Marios Sazos

ORCID: 0009-0007-0074-1908
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Electrostatic Discharge in Electronics
  • HVDC Systems and Fault Protection
  • Advanced Malware Detection Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Data Stream Mining Techniques
  • Power Systems Fault Detection
  • Security and Verification in Computing
  • Anomaly Detection Techniques and Applications
  • Real-time simulation and control systems
  • Intelligence, Security, War Strategy
  • Electrical Fault Detection and Protection
  • Opportunistic and Delay-Tolerant Networks

New York University
2016-2019

New York University Abu Dhabi
2019

In recent years, cyber-physical system (CPS) applications have been extensively utilised in the electric power grid to enable wide-area protection, control, and monitoring of systems. Many these a smart CPS depend on reliable time synchronisation. For example, synchrophasor data from geographically distributed phasor measurement units (PMU) utilise global positioning (GPS) for precise timing. However, are exposed GPS spoofing attacks that can lead inaccurate trigger unnecessary, possibly...

10.1049/iet-cps.2017.0033 article EN cc-by IET Cyber-Physical Systems Theory & Applications 2017-08-25

Over the past years, sophisticated adversaries have infiltrated control networks of energy companies around globe. As attempts to compromise industrial and information technology systems soared, electric utilities increase their investments in cyber security as an important step enhance resiliency power system. Although utility started adopting a defense depth strategy, compliant with reliability standards, first towards building effective mitigation strategies is understand attack vectors...

10.1109/latw.2016.7483348 article EN 2016-04-01

Rapid modernisation of distribution power systems aims to improve system efficiency and reliability while increasing photovoltaic (PV) penetration levels. However, ensuring the cyber security such smart grids has emerged as major challenge. Cyber-attacks on key equipment may lead inefficient operation grid, breach private meter data or cause intentional false tripping feeders. In this paper, a man in middle attack commercial solar PV inverter, which provides ancillary services is...

10.1109/cyberpels49534.2020.9311531 article EN 2020-10-13

Cyber security of distribution power systems is an increasing and pressing importance due to the fast modernisation current systems. attacks on may aim operate system inefficiently, steal private smart meter data or cause intentional false tripping few all feeders. In this paper, a Man in The Middle (MiTM) attack factor correction unit implemented demonstrated overload feeder entire causing regional blackout. Experimental implementation carried out laboratory-scale setup using commercial...

10.1109/isgt-europe47291.2020.9248779 article EN 2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe) 2020-10-26

In 2017, desalination industry was contracted to produce 99.8 million m3/d of fresh water globally. regions with a natural shortage water, contributes up 70% drinking water. While state-of-the-art research has focused on securing the power grid, treatment plants, and other critical infrastructure, not much attention been given towards plants. this work, we perform interdisciplinary cyber threat analysis plant model, presenting cyberattacks analyzing their effect performance equipment both...

10.1145/3321705.3329805 article EN 2019-07-02

As digital emerging technologies are being widely integrated in the grid infrastructure, security incidents to these systems could have severe outcomes. In order understand vulnerabilities of both field devices and communication protocols used newly formed smart grid, testbed frameworks developed conduct vulnerability studies. To date, efforts develop such testbeds resulted costly, non-modular, proprietary-based environments. this paper, we present FLEP-SGS <sup...

10.1109/isgt.2019.8791653 article EN 2019-02-01

Modern cyber warfare involves penetration of a nation's computers and networks, aiming to cause extensive damage and/or disruption. Such actions are generally deemed feasible only by resource-wealthy nation state actors. In this work, we challenge perception introduce methodology dubbed Open Source Exploitation (OSEXP), which leverages public infrastructure execute an advanced attack on critical infrastructure. particular, characterize verify effective reusable OSEXP vector based time...

10.1109/vlsi-soc.2018.8644775 article EN 2018-10-01

In existing literature, various machine learning models have been applied to detect cyber attacks on the power grid. None of them, however, consider degradation model over time due distributed and dynamic nature system. At same time, they also fail recognize natural events, such as line maintenance, since are based binary classification (attack/no attack). an effort develop a security protection strategy that will work robustly for extended period we methodology LightGBM framework, which...

10.1145/3411498.3419964 article EN 2020-11-03

Critical infrastructures are controlled by industrial control systems. Such systems primarily operated Programmable Logic Controllers (PLC). In recent years, PLC vendors have been moving towards commercial-off-the-shelf components and operating systems, a trend that has decreased development maintenance costs. It also had the side-effect of exposing these devices to wider range attacks. Previous research focused on securing network monitoring its traffic. software applications though,...

10.1145/3605758.3623499 article EN 2023-11-23
Coming Soon ...