- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Electrostatic Discharge in Electronics
- HVDC Systems and Fault Protection
- Advanced Malware Detection Techniques
- Physical Unclonable Functions (PUFs) and Hardware Security
- Data Stream Mining Techniques
- Power Systems Fault Detection
- Security and Verification in Computing
- Anomaly Detection Techniques and Applications
- Real-time simulation and control systems
- Intelligence, Security, War Strategy
- Electrical Fault Detection and Protection
- Opportunistic and Delay-Tolerant Networks
New York University
2016-2019
New York University Abu Dhabi
2019
In recent years, cyber-physical system (CPS) applications have been extensively utilised in the electric power grid to enable wide-area protection, control, and monitoring of systems. Many these a smart CPS depend on reliable time synchronisation. For example, synchrophasor data from geographically distributed phasor measurement units (PMU) utilise global positioning (GPS) for precise timing. However, are exposed GPS spoofing attacks that can lead inaccurate trigger unnecessary, possibly...
Over the past years, sophisticated adversaries have infiltrated control networks of energy companies around globe. As attempts to compromise industrial and information technology systems soared, electric utilities increase their investments in cyber security as an important step enhance resiliency power system. Although utility started adopting a defense depth strategy, compliant with reliability standards, first towards building effective mitigation strategies is understand attack vectors...
Rapid modernisation of distribution power systems aims to improve system efficiency and reliability while increasing photovoltaic (PV) penetration levels. However, ensuring the cyber security such smart grids has emerged as major challenge. Cyber-attacks on key equipment may lead inefficient operation grid, breach private meter data or cause intentional false tripping feeders. In this paper, a man in middle attack commercial solar PV inverter, which provides ancillary services is...
Cyber security of distribution power systems is an increasing and pressing importance due to the fast modernisation current systems. attacks on may aim operate system inefficiently, steal private smart meter data or cause intentional false tripping few all feeders. In this paper, a Man in The Middle (MiTM) attack factor correction unit implemented demonstrated overload feeder entire causing regional blackout. Experimental implementation carried out laboratory-scale setup using commercial...
In 2017, desalination industry was contracted to produce 99.8 million m3/d of fresh water globally. regions with a natural shortage water, contributes up 70% drinking water. While state-of-the-art research has focused on securing the power grid, treatment plants, and other critical infrastructure, not much attention been given towards plants. this work, we perform interdisciplinary cyber threat analysis plant model, presenting cyberattacks analyzing their effect performance equipment both...
As digital emerging technologies are being widely integrated in the grid infrastructure, security incidents to these systems could have severe outcomes. In order understand vulnerabilities of both field devices and communication protocols used newly formed smart grid, testbed frameworks developed conduct vulnerability studies. To date, efforts develop such testbeds resulted costly, non-modular, proprietary-based environments. this paper, we present FLEP-SGS <sup...
Modern cyber warfare involves penetration of a nation's computers and networks, aiming to cause extensive damage and/or disruption. Such actions are generally deemed feasible only by resource-wealthy nation state actors. In this work, we challenge perception introduce methodology dubbed Open Source Exploitation (OSEXP), which leverages public infrastructure execute an advanced attack on critical infrastructure. particular, characterize verify effective reusable OSEXP vector based time...
In existing literature, various machine learning models have been applied to detect cyber attacks on the power grid. None of them, however, consider degradation model over time due distributed and dynamic nature system. At same time, they also fail recognize natural events, such as line maintenance, since are based binary classification (attack/no attack). an effort develop a security protection strategy that will work robustly for extended period we methodology LightGBM framework, which...
Critical infrastructures are controlled by industrial control systems. Such systems primarily operated Programmable Logic Controllers (PLC). In recent years, PLC vendors have been moving towards commercial-off-the-shelf components and operating systems, a trend that has decreased development maintenance costs. It also had the side-effect of exposing these devices to wider range attacks. Previous research focused on securing network monitoring its traffic. software applications though,...