A Novel Vetting Approach to Cybersecurity Verification in Energy Grid Systems

Kalyan Perumalla, Juan Lopez, Maksudul Alam, Olivera Kotevska, Michael Hempel, Hamid Sharif

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

The cybersecurity auditing for Operation Technology is critical and has been largely missing from the cybersecurity research, especially in the energy sector. In this paper, we present a novel 'cybersecurity vetting' approach (CYVET) to the problem of verification and validation of cybersecurity in complex cyber-physical installations underlying modern energy grid systems.

Original languageEnglish
Title of host publication2020 IEEE Kansas Power and Energy Conference, KPEC 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728153919
DOIs
StatePublished - Jul 2020
Event2020 IEEE Kansas Power and Energy Conference, KPEC 2020 - Manhattan, United States
Duration: Jul 13 2020Jul 14 2020

Publication series

Name2020 IEEE Kansas Power and Energy Conference, KPEC 2020

Conference

Conference2020 IEEE Kansas Power and Energy Conference, KPEC 2020
Country/TerritoryUnited States
CityManhattan
Period07/13/2007/14/20

Funding

This manuscript has been authored by UT-Battelle, LLC under Contract No. DE-AC05-00OR22725 with the U.S. Department of Energy. The United States Government retains and the publisher, by accepting the article for publication, acknowledges that the United States Government retains a non-exclusive, paid-up, irrevocable, worldwide license to publish or reproduce the published form of this manuscript, or allow others to do so, for United States Government purposes. The Department of Energy will provide public access to these results of federally sponsored research in accordance with the DOE Public Access Plan (http://energy.gov/downloads/doe-public-access-plan).

FundersFunder number
U.S. Department of Energy

    Fingerprint

    Dive into the research topics of 'A Novel Vetting Approach to Cybersecurity Verification in Energy Grid Systems'. Together they form a unique fingerprint.

    Cite this