WHY RESILIENCE?
We used to model network contingency with a single failure of components. Such reliability measure can be further studied with extensive combinatorial events where a catastrophic disruption could massively destruct infrastructures. It is imperative the models are extended in a holistic manner to address unexpected consequences and introduce grid flexibility and robustness with distributed autonomy when major part of the network is compromised.
Find out more
Interdependencies
42 mins ago
RT @ICC_MTU: Congratulations to these ICC members on their recent promotions! Full Prof.: Chee-Wooi Ten and Shane Mueller (CLS). Assoc. Pro…
Read More
Interdependencies
4 weeks ago
CBS is once again pushing this very important subject of cyberwarfare in height of 2022 Russian war on Ukraine and the tactics they used can be here in America’s critical infrastructure
Read More
Interdependencies
2 months ago
CBS has recently promoted the awareness of cyberwar upon the nation’s critical infrastructure. This is for general audience.
Read More
Interdependencies
2 months ago
Our relay contingency framework, entitled “Cascading Verification and Mitigation Initiated by the Switching Attacks through Compromised Digital Relays,” has been accepted for publication. Kudos to Dr. Koji Yamashita for leading the efforts in this research!
Read More
Interdependencies
3 months ago
There are concerns why utilities should worry now on grid security and integrity
Read More
Interdependencies
3 months ago
Prof. Ten completed MTU site I-Corps and visited Consumer Electronics Show (CES) 2022 in Las Vegas for reaching out to more computer component vendors and angel investors for understanding current technologies and market needs out there.
Read More
Interdependencies
3 months ago
Prof. Chee-Wooi Ten works with PI Kory Hedman of Arizona State University for Alfred P. Sloan foundation’s PSERC Summer Transformation School. The total project value is $250,000.
Read More
Interdependencies
4 months ago
RT @EprcIsu: TODAY: Join us Tuesday, Jan. 25, at 1 p.m. for a PSERC Webinar with Chee-Wooi Ten of @mtuECE! The topic is “Strategic Investme…
Read More
Interdependencies
4 months ago
PSERC has begun the Spring 2022 semester webinars:
Read More
Interdependencies
4 months ago
Our recent publication has introduced a hurricane trajectory simulation that would enhance grid planning. T To read more, click this link to download the journal paper:
Read More
Interdependencies
5 years ago
RT @ForensicMag: Virtual Case Notes: Are Power Grids Prepared to Withstand Cyber Threats? https://t.co/QKQOoM69er
Read More
Interdependencies
5 years ago
Congratulations to Mr. Zhiyuan Yang who is a recipient of the
2017 Outstanding Teaching Award in @mtuECE department.
How big is the malware threat?
560,000 new malwares are detected everyday, and in excess of 1 billion malwares exist out there
How frequently companies are attacked?
Every minute, four companies fall victim to ransomware attacks. Trojans account for 58% of all computer malware
What's the threat malware pose?
20 million IoT malware attacks were detected in the first half of 2020
SECURITY has many definitions. From the Merriam-Webster dictionaries and power engineering definition, the evolving term can be defined as one of the following:
01
Adequacy
Adequacy of energy supply from power engineering perspective
02
Danger/Threat Free
The state of being free from danger or threat of being secure electronically and physically
03
Guarantee
A thing deposited or pledged as a guarantee of the fulfillment of an undertaking or the repayment of a loan, to be forfeited in case of default.
04
Instrument of Investment
An instrument of investment in the form of a document (such as a stock certificate or bond) providing evidence of its ownership
Recent Power Supply
Chain Attacks
July 2010 | Stuxnet
Attack on SCADA control systems irreparably damaged centrifuge equipment at Iranian nuclear facilities
October 2010 | Metasploit
The security tools was developed to explore system vulnerabilities; hackers began using it to target Industrial Control System (ICS) devices
August 2012 | Shamoon
Virus destroys data as means to disrupt operations. Hit 15 state and private entities in Saudi Arabia
December 2015 | Ukraine
Power Grid 1 (BlackEnergy) Attackers deployed SCADA-related plugins to control ICS and turn off power to 230,000 residents of western Ukraine
Winter 2018 | Critical Infrastructure Vendors
US-CERT alerts state-sponsored attacks on critical infrastructure vendors
We hope you
share our vision
We are a synergistic group of the vibrant research program at Michigan Tech. Our goals are to integrate new discovery of knowledge and commercialize research. If you are interested in contributing to our research group. Feel free to reach out to CIResilience Research.
CIResilience Research
EERC Building 235, 1400 Townsend Drive, Houghton, Michigan 49931-1295