
Baltimore, MD
Industry:
Computer Software
Work:
Johns Hopkins University Sep 2012 - Sep 2018
Ph.d Student
Symbiont.io Sep 2012 - Sep 2018
Software Engineer
Applied Communication Sciences / Vencore Labs Jun 2015 - Aug 2015
Research Associate Intern
Education:
The Johns Hopkins University 2012 - 2018
Doctorates, Doctor of Philosophy, Computer Science, Philosophy
The Johns Hopkins University 2010 - 2013
Masters, Computer Science
The Johns Hopkins University 2006 - 2011
The Johns Hopkins University 2006 - 2010
Bachelors, Bachelor of Science, Computer Engineering
Skills:
Software Development, C, C++, Python, Distributed Systems, Critical Infrastructure, Algorithms, Computer Security

Publications & IP owners

Us Patents

Systems And Methods For Cloud-Based Control And Data Acquisition With Abstract State

US Patent:
2019039, Dec 26, 2019
Filed:
Jan 26, 2018
Appl. No.:
16/479371
Inventors:
- Baltimore MD, US
Amy BABAY - Bethesda MD, US
Thomas TANTILLO - Baltimore MD, US
International Classification:
G05B 19/418
G05B 19/408
H04L 29/08
Abstract:
Systems, computer readable media, and method concern assigning an abstraction representation to data associated with a system of the SCADA environment. The method also includes providing the abstraction representation to a control system associated with the system of the SCADA environment. The control system is implemented in a computer system. Further, the method includes receiving actual data from the system of the SCADA environment. Additionally, the method includes generating abstract data from the actual data using the abstraction representation. The method, also includes forwarding the abstract data to the control system.

Network-Attack-Resilient Intrusion-Tolerant Scada Architecture

US Patent:
2019032, Oct 17, 2019
Filed:
Jun 21, 2017
Appl. No.:
16/313459
Inventors:
- Baltimore MD, US
Amy BABAY - Baltimore MD, US
Thomas TANTILLO - Baltimore MD, US
International Classification:
H04L 29/08
H04L 29/06
Abstract:
The present invention generally relates to network-attack-resilient intrusion-tolerant Supervisory Control and Data Acquisition (SCADA) systems. Some implementations utilize redundant, proactively-recovery-configured servers at multiple centers communally executing a replication protocol. Some implementations, in addition to control centers, include data centers, which participate in the replication protocol, except that they may not be capable of controlling remote units such as Remote Terminal Units (RTUs).

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.