no code implementations • 27 Jun 2023 • Ioannis Zografopoulos, Charalambos Konstantinou
The decentralization of modern power systems challenges the hierarchical structure of the electric grid and requires the implementation of automated schemes that can overcome adverse conditions.
no code implementations • 15 Apr 2023 • Kalinath Katuri, Ioannis Zografopoulos, Ha Thi Nguyen, Charalambos Konstantinou
Smart grid advancements and the increased integration of digital devices have transformed the existing power grid into a cyber-physical energy system.
no code implementations • 25 Apr 2022 • Ioannis Zografopoulos, Panagiotis Karamichailidis, Andreas T. Procopiou, Fei Teng, George C. Konstantopoulos, Charalambos Konstantinou
In this paper, we present a mitigation methodology that leverages battery energy storage system (BESS) resources in coordination with microgrid (MG) ancillary services to maintain power system operations during cyberattacks.
no code implementations • 20 Feb 2022 • Suman Rath, Ioannis Zografopoulos, Pedro P. Vergara, Vassilis C. Nikolaidis, Charalambos Konstantinou
We investigate the rootkits' precompromise stage involving the deployment to multiple system locations and aggregation of system-specific information to build a neural network-based virtual data-driven model (VDDM) of the system.
no code implementations • 9 Apr 2021 • Xiaorui Liu, Juan Ospina, Ioannis Zografopoulos, Alonzo Russell, Charalambos Konstantinou
Namely, the provided acceleration can be used for improving system scheduling, assessing system vulnerabilities, and predicting system disruptions in real-time systems.
no code implementations • 5 Feb 2021 • Ioannis Zografopoulos, Charalambos Konstantinou, Nektarios Georgios Tsoutsos, Dan Zhu, Robert Broadwater
In this paper, we examine the impact of cyberattacks in an integrated transmission and distribution (T&D) power grid model with distributed energy resource (DER) integration.
no code implementations • 25 Jan 2021 • Ioannis Zografopoulos, Juan Ospina, Xiaorui Liu, Charalambos Konstantinou
Leveraging the threat model formulation, we present a CPS framework designed to delineate the hardware, software, and modeling resources required to simulate the CPS and construct high-fidelity models which can be used to evaluate the system's performance under adverse scenarios.
Cryptography and Security Systems and Control Systems and Control