PI: Shalinee Kishore, Lehigh University The integration of renewable generation brings randomness to the power system which can be exploited by attackers to hide manipulative acts. Consequences of cyber-physical attacks or uncertain and variable renewable generation...
PI: Mooi Choo Chuah, Lehigh University Co-PI: Liang Cheng, Lehigh University Co-PI: Dirk Reiners, University of Arkansas, Little Rock This project aims to detect botnet in SCADA networks, a type of security attack that propagates malware within SCADA networks once one...
PI: Kemal Akkaya, Florida International University Secure smart meter communications rely on keys for encryption, decryption, authentication, and so on, but management of keys is a challenge. This project addresses public key (i.e., certificates) distribution in smart...
PI: Alan Mantooth, University of Arkansas The Cybersecure Power Router project investigates best practices for creating grid-connected power electronics that are cybersecure-by-design. The project layers securities into a combined solar inverter, battery management...
PI: Qinghua Li, University of Arkansas Co-PI: Dirk Reiners, University of Arkansas, Little Rock Co-PI: Carolina Cruz-Neira, University of Arkansas, Little Rock Patching security vulnerabilities continues to be a heavily manual intensive process in the energy sector....
Recent Comments