PNNL scientist James Stegen and an international team of collaborators recently published a comprehensive review of variably inundated ecosystems (VIEs).
CESER and PNNL convened a three-day summit with more than 100 state officials, cybersecurity experts, and industry leaders across 35 states to advance energy security planning, cyber risk assessment, and fortify protections against attacks.
This study presents an automated method to detect and classify open- and closed-cell mesoscale cellular convection (MCC) using long-term ground-based radar observations.
Danny Herrera, a systems engineer and leader in the National Security Directorate at PNNL, has been named the new co-director of the Institute for Cybersecurity and Resilient Infrastructure Studies.
PNNL researchers have published their paper, “Introducing Molecular Hypernetworks for Discovery in Multidimensional Metabolomics Data,” in the Journal of Proteome Research.
Seawater threatens to intrude into coastal freshwater aquifers that millions of people depend on for drinking water and irrigation. This study investigates sea-level rise impacts on the global coastal groundwater table.
New datasets delineating global urban land support scientific research, application, and policy, but they can produce different results when applied to the same problem making it difficult for researchers to decide which to use.
A recent paper published in Science sheds light on how aerosols—tiny particles in the air—released by industrial activities can trigger downstream snowfall events.
Through a detailed examination of historical data supported by mechanistic analysis and model experiments, researchers unveil that a large-scale climate system intensifies heat extremes and wildfire risks in the PNW.
This study shows that dry dynamics alone is not enough to understand jet stream persistence. Instead, clouds and precipitation are more important contributors than internal “dry” mechanisms to this memory of the Southern Hemisphere jet.
A team of researchers at PNNL is developing a new approach to explore the higher-dimensional shape of cyber systems to identify signatures of adversarial attacks.