Dr. Beyah works at the intersection of networks and security, developing techniques and protocols for securing cyber-physical systems.

Under his lead, the Communications Assurance and Performance (CAP) group develops algorithms that enable a more secure network infrastructure with computer systems that are more accountable and less vulnerable to attacks. Through experimentation, simulation, and theoretical analysis, Dr. Beyah's team provides solutions to current network security problems and to long-range challenges as networks and threats evolve.  

Their research is composed of two complementary approaches: (1) designing and deploying real-world systems, tools, and algorithms that are immediately applicable to today's networks and (2) developing fundamental network primitives and algorithms that could transform network security and management. The CAP group applies this approach to three research areas: cybersecurity for critical infrastructure networks, cybersecurity for additive manufacturing systems, and network monitoring and performance.

Dr. Beyah and his team have also developed several software programs that support research in these areas and beyond. They have also found many vulnerabilities in critical infrastructure components.

Research Goals 

  • Cybersecurity for critical infrastructure networks: Securing the distribution of data in infrastructure networks, such as power plants, oil and gas pipelines, flood-control dams, waste and water distribution systems, and civil defense siren systems

  • Cybersecurity for additive manufacturing systems: Securing additive manufacturing from attacks at various stages of the 3D printing process


  • Intrusion detection of 3D printing process: Developing air-gapped techniques to ensure the integrity of the 3D printing process

  • 3D printing intellectual property protection: Developing techniques to secure the 3D printing process against attacks on the intellectual property of the printed object

  • PLC program malware detection: Developing techniques to monitor and determine if binary PLC programs can destabilize an industrial process

  • Power grid security: Developing radio frequency-based monitoring that use lightning watermarks to ensure the integrity of substation operations


  • Executive Lead, Campus Data Security Efforts, Georgia Tech

  • Former Vice President for Interdisciplinary Research, Georgia Tech

  • Former Executive Director, Online Masters of Cybersecurity Program, Georgia Tech

  • Co-Founder and Board Chairman, Fortiphyd Logic, Inc.