Identifying Compromised Smart Grid Components

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nulla facilisis condimentum diam, at viverra ligula bibendum sit amet. Sed malesuada mattis lorem in molestie. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Mauris...

Pricing Attacks

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nulla facilisis condimentum diam, at viverra ligula bibendum sit amet. Sed malesuada mattis lorem in molestie. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Mauris...

Secure Time-Critical Communications

PI: Qinghua Li, University of Arkansas Many communication messages in electric substations of the power grid need to be delivered in a very short time (e.g., 3ms according to IEC 61850). However, the delivery delay of such messages is sensitive to flooding attacks...

Cybersecurity Configuration Management

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nulla facilisis condimentum diam, at viverra ligula bibendum sit amet. Sed malesuada mattis lorem in molestie. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Mauris...

Cross-Layer and Cyber Physical Moving Target Defense

PI: Qinghua Li, University of Arkansas With the integration of advanced communication technologies, the power grid is expected to greatly enhance efficiency and reliability of future energy delivery. However, since most devices in electric substations are connected...