Journal paper

file

Visible to the public Impact of Stealthy Attacks on Optimal Power Flow: A Simulink-Driven Formal Analysis

Optimal Power Flow (OPF) is a crucial part of the Energy Management System (EMS) as it determines individual generator outputs that minimize generation cost while satisfying transmission, generation, and system-level operating constraints. OPF relies on a core EMS routine, namely state estimation, which computes system states, principally bus voltages/phase angles at the buses. However, state estimation is vulnerable to false data injection attacks in which an adversary can alter certain measurements to corrupt the estimator's solution without being detected.

file

Visible to the public Security Design against Stealthy Attacks on Power System State Estimation: A Formal Approach

State estimation is very important for securely, reliably, and efficiently maintaining a power grid. If state estimation is not protected, an attacker can compromise meters or communication systems and introduce false measurements, which can evade existing Bad Data Detection (BDD) algorithms and lead to incorrect state estimation. This kind of attack is stealthy and widely known as an Undetected False Data Injection (UFDI) attack.

file

Visible to the public OODA Loops in Cyberspace: A New Cyber-Defense Model

Colonel John Boyd's Observe/Orient/Decide/Act Loop ("OODA loop") is a widely adopted decision-making analytical framework.

We combine the OODA loop with the NSA Methodology for Adversary Obstruction to create a new cyber-defense model.

file

Visible to the public Differentially Private Average Consensus: Obstructions, Trade-Offs, and Optimal Algorithm Design

This paper studies the multi-agent average consensus problem under the requirement of differential privacy of the agents' initial states against an adversary that has access to all the messages. We first establish that a differentially private consensus algorithm cannot guarantee convergence of the agents' states to the exact average in distribution, which in turn implies the same impossibility for other stronger notions of convergence.

event

Visible to the public  The Fourth International Conference On Digital Enterprise and Information Systems
Jul 19, 2017 9:00 am - Jul 20, 2017 5:00 pm UTC

You are invited to participate in The Fourth International Conference On Digital Enterprise and Information Systems (DEIS2017) that will be held in Jakarta, Indonesia, on July 19 - 20, 2017. The event will be held over two days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

forum

Visible to the public CfP: The Cyber-Physical Systems journal invites you to submit your research

Dear readers,

Please find below a general call for papers to the Cyber Physical Systems journal. I'd be delighted to answer any questions or queries that you may have and look forward reading your research.

With best wishes,

Mr Richard Goodman

file

Visible to the public A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices

Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer.

file

Visible to the public The Healthtech Declaration

Healthcare technology--sometimes called "healthtech" or "healthsec"--is enmeshed with security and privacy via usability, performance, and cost-effectiveness issues. It is multidisciplinary, distributed, and complex--nd it also involves many competing stakeholders and interests.

file

Visible to the public arch2015spec.bib

file

Visible to the public Supporting Heterogeneity in Cyber-Physical Systems Architectures

Abstract: Cyber-physical systems (CPS) are heterogeneous, because they tightly couple computation, communication and control along with physical dynamics, which are traditionally considered separately. Without a comprehensive modeling formalism, model-based development of CPS involves using a multitude of models in a variety of formalisms that capture various aspects of the system design, such as software design, networking design, physical models, and protocol design.