security

file

Visible to the public Foundations Of Resilient CybEr-physical Systems (FORCES)

Abstract:

Cyber-Physical Systems (CPS) are being increasingly deployed in critical infrastructures such as electric-power, water, transportation, and other networks. These deployments are facilitating real-time monitoring and closed-loop control by exploiting the advances in wireless sensor-actuator networks, the internet of "everything," data-driven analytics, and machine-to-machine interfaces. CPS operations depend on the synergy of computational and physical components.

file

Visible to the public Preserving Confidentiality of Sensitive Information in Power System Models

Abstract:

The electric power grid is a critical infrastructure that is vulnerable to physical and cyber attacks. As a result, data describing grid topology and components is considered sensitive information. There is also increasing need to foster cooperation among the participants in microgrid-enabled electric marketplace.

file

Visible to the public Preserving Confidentiality of Sensitive Information in Power System Models

Abstract:

The electric power grid is a critical infrastructure that is vulnerable to physical and cyber attacks. As a result, data describing grid topology and components is considered sensitive information. There is also increasing need to foster cooperation among the participants in microgrid-enabled electric marketplace.

file

Visible to the public Towards Secure Networked Cyber-Physical Systems: A Theoretic Framework with Bounded Rationality

Securing critical networked cyber-physical systems (NCPSs) such as the power grid or transportation systems has emerged as a major national and global priority. The networked nature of such systems renders them vulnerable to a range of attacks both in cyber and physical domains as corroborated by recent threats such as the Energetic Bear virus.

file

Visible to the public Deploying the Security Behavior Observatory: An Infrastructure for Long-term Monitoring of Client Machines

Abstract: Much of the data researchers usually collect about users' privacy and security behavior comes from short-term studies and focuses on specific, narrow activities. We present a design architecture and deployment of the Security Behavior Observatory (SBO), a client-server infrastructure designed to collect a wide array of data on user and computer security- and privacy-related behavior from a panel of hundreds of participants over several years. The SBO infrastructure had to be carefully designed to fulfill several requirements.