1 code implementation • 11 Sep 2023 • Amr S. Mohamed, Sumin Lee, Deepa Kundur
The ongoing modernization of the power system, involving new equipment installations and upgrades, exposes the power system to the introduction of malware into its operation through supply chain attacks.
no code implementations • 28 Mar 2023 • Amr S. Mohamed, Deepa Kundur
Moreover our method can be employed to generate data to inform the design of defense strategies and develop attack detection methods.
no code implementations • 3 Mar 2023 • Amr S. Mohamed, Mohsen Khalaf, Deepa Kundur
The tight coupling between communication and control in cyber-physical systems is necessary to enable the complex regulation required to operate these systems.
no code implementations • 27 Feb 2023 • Amr S. Mohamed, Deepa Kundur, Mohsen Khalaf
However, given the safety-criticality of protection, the algorithms used to analyze this data must be stable, transparent, and easily interpretable to ensure the reliability of the protection decisions.
no code implementations • 17 Aug 2021 • Amr S. Mohamed, Ali Abdelkader, Mohamed Anany, Omar El-Behady, Muhammad Faisal, Asser Hangal, Hesham M. Eraqi, Mohamed N. Moustafa
LiDARs and cameras are the two main sensors that are planned to be included in many announced autonomous vehicles prototypes.