Home

WHY RESILIENCE?

We used to model network contingency with a single failure of components. Such reliability measure can be further studied with extensive combinatorial events where a catastrophic disruption could massively destruct infrastructures. It is imperative the models are extended in a holistic manner to address unexpected consequences and introduce grid flexibility and robustness with distributed autonomy when major part of the network is compromised.


Find out more




Interdependencies
42 mins ago

RT @ICC_MTU: Congratulations to these ICC members on their recent promotions! Full Prof.: Chee-Wooi Ten and Shane Mueller (CLS). Assoc. Pro…

Read More


Interdependencies
4 weeks ago

CBS is once again pushing this very important subject of cyberwarfare in height of 2022 Russian war on Ukraine and the tactics they used can be here in America’s critical infrastructure

Read More


Interdependencies
2 months ago

CBS has recently promoted the awareness of cyberwar upon the nation’s critical infrastructure. This is for general audience.

Read More


Interdependencies
2 months ago

Our relay contingency framework, entitled “Cascading Verification and Mitigation Initiated by the Switching Attacks through Compromised Digital Relays,” has been accepted for publication. Kudos to Dr. Koji Yamashita for leading the efforts in this research!

Read More


Interdependencies
3 months ago

There are concerns why utilities should worry now on grid security and integrity

Read More


Interdependencies
3 months ago

Prof. Ten completed MTU site I-Corps and visited Consumer Electronics Show (CES) 2022 in Las Vegas for reaching out to more computer component vendors and angel investors for understanding current technologies and market needs out there.

Read More


Interdependencies
3 months ago

Prof. Chee-Wooi Ten works with PI Kory Hedman of Arizona State University for Alfred P. Sloan foundation’s PSERC Summer Transformation School. The total project value is $250,000.

Read More


Interdependencies
4 months ago

RT @EprcIsu: TODAY: Join us Tuesday, Jan. 25, at 1 p.m. for a PSERC Webinar with Chee-Wooi Ten of @mtuECE! The topic is “Strategic Investme…

Read More


Interdependencies
4 months ago

PSERC has begun the Spring 2022 semester webinars:

Read More


Interdependencies
4 months ago

Our recent publication has introduced a hurricane trajectory simulation that would enhance grid planning. T To read more, click this link to download the journal paper:

Read More


Interdependencies
5 years ago

RT @ForensicMag: Virtual Case Notes: Are Power Grids Prepared to Withstand Cyber Threats? https://t.co/QKQOoM69er

Read More


Interdependencies
5 years ago

Congratulations to Mr. Zhiyuan Yang who is a recipient of the
2017 Outstanding Teaching Award in @mtuECE department.

Read More

How big is the malware threat?


560,000 new malwares are detected everyday, and in excess of 1 billion malwares exist out there

How frequently companies are attacked?


Every minute, four companies fall victim to ransomware attacks. Trojans account for 58% of all computer malware

What's the threat malware pose?


20 million IoT malware attacks were detected in the first half of 2020

SECURITY has many definitions. From the Merriam-Webster dictionaries and power engineering definition,  the evolving term can be defined as one of the following:

01


Adequacy


Adequacy of energy supply from power engineering perspective

02


Danger/Threat Free


The state of being free from danger or threat of being secure electronically and physically

03


Guarantee


A thing deposited or pledged as a guarantee of the fulfillment of an undertaking or the repayment of a loan, to be forfeited in case of default.

04


Instrument of Investment


An instrument of investment in the form of a document (such as a stock certificate or bond) providing evidence of its ownership

Recent Power Supply
Chain Attacks

July 2010 | Stuxnet


Attack on SCADA control systems irreparably damaged centrifuge equipment at Iranian nuclear facilities

October 2010 | Metasploit


The security tools was developed to explore system vulnerabilities; hackers began using it to target Industrial Control System (ICS) devices

August 2012 | Shamoon


Virus destroys data as means to disrupt operations. Hit 15 state and private entities in Saudi Arabia

December 2015 | Ukraine


Power Grid 1 (BlackEnergy) Attackers deployed SCADA-related plugins to control ICS and turn off power to 230,000 residents of western Ukraine

Winter 2018 | Critical Infrastructure Vendors


US-CERT alerts state-sponsored attacks on critical infrastructure vendors


We hope you
share our vision

We are a synergistic group of the vibrant research program at Michigan Tech. Our goals are to integrate new discovery of knowledge and commercialize research. If you are interested in contributing to our research group. Feel free to reach out to CIResilience Research.

CIResilience Research