Person:
Meliopoulos,
A. P. Sakis
Meliopoulos,
A. P. Sakis
Permanent Link
Associated Organization(s)
Organizational Unit
ORCID
ArchiveSpace Name Record
17 results
Publication Search Results
Now showing
1 - 10 of 17
-
ItemEnergy System Cyber Security: An Overview(Georgia Institute of Technology, 2019-08-23) Meliopoulos, A. P. SakisThe electric energy grid is a recognized critical infrastructure. It is vulnerable to self-disturbances as well as cyber-attacks. In particular cyber-attacks can cause from mild disruptions to serious damage that may take months or years to repair. The last is a serious threat to the security of the electric energy grid and the nation. We will present the cyber-physical infrastructure of the electric energy grid and the existing vulnerabilities. We will industry effort to secure the electric energy system as well as research activities to harden the system. In particular we will focus on methods which track the state of the system to compare cyber activity to the status of the system. These methods have a higher success performance to data based methods.
-
ItemEnergy System Cybersecurity and Operational Reliability(Georgia Institute of Technology, 2017-11-03) Meliopoulos, A. P. SakisThe electric energy grid is a recognized critical infrastructure. It is vulnerable to self-disturbances as well as cyber-attacks. In particular cyber-attacks can cause from mild disruptions to serious damage that may take months or years to repair. The last is a serious threat to the security of the electric energy grid and the nation. We will present the cyber-physical infrastructure of the electric energy grid and the existing vulnerabilities. We will discuss vulnerability scenarios, activities at the power industry sector to harden the system against cyber-attacks and recent research to detect cyber-attacks in real time. We present an infrastructure that enables simultaneous cyber security and operational security. The approach monitors the dynamic state of the power system and leverages this knowledge to detect (a) data attacks and (b) detrimental to the system commands (that may originate from a malicious attacker or by operator error). Commands are intercepted and authenticated on the basis of the effect of the command to the dynamics and security of the system. The overall intrusion detection system is loaded to the existing cyber infrastructure at the substations of the electric power grid. It is a distributed system and therefore it is scalable to any size electric energy grid.
-
ItemGeorgia Tech proposal to join PSerc(Georgia Institute of Technology, 2010-01-01) Meliopoulos, A. P. Sakis
-
ItemAssessment of transmission system harmonics(Georgia Institute of Technology, 1998) Meliopoulos, A. P. Sakis
-
ItemBulk transmission system reliability evaluation for large scale system(Georgia Institute of Technology, 1991) Meliopoulos, A. P. Sakis
-
ItemBlock travel grant for International Conference on Harmonics in Power Systems, Budapest, Hungary, October 4-6, 1990(Georgia Institute of Technology, 1990) Meliopoulos, A. P. Sakis
-
ItemComposite power system simulation method(Georgia Institute of Technology, 1989) Meliopoulos, A. P. Sakis
-
ItemEffects of geomagnetic disturbances on electric power transmission systems(Georgia Institute of Technology, 1989) Meliopoulos, A. P. Sakis
-
ItemWorkshop on "Research needs in power system operations and planning"(Georgia Institute of Technology, 1989) Meliopoulos, A. P. Sakis
-
ItemBulk transmission system reliability evaluation(Georgia Institute of Technology, 1988) Meliopoulos, A. P. Sakis