Cyber-Physical Security in Power Networks

Size: px
Start display at page:

Download "Cyber-Physical Security in Power Networks"

Transcription

1 Cyber-Physical Security in Power Networks Fabio Pasqualetti Florian Dörfler Francesco Bullo Center for Control, Dynamical Systems & Computation University of California at Santa Barbara Optimization and Control for Smart rids 32nd CNLS Annual Conference, Santa Fe, NM F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control / 4

2 Security and Reliability of Power Networks One aspect of smart grid: complex physical system sophisticated cyber coordination Cyber-physical security is a fundamental obstacle challenging the smart grid vision. F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 2 / 4

3 Security and Reliability of Power Networks One aspect of smart grid: complex physical system sophisticated cyber coordination Cyber-physical security is a fundamental obstacle challenging the smart grid vision. H. Khurana, Cybersecurity: A key smart grid priority, IEEE Smart rid Newsletter, 2. S. Sridhar, A. Hahn, and M. ovindarasu Cyber-Physical System Security for the Electric Power rid Proceedings of the IEEE, 22. A. R. Metke and R. L. Ekl Security technology for smart grid networks, IEEE Transactions on Smart rid, 2. J. P. Farwell and R. Rohozinski Stuxnet and the Future of Cyber War Survival, 2. T. M. Chen and S. Abu-Nimeh Lessons from Stuxnet Computer, 2. S. Kuvshinkova SQL Slammer Worm Lessons Learned for Consideration by the Electricity Sector North American Electric Reliability Council, 23. F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 2 / 4

4 Cyber-Physical Security Cyber Security, Fault Tolerance Cyber-physical security complements cyber security Cyber security does not verify data compatible with physics/dynamics is ineffective against direct attacks on the physics/dynamics is never foolproof (e.g., insider attacks) Cyber-physical security extends fault tolerance fault detection considers accidental/generic failures cyber-physical security models worst-case attacks F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 3 / 4

5 Cyber-Physical Security Cyber Security, Fault Tolerance Cyber-physical security complements cyber security Cyber security does not verify data compatible with physics/dynamics is ineffective against direct attacks on the physics/dynamics is never foolproof (e.g., insider attacks) Cyber-physical security extends fault tolerance fault detection considers accidental/generic failures cyber-physical security models worst-case attacks F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 3 / 4

6 A Simple Example: WECC 3-machine 6-bus System b 3 g 2 g 3 b 2 b 6 b 4 b b g Sensors Physical dynamics: classical generator model & DC load flow 2 Measurements: angle and frequency of generator g 3 Attack: modify real power injections at buses b 4 & b 5 A. H. Mohsenian-Rad and A. Leon-arcia Distributed internet-based load altering attacks against smart power grids IEEE Transactions on Smart rid, 2 The attack affects the second and third generators while remaining undetected from measurements at the first generator F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 4 / 4

7 Outline Modeling framework for cyber-physical attacks 2 System & graph-theoretic characterizations 3 Centralized & distributed attack detection strategies 4 eometric & optimal attack design F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 4 / 4

8 Model of Power Networks under Attack Physics obey linear differential-algebraic dynamics: E ẋ(t) = Ax(t) 2 Measurements are in continuous-time: y(t) = Cx(t) 3 Cyber-physical attacks are colluding and omniscient: modeled as unknown inputs Bu(t) & Du(t) Eẋ(t) = Ax(t) + Bu(t) y(t) = Cx(t) + Du(t) This model includes genuine faults, physical attacks, and cyber attacks Q: attack ( Bu(t), Du(t) ) detectable/identifiable from measurements y(t)? F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 5 / 4

9 Prototypical Attacks Static stealth attack: corrupt measurements according to C Replay attack: affect system and reset output x(t) C + y(t) ũ(t) C Du ( t) x() Bū(t) x() (se A) (se A) x(t) C C + + y(t) Du(t) Covert attack: closed loop replay attack Dynamic false data injection: render unstable pole unobservable x() Bū(t) (se A) (se A) x(t) C C + y(t) Du(t) x() (se A) x(t) (s) (s p) C + y(t) Du(t) F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 6 / 4

10 Undetectable Attack Definition An attack remains undetected if its effect on measurements is undistinguishable from the effect of some nominal operating conditions Normal operating condition y(,,t) Undetectable attacks Detectable attacks y(,u(t),t) K (t),t) Definition (Undetectable attack set) The attack ( Bu(t), Du(t) ) is undetectable if there exist initial conditions x, x 2 such that, for all times t y(x, u, t) = y(x 2,, t). F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 7 / 4

11 Outline Modeling framework for cyber-physical attacks 2 System & graph-theoretic characterizations 3 Centralized & distributed attack detection strategies 4 eometric & optimal attack design F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 7 / 4

12 Vulnerabilities Analysis Equivalent characterizations: Vulnerability: undetectable attack y(x, u, t) = y(x 2,, t) 2 System theory: intruder/monitor system has invariant zero 3 raph theory # attacked signals > size of input/output linking g 2 g 3 b 2 b 6 b 4 b 5 b 3 b 6 g g 3 2 b b 2 b 4 b 5 g u (t) Sensors b b 3 y(t) u 2 (t) Attack ( Bu(t), Du(t) ) is not detectable by measurements y(t) & destabilizes the system ω (t) =y(t) 2 ω 2 (t) ω 3 (t) 3 Sensors g F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 8 / 4

13 Vulnerabilities Analysis Equivalent characterizations: Vulnerability: undetectable attack y(x, u, t) = y(x 2,, t) 2 System theory: intruder/monitor system has invariant zero 3 raph theory # attacked signals > size of input/output linking g 2 g 3 u (t) b 2 Sensors b 6 b 4 b 5 b g b 3 u 2 (t) y(t) By linearity, an undetectable attack is such that y(x x 2, u, t) =. the input output system Eẋ(t) = Ax(t) + Bu(t) y(t) = Cx(t) + Du(t) has an invariant zero. F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 8 / 4

14 Vulnerabilities Analysis Equivalent characterizations: Vulnerability: undetectable attack y(x, u, t) = y(x 2,, t) 2 System theory: intruder/monitor system has invariant zero 3 raph theory # attacked signals > size of input/output linking b 3 δ 2 δ 3 g 2 g 3 b 2 b 6 b 4 b 5 ω 2 θ 2 u θ 4 θ 6 θ 3 ω 3 u (t) b u 2 (t) y 2 ω θ θ 5 u 2 Sensors g y(t) y δ F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 8 / 4

15 Outline Modeling framework for cyber-physical attacks 2 System & graph-theoretic characterizations 3 Centralized & distributed attack detection strategies 4 eometric & optimal attack design F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 8 / 4

16 Centralized Detection Monitor Design System under attack ( Bu(t), Du(t) ) : Proposed centralized detection filter: Eẋ(t) = Ax(t) + Bu(t) Eẇ(t) = Aw(t) + ( Cw(t) y(t) ) y(t) = Cx(t) + Du(t) r(t) = Cw(t) y(t) Theorem (Centralized Attack Detection Filter) Assume w() = x(), (E, A + C) is Hurwitz, and attack is detectable. Then r(t) = if and only if u(t) =. the design is independent of B, D, and u(t) if w() x(), then asymptotic convergence a direct centralized implementation may not be feasible due to high dimensionality, spatial distribution, communication complexity,... F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 9 / 4

17 Centralized Detection Monitor Design System under attack ( Bu(t), Du(t) ) : Proposed centralized detection filter: Eẋ(t) = Ax(t) + Bu(t) Eẇ(t) = Aw(t) + ( Cw(t) y(t) ) y(t) = Cx(t) + Du(t) r(t) = Cw(t) y(t) Theorem (Centralized Attack Detection Filter) Assume w() = x(), (E, A + C) is Hurwitz, and attack is detectable. Then r(t) = if and only if u(t) =. the design is independent of B, D, and u(t) if w() x(), then asymptotic convergence a direct centralized implementation may not be feasible due to high dimensionality, spatial distribution, communication complexity,... F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 9 / 4

18 Centralized Detection Monitor Design System under attack ( Bu(t), Du(t) ) : Proposed centralized detection filter: Eẋ(t) = Ax(t) + Bu(t) Eẇ(t) = Aw(t) + ( Cw(t) y(t) ) y(t) = Cx(t) + Du(t) r(t) = Cw(t) y(t) Theorem (Centralized Attack Detection Filter) Assume w() = x(), (E, A + C) is Hurwitz, and attack is detectable. Then r(t) = if and only if u(t) =. the design is independent of B, D, and u(t) if w() x(), then asymptotic convergence a direct centralized implementation may not be feasible due to high dimensionality, spatial distribution, communication complexity,... F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 9 / 4

19 Distributed Monitor Design Partition the physical system with geographically deployed control centers: E E = E N A =, C = A A N... A N A N C C N Area 2 Area IEEE 8 Bus System Area 3 Area 4 Area 5 (i) control center i knows E i, A i, and C i, and neighboring A ij (ii) control center i can communicate with control center j A ji (iii) C is blockdiagonal, (E i, A i ) is regular & (E i, A i, C i ) is observable F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control / 4

20 Distributed Monitor Design Local monitoring with measurements and continuous-time filters & discrete communication between neighboring control centers ( E i ẇ (k) i (t) = A i w (k) i (t) + i r (k) i (t) = y i (t) C i w (k) i (t) C i w (k) i ) (t) y i (t) ( + A ijw (k ) j i j ) (t) 2 Centralized performance is recovered 3 Design and analysis relies on waveform relaxation technique and decentralized control methods for large-scale systems F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control / 4

21 An Illustrative Example: IEEE 8 Bus System Area 2 Area IEEE 8 Bus System Error Area 3 Area 4 Area 5 Convergence of distributed filter: Iterations Physics: classical generator model and DC load flow model Measurements: generator angles Attack on all measurements in Area Residuals r (k) i (t) for k = : Residual Area Residual Area Residual Area Residual Area Residual Area F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 2 / 4 Time

22 Outline Modeling framework for cyber-physical attacks 2 System & graph-theoretic characterizations 3 Centralized & distributed attack detection strategies 4 eometric & optimal attack design F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 2 / 4

23 eometric & optimal attack design A Case Study: Competitive Power eneration Environment Canada 2 PacNW 9 NoCal 3 5 SoCal 5 7 North Montana Utah South Arizona Reduced WECC grid scenario: a subset of utility companies K form a coalition goal: disrupt the power generation of competitors strategy: choose K K sacrificial generators and design an input not affecting K \ K while maximizing damage at non-colluding generators additionally here: design such that impact on K is minimal C. L. DeMarco and J. V. Sariashkar and F. Alvarado The potential for malicious control in a competitive power systems environment IEEE International Conference on Control Applications, 996 F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 2 / 4

24 eometric & optimal attack design malicious coalition: K = {, 9} (PacNW) with sacrificial machine K = {9} Canada 2 PacNW North 5 7 Montana control minimizes ω 9 (t) L subject to ω 6 (t) L (Utah) 9 NoCal non-colluding generators will be damaged 3 5 Utah.5.5 ω 5 ω5.5.5 ω2 ω3 ω ω6 ω7 ω South Arizona SoCal Reduced WECC grid ω ω ω ω ω ω4 ω5 ω governor control input F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 2 / 4

25 Conclusion We have presented: a modeling framework for cyber-physical attacks in power networks 2 fundamental system- and graph-theoretic detection conditions 3 centralized & distributed detection procedures 4 geometric & optimal attack design We have analogous results for the identification problem. Ongoing and future work: more detailed and realistic models, noise, & uncertainties 2 quantitative analysis of cost and effect of attacks F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 3 / 4

26 References F. Pasqualetti, F. Dörfler, and F. Bullo. Attack Detection and Identification in Cyber-Physical Systems - Part I: Models and Fundamental Limitations, in IEEE Transactions on Automatic Control, Feb. 22, Submitted. F. Pasqualetti, F. Dörfler, and F. Bullo. Attack Detection and Identification in Cyber-Physical Systems - Part II: Centralized and Distributed Monitor Design, in IEEE Transactions on Automatic Control, Feb. 22, Submitted. F. Pasqualetti, A. Bicchi, and F. Bullo. Consensus computation in unreliable networks: A system theoretic approach. IEEE Transactions on Automatic Control,, 57():9-4, 22. F. Pasqualetti, R. Carli, and F. Bullo. Distributed estimation and false data detection with application to power networks. Automatica, 48(5): , 22. F. Pasqualetti, A. Bicchi, and F. Bullo. A graph-theoretical characterization of power network vulnerabilities. In American Control Conference, San Francisco, CA, USA, June 2. F. Pasqualetti, F. Dörfler, and F. Bullo. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In IEEE Conf. on Decision and Control, Orlando, FL, USA, December 2. F. Dörfler, F. Pasqualetti, and F. Bullo. Distributed detection of cyber-physical attacks in power networks: A waveform relaxation approach, in Allerton Conf. on Communications, Control and Computing, Sep. 2. F. Pasqualetti, F. Dörfler, and F. Bullo. Cyber-physical security via geometric control: Distributed monitoring and malicious attacks. submitted IEEE Conf. on Decision and Control, Maui, HI, USA, December 22. F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 4 / 4

27 Cyber-Physical Security in Power Networks Fabio Pasqualetti Florian Dörfler Francesco Bullo Center for Control, Dynamical Systems & Computation University of California at Santa Barbara Optimization and Control for Smart rids 32nd CNLS Annual Conference, Santa Fe, NM F. Dörfler, F. Pasqualetti, F. Bullo UCSB Cyber-Physical Security in Power Networks Smart rid Opt. & Control 4 / 4

How To Become A Computer Scientist

How To Become A Computer Scientist Fabio Pasqualetti Curriculum Vitae June 2015 Address: Department of Mechanical Engineering University of California at Riverside A309 Bourns Hall, Riverside, CA, 92521 Phone: +1 951 827 2327 Email: fabiopas@engr.ucr.edu

More information

Secure Control Systems: A Control-Theoretic Approach to Cyber-Physical Security

Secure Control Systems: A Control-Theoretic Approach to Cyber-Physical Security UNIVERSITY OF CALIFORNIA Santa Barbara Secure Control Systems: A Control-Theoretic Approach to Cyber-Physical Security A Dissertation submitted in partial satisfaction of the requirements for the degree

More information

Distributed Estimation via Iterative Projections with Application to Power Network Monitoring

Distributed Estimation via Iterative Projections with Application to Power Network Monitoring Distributed Estimation via Iterative Projections with Application to Power Network Monitoring Fabio Pasqualetti a, Ruggero Carli b, Francesco Bullo a a Center for Control, Dynamical Systems and Computation,

More information

Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach

Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach C H A P T E R 1 Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach Mengran Xue, Sandip Roy, Yan Wan, Sajal K. Das 1.1. INTRODUCTION The purpose of this chapter

More information

9700 South Cass Avenue, Lemont, IL 60439 URL: www.mcs.anl.gov/ fulin

9700 South Cass Avenue, Lemont, IL 60439 URL: www.mcs.anl.gov/ fulin Fu Lin Contact information Education Work experience Research interests Mathematics and Computer Science Division Phone: (630) 252-0973 Argonne National Laboratory E-mail: fulin@mcs.anl.gov 9700 South

More information

Detection and Mitigation of Cyber-Attacks Using Game Theory and Learning

Detection and Mitigation of Cyber-Attacks Using Game Theory and Learning Detection and Mitigation of Cyber-Attacks Using Game Theory and Learning João P. Hespanha Kyriakos G. Vamvoudakis Correlation Engine COAs Data Data Data Data Cyber Situation Awareness Framework Mission

More information

Background: State Estimation

Background: State Estimation State Estimation Cyber Security of the Smart Grid Dr. Deepa Kundur Background: State Estimation University of Toronto Dr. Deepa Kundur (University of Toronto) Cyber Security of the Smart Grid 1 / 81 Dr.

More information

Deception Attacks on the State Estimator

Deception Attacks on the State Estimator : Deception Attacks on the State Estimator, György Dán, Henrik Sandberg, Karl H. Johansson ACCESS Linnaeus Centre, KTH Royal Institute of Technology IFAC World Congress 2011 September 1st, 2011 The story

More information

Real-Time Systems Versus Cyber-Physical Systems: Where is the Difference?

Real-Time Systems Versus Cyber-Physical Systems: Where is the Difference? Real-Time Systems Versus Cyber-Physical Systems: Where is the Difference? Samarjit Chakraborty www.rcs.ei.tum.de TU Munich, Germany Joint work with Dip Goswami*, Reinhard Schneider #, Alejandro Masrur

More information

Cyber-Security Analysis of State Estimators in Power Systems

Cyber-Security Analysis of State Estimators in Power Systems Cyber-Security Analysis of State Estimators in Electric Power Systems André Teixeira 1, Saurabh Amin 2, Henrik Sandberg 1, Karl H. Johansson 1, and Shankar Sastry 2 ACCESS Linnaeus Centre, KTH-Royal Institute

More information

BOOLEAN CONSENSUS FOR SOCIETIES OF ROBOTS

BOOLEAN CONSENSUS FOR SOCIETIES OF ROBOTS Workshop on New frontiers of Robotics - Interdep. Research Center E. Piaggio June 2-22, 22 - Pisa (Italy) BOOLEAN CONSENSUS FOR SOCIETIES OF ROBOTS Adriano Fagiolini DIEETCAM, College of Engineering, University

More information

Nuclear Security Requires Cyber Security

Nuclear Security Requires Cyber Security Nuclear Security Requires Cyber Security A. DAVID MCKINNON, PH.D., MARY SUE HOXIE Cyber Physical Security Team, National Security Directorate Project on Nuclear Issues (PONI) Fall 2015 Conference PNNL-SA-113027

More information

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION - Vol. V - Relations Between Time Domain and Frequency Domain Prediction Error Methods - Tomas McKelvey

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION - Vol. V - Relations Between Time Domain and Frequency Domain Prediction Error Methods - Tomas McKelvey COTROL SYSTEMS, ROBOTICS, AD AUTOMATIO - Vol. V - Relations Between Time Domain and Frequency Domain RELATIOS BETWEE TIME DOMAI AD FREQUECY DOMAI PREDICTIO ERROR METHODS Tomas McKelvey Signal Processing,

More information

Intrusion Detection for Mobile Ad Hoc Networks

Intrusion Detection for Mobile Ad Hoc Networks Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering tchen@engr.smu.edu http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems

More information

A New Method for Estimating Maximum Power Transfer and Voltage Stability Margins to Mitigate the Risk of Voltage Collapse

A New Method for Estimating Maximum Power Transfer and Voltage Stability Margins to Mitigate the Risk of Voltage Collapse A New Method for Estimating Maximum Power Transfer and Voltage Stability Margins to Mitigate the Risk of Voltage Collapse Bernie Lesieutre Dan Molzahn University of Wisconsin-Madison PSERC Webinar, October

More information

Quantification of Security and Survivability

Quantification of Security and Survivability Quantification of Security and Survivability ITI Workshop on Dependability and Security Urbana, Illinois Kishor Trivedi Department of Electrical and Computer Engineering Duke University Durham, NC 27708-0291

More information

System Aware Cyber Security

System Aware Cyber Security System Aware Cyber Security Application of Dynamic System Models and State Estimation Technology to the Cyber Security of Physical Systems Barry M. Horowitz, Kate Pierce University of Virginia April, 2012

More information

Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures

Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures Proceedings of the Industrial and Systems Engineering Research Conference G. Lim and J.W. Herrmann, eds. Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures Fei He,

More information

Dynamic Trust Management for the Internet of Things Applications

Dynamic Trust Management for the Internet of Things Applications Dynamic Trust Management for the Internet of Things Applications Fenye Bao and Ing-Ray Chen Department of Computer Science, Virginia Tech Self-IoT 2012 1 Sept. 17, 2012, San Jose, CA, USA Contents Introduction

More information

EECS 556 Image Processing W 09. Interpolation. Interpolation techniques B splines

EECS 556 Image Processing W 09. Interpolation. Interpolation techniques B splines EECS 556 Image Processing W 09 Interpolation Interpolation techniques B splines What is image processing? Image processing is the application of 2D signal processing methods to images Image representation

More information

PFP Technology White Paper

PFP Technology White Paper PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions

More information

Optimization Problems in Infrastructure Security

Optimization Problems in Infrastructure Security Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Optimization Problems in Infrastructure Security Evangelos Kranakis Carleton University School of Computer Science Ottawa,

More information

Web Application Security

Web Application Security Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/

More information

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Communication and Embedded Systems: Towards a Smart Grid Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Alex Sprintson Smart grid communication Key enabling technology Collecting data Control

More information

Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004

Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004 Jin Kocsis (Jin Wei) CURRICULUM VITAE Assistant Professor Department of Electrical and Computer Engineering Auburn Science and Engineering Center, Room 554 The University of Akron Akron, OH, 44325-3905

More information

3 Signals and Systems: Part II

3 Signals and Systems: Part II 3 Signals and Systems: Part II Recommended Problems P3.1 Sketch each of the following signals. (a) x[n] = b[n] + 3[n - 3] (b) x[n] = u[n] - u[n - 5] (c) x[n] = 6[n] + 1n + (i)2 [n - 2] + (i)ag[n - 3] (d)

More information

UNIVERSITY OF CALIFORNIA, SAN DIEGO Electrical & Computer Engineering Department ECE 101 - Fall 2010 Linear Systems Fundamentals

UNIVERSITY OF CALIFORNIA, SAN DIEGO Electrical & Computer Engineering Department ECE 101 - Fall 2010 Linear Systems Fundamentals UNIVERSITY OF CALIFORNIA, SAN DIEGO Electrical & Computer Engineering Department ECE 101 - Fall 2010 Linear Systems Fundamentals FINAL EXAM WITH SOLUTIONS (YOURS!) You are allowed one 2-sided sheet of

More information

Impacts of Malicious Data on Real-time Price of Electricity Market Operations

Impacts of Malicious Data on Real-time Price of Electricity Market Operations Impacts of Malicious Data on Real-time Price of Electricity Market Operations Liyan Jia, Robert J. Thomas, and Lang Tong School of Electrical and Computer Engineering Cornell University Ithaca, NY 485,

More information

Hybrid processing of SCADA and synchronized phasor measurements for tracking network state

Hybrid processing of SCADA and synchronized phasor measurements for tracking network state IEEE PES General Meeting, Denver, USA, July 2015 1 Hybrid processing of SCADA and synchronized phasor measurements for tracking network state Boris Alcaide-Moreno Claudio Fuerte-Esquivel Universidad Michoacana

More information

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

Vaibhav Srivastava. Education. Research Interests. Professional Experience. Awards and Honors. Outreach

Vaibhav Srivastava. Education. Research Interests. Professional Experience. Awards and Honors. Outreach Vaibhav Srivastava Lecturer and Postdoctoral Research Associate Mechanical and Aerospace Engineering Department Princeton University Engineering Quadrangle D-404E Princeton NJ 08544 vaibhavs@princeton.edu

More information

Context-Aware Online Traffic Prediction

Context-Aware Online Traffic Prediction Context-Aware Online Traffic Prediction Jie Xu, Dingxiong Deng, Ugur Demiryurek, Cyrus Shahabi, Mihaela van der Schaar University of California, Los Angeles University of Southern California J. Xu, D.

More information

Implementing a Quantitative Risk- Based Approach to Cyber Security

Implementing a Quantitative Risk- Based Approach to Cyber Security Implementing a Quantitative Risk- Based Approach to Cyber Security SESSION ID: STR-W01 Scott Borg U.S. Cyber Consequences Unit scott.borg@usccu.us The main problem to overcome: the statistical techniques

More information

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies

More information

Model order reduction via dominant poles

Model order reduction via dominant poles Model order reduction via dominant poles NXP PowerPoint template (Title) Template for presentations (Subtitle) Joost Rommes [joost.rommes@nxp.com] NXP Semiconductors/Corp. I&T/DTF/Mathematics Joint work

More information

Chris DeMarco Power System Engineering Research Center Department of Electrical & Computer Engineering University of Wisconsin-Madison, USA

Chris DeMarco Power System Engineering Research Center Department of Electrical & Computer Engineering University of Wisconsin-Madison, USA Grid Vulnerability in Remote Configuration of Generator Controllers: The Threat of Hacking with Megawatts Chris DeMarco Power System Engineering Research Center Department of Electrical & Computer Engineering

More information

Emulated Digital Control System Validation in Nuclear Power Plant Training Simulators

Emulated Digital Control System Validation in Nuclear Power Plant Training Simulators Digital Control System Validation in Nuclear Power Training s Gregory W. Silvaggio Westinghouse Electric Company LLC silvaggw@westinghouse.com Keywords: Validation, nuclear, digital control systems Abstract

More information

Books and Beyond. Erhan J Kartaltepe, Paul Parker, and Shouhuai Xu Department of Computer Science University of Texas at San Antonio

Books and Beyond. Erhan J Kartaltepe, Paul Parker, and Shouhuai Xu Department of Computer Science University of Texas at San Antonio How to Secure Your Email Address Books and Beyond Erhan J Kartaltepe, Paul Parker, and Shouhuai Xu p Department of Computer Science University of Texas at San Antonio Outline Email: A Brief Overview The

More information

Mobile Networking Tutorial

Mobile Networking Tutorial Dynamically Managing the Real-time Fabric of a Wireless Sensor-Actuator Network Award No: CNS-09-31195 Duration: Sept. 1 2009 - Aug. 31 2012 M.D. Lemmon, Univ. of Notre Dame (PI) S.X. Hu, Univ. of Notre

More information

How to Detect and Prevent Cyber Attacks

How to Detect and Prevent Cyber Attacks Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell 1, Nageswara S. Rao 2, Mallikarjun Shankar 1 1 Computational Sciences and Engineering Division

More information

8. Linear least-squares

8. Linear least-squares 8. Linear least-squares EE13 (Fall 211-12) definition examples and applications solution of a least-squares problem, normal equations 8-1 Definition overdetermined linear equations if b range(a), cannot

More information

FACTS Customer Service. Your uptime insurance ABB FACTS Care

FACTS Customer Service. Your uptime insurance ABB FACTS Care FACTS Customer Your uptime insurance ABB FACTS Care FACTS provides more stability and quality in existing and new power networks, with minimal environmental impact. With a complete solutions portfolio,

More information

Intrusion Detection for Grid and Cloud Computing

Intrusion Detection for Grid and Cloud Computing Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal University of Santa Catarina, Brazil Content Type

More information

Chapter 8 - Power Density Spectrum

Chapter 8 - Power Density Spectrum EE385 Class Notes 8/8/03 John Stensby Chapter 8 - Power Density Spectrum Let X(t) be a WSS random process. X(t) has an average power, given in watts, of E[X(t) ], a constant. his total average power is

More information

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security

More information

Maximum Likelihood Estimation of ADC Parameters from Sine Wave Test Data. László Balogh, Balázs Fodor, Attila Sárhegyi, and István Kollár

Maximum Likelihood Estimation of ADC Parameters from Sine Wave Test Data. László Balogh, Balázs Fodor, Attila Sárhegyi, and István Kollár Maximum Lielihood Estimation of ADC Parameters from Sine Wave Test Data László Balogh, Balázs Fodor, Attila Sárhegyi, and István Kollár Dept. of Measurement and Information Systems Budapest University

More information

Detecting Zero-Day Attacks in Real Time on Day Zero

Detecting Zero-Day Attacks in Real Time on Day Zero Detecting Zero-Day Attacks in Real Time on Day Zero Standards Certification Education & Training Publishing Conferences & Exhibits Industrial Device Integrity Assessment Hardware, OS & Software Malware

More information

Cybersecurity for Energy Delivery Systems 2010 Peer Review. William H. Sanders University of Illinois TCIPG Center Overview

Cybersecurity for Energy Delivery Systems 2010 Peer Review. William H. Sanders University of Illinois TCIPG Center Overview Cybersecurity for Energy Delivery Systems 2010 Peer Review Alexandria, VA July 20-22, 2010 William H. Sanders University of Illinois TCIPG Center Overview TCIPG Summary Extend and integrate previously

More information

A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator Proceedings of the 18th World Congress The International Federation of Automatic Control A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator André

More information

Network Security Validation Using Game Theory

Network Security Validation Using Game Theory Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy

More information

Fault Monitoring of the Electric Machine in a Hybrid Vehicle

Fault Monitoring of the Electric Machine in a Hybrid Vehicle Fault Monitoring of the Electric Machine in a Hybrid Vehicle Christofer Sundström, Erik Frisk, and Lars Nielsen Vehicular Systems, Dept. of Electrical Engineering, Linköping University, SE-581 83 Linköping,

More information

Introduction to Engineering System Dynamics

Introduction to Engineering System Dynamics CHAPTER 0 Introduction to Engineering System Dynamics 0.1 INTRODUCTION The objective of an engineering analysis of a dynamic system is prediction of its behaviour or performance. Real dynamic systems are

More information

Functional Optimization Models for Active Queue Management

Functional Optimization Models for Active Queue Management Functional Optimization Models for Active Queue Management Yixin Chen Department of Computer Science and Engineering Washington University in St Louis 1 Brookings Drive St Louis, MO 63130, USA chen@cse.wustl.edu

More information

Troubleshooting accelerometer installations

Troubleshooting accelerometer installations Troubleshooting accelerometer installations Accelerometer based monitoring systems can be tested to verify proper installation and operation. Testing ensures data integrity and can identify most problems.

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,

More information

Towards Better Definitions and Measures of Internet Security (Position Paper)

Towards Better Definitions and Measures of Internet Security (Position Paper) Towards Better Definitions and Measures of Internet Security (Position Paper) J. Aspnes and J. Feigenbaum Yale University {aspnes,feigenbaum}@cs.yale.edu M. Mitzenmacher and D. Parkes Harvard University

More information

Predictive Control Algorithms: Stability despite Shortened Optimization Horizons

Predictive Control Algorithms: Stability despite Shortened Optimization Horizons Predictive Control Algorithms: Stability despite Shortened Optimization Horizons Philipp Braun Jürgen Pannek Karl Worthmann University of Bayreuth, 9544 Bayreuth, Germany University of the Federal Armed

More information

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios Lucie Langer and Paul Smith firstname.lastname@ait.ac.at AIT Austrian Institute of Technology ComForEn Workshop Monday 29 th September,

More information

Cyber Security and Privacy - Program 183

Cyber Security and Privacy - Program 183 Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

Evolution of Control for the Smart Transmission Grid

Evolution of Control for the Smart Transmission Grid Evolution of Control for the Smart Transmission Grid Anjan Bose Washington State University Pullman, WA SCE Smart Grid Research Symposium California Institute Of Technology October, 2011 The Past (before

More information

Nonlinear Systems and Control Lecture # 15 Positive Real Transfer Functions & Connection with Lyapunov Stability. p. 1/?

Nonlinear Systems and Control Lecture # 15 Positive Real Transfer Functions & Connection with Lyapunov Stability. p. 1/? Nonlinear Systems and Control Lecture # 15 Positive Real Transfer Functions & Connection with Lyapunov Stability p. 1/? p. 2/? Definition: A p p proper rational transfer function matrix G(s) is positive

More information

SureSense Software Suite Overview

SureSense Software Suite Overview SureSense Software Overview Eliminate Failures, Increase Reliability and Safety, Reduce Costs and Predict Remaining Useful Life for Critical Assets Using SureSense and Health Monitoring Software What SureSense

More information

Course overview Processamento de sinais 2009/10 LEA

Course overview Processamento de sinais 2009/10 LEA Course overview Processamento de sinais 2009/10 LEA João Pedro Gomes jpg@isr.ist.utl.pt Instituto Superior Técnico Processamento de sinais MEAer (IST) Course overview 1 / 19 Course overview Motivation:

More information

SECURITY RISK ANALYSIS AND EVALUATION OF INTEGRATING CUSTOMER ENERGY MANAGEMENT SYSTEMS INTO SMART DISTRIBUTION GRIDS

SECURITY RISK ANALYSIS AND EVALUATION OF INTEGRATING CUSTOMER ENERGY MANAGEMENT SYSTEMS INTO SMART DISTRIBUTION GRIDS SECURITY RISK ANALYSIS AND EVALUATION OF INTEGRATING CUSTOMER ENERGY MANAGEMENT SYSTEMS INTO SMART DISTRIBUTION GRIDS Christian HÄGERLING Fabian M. KURTZ Christian WIETFELD TU Dortmund University Germany

More information

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic

More information

SEC. 1301. STATEMENT OF POLICY ON MODERNIZATION OF ELECTRICITY GRID.

SEC. 1301. STATEMENT OF POLICY ON MODERNIZATION OF ELECTRICITY GRID. TITLE XIII--SMART GRID SEC. 1301. STATEMENT OF POLICY ON MODERNIZATION OF ELECTRICITY GRID. It is the policy of the United States to support the modernization of the Nation's electricity transmission and

More information

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191 Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3

More information

White Paper An Enterprise Security Program and Architecture to Support Business Drivers

White Paper An Enterprise Security Program and Architecture to Support Business Drivers White Paper An Enterprise Security Program and Architecture to Support Business Drivers seccuris.com (866) 644-8442 Contents Introduction... 3 Information Assurance... 4 Sherwood Applied Business Security

More information

Cyber Security Implications of SIS Integration with Control Networks

Cyber Security Implications of SIS Integration with Control Networks Cyber Security Implications of SIS Integration with Control Networks The LOGIIC SIS Project Standards Certification Education & Training Publishing Conferences & Exhibits Presenter Zach Tudor is a Program

More information

FREJA Win Software for FREJA relay testing system

FREJA Win Software for FREJA relay testing system Software for FREJA relay testing system A Megger Group Company Software for FREJA relay testing system In FREJA Win, the all-round General instrument program serves as a convenient, easy to understand,

More information

William Hery (whery@poly.edu) Research Professor, Computer Science and Engineering NYU-Poly

William Hery (whery@poly.edu) Research Professor, Computer Science and Engineering NYU-Poly William Hery (whery@poly.edu) Research Professor, Computer Science and Engineering NYU-Poly Ramesh Karri (rkarri@poly.edu) Associate Professor, Electrical and Computer Engineering NYU-Poly Why is cyber

More information

Making Your Enterprise SSL Security Less of a Gamble

Making Your Enterprise SSL Security Less of a Gamble Making Your Enterprise SSL Security Less of a Gamble Rob Glickman Sr. Director, Product Marketing Amar Doshi Sr. Manager, Product Management Symantec Vision 2012 The VeriSign Seal is Now the Norton Secured

More information

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support Vol. 3 Issue 1, January-2014, pp: (32-36), Impact Factor: 1.252, Available online at: www.erpublications.com TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence

More information

Building accurate intrusion detection systems. Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory

Building accurate intrusion detection systems. Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory Building accurate intrusion detection systems Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory Outline Brief introduction to intrusion detection The MAFTIA project Accurate intrusion

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

Kaveh Shaerpour GS34380 Master of Science (With Thesis) Security in Computing Supervisor Committee: Dr Ali Deghantanha Professor Dr Ramlan Mahmod

Kaveh Shaerpour GS34380 Master of Science (With Thesis) Security in Computing Supervisor Committee: Dr Ali Deghantanha Professor Dr Ramlan Mahmod Kaveh Shaerpour GS34380 Master of Science (With Thesis) Security in Computing Supervisor Committee: Dr Ali Deghantanha Professor Dr Ramlan Mahmod Introduction Cyber-physical systems (CPS) are engineered

More information

Cloud Resilient Architecture (CRA) -Design and Analysis. Hamid Alipour Salim Hariri Youssif-Al-Nashif

Cloud Resilient Architecture (CRA) -Design and Analysis. Hamid Alipour Salim Hariri Youssif-Al-Nashif Cloud Resilient Architecture (CRA) -Design and Analysis Glynis Dsouza Hamid Alipour Salim Hariri Youssif-Al-Nashif NSF Center for Autonomic Computing University of Arizona Mohamed Eltoweissy Pacific National

More information

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Panel Session: Lessons Learned in Smart Grid Cybersecurity PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory

More information

How To Defend Against An Advanced Attack On A Network From A Malicious Binary (Apt)

How To Defend Against An Advanced Attack On A Network From A Malicious Binary (Apt) Brochure More information from http://www.researchandmarkets.com/reports/3098551/ "Big Data" Analytics in Network Security: Computational Automation of Security Professionals Description: In this SPIE,

More information

Security Considerations for the Spiral Development Model

Security Considerations for the Spiral Development Model Security Considerations for the Spiral Development Model Loye Lynn Ray University of Maryland University College 3501 University Blvd East Adelphi, MD 20783 Loye.ray@faculty.umuc.edu 717-718-5727 Abstract

More information

GUIRR Meeting Titles/Themes

GUIRR Meeting Titles/Themes GUIRR Meeting Titles/Themes 2015 October 20-21, 2015 The Disruption Myth and Gaps in the Innovation Ecosystem June 23-24, 2015 Unmanned Aircraft Systems: Use & Regulation February 9-10, 2015 Cross-Sector

More information

Cyber Security Seminar KTH 2011-04-14

Cyber Security Seminar KTH 2011-04-14 Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid erik.z.johansson@se.abb.com Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon

More information

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: KALBARCZ@ILLINOIS.EDU UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014

More information

Tree based ensemble models regularization by convex optimization

Tree based ensemble models regularization by convex optimization Tree based ensemble models regularization by convex optimization Bertrand Cornélusse, Pierre Geurts and Louis Wehenkel Department of Electrical Engineering and Computer Science University of Liège B-4000

More information

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture

More information

THE problems of characterizing the fundamental limits

THE problems of characterizing the fundamental limits Beamforming and Aligned Interference Neutralization Achieve the Degrees of Freedom Region of the 2 2 2 MIMO Interference Network (Invited Paper) Chinmay S. Vaze and Mahesh K. Varanasi Abstract We study

More information

Intelligent Worms: Searching for Preys

Intelligent Worms: Searching for Preys Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School

More information

Lecture 5 Least-squares

Lecture 5 Least-squares EE263 Autumn 2007-08 Stephen Boyd Lecture 5 Least-squares least-squares (approximate) solution of overdetermined equations projection and orthogonality principle least-squares estimation BLUE property

More information

Optimal Planning of Closed Loop Supply Chains: A Discrete versus a Continuous-time formulation

Optimal Planning of Closed Loop Supply Chains: A Discrete versus a Continuous-time formulation 17 th European Symposium on Computer Aided Process Engineering ESCAPE17 V. Plesu and P.S. Agachi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Optimal Planning of Closed Loop Supply Chains: A Discrete

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency

CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency I. Alarming call for cooperation with ISPs Slammer Worm Spread most of vulnerable SQL servers

More information

Software quality engineering. Quality assurance. Testing

Software quality engineering. Quality assurance. Testing 4 Software Quality Engineering c Jeff Tian, to be published by John Wiley, 2005 Software quality engineering Quality assurance Testing Figure 1.1. engineering Scope and content hierarchy: Testing, quality

More information

IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS

IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS Liuxi Zhang and Ali Abur Department of Electrical and Computer Engineering Northeastern University Boston, MA, USA lzhang@ece.neu.edu

More information

Francesco Sorrentino Department of Mechanical Engineering

Francesco Sorrentino Department of Mechanical Engineering Master stability function approaches to analyze stability of the synchronous evolution for hypernetworks and of synchronized clusters for networks with symmetries Francesco Sorrentino Department of Mechanical

More information

A New Mechanism for Service Recovery Technology by using Recovering Service s Data

A New Mechanism for Service Recovery Technology by using Recovering Service s Data A New Mechanism for Service Recovery Technology by using Recovering Service s Data Monire Norouzi Department of Computer Engineering, Shabestar Branch, Islamic Azad University, Shabestar, Iran Monire_norouzi@yahoo.com

More information

Control Systems with Actuator Saturation

Control Systems with Actuator Saturation Control Systems with Actuator Saturation Analysis and Design Tingshu Hu Zongli Lin With 67 Figures Birkhauser Boston Basel Berlin Preface xiii 1 Introduction 1 1.1 Linear Systems with Actuator Saturation

More information

Cybersecurity Risk Assessment in Smart Grids

Cybersecurity Risk Assessment in Smart Grids Cybersecurity Risk Assessment in Smart Grids Lucie Langer, Paul Smith, Thomas Hecht firstname.lastname@ait.ac.at AIT Austrian Institute of Technology ComForEn Symposium 2014 Sept 30, 2014 1 Risk Assessment:

More information