S
Siddharth Sridhar
Researcher at Iowa State University
Publications - 8
Citations - 2090
Siddharth Sridhar is an academic researcher from Iowa State University. The author has contributed to research in topics: SCADA & Electric power system. The author has an hindex of 8, co-authored 8 publications receiving 1713 citations.
Papers
More filters
Journal ArticleDOI
Cyber–Physical System Security for the Electric Power Grid
TL;DR: The significance of cyber infrastructure security in conjunction with power application security to prevent, mitigate, and tolerate cyber attacks is highlighted and a layered approach is introduced to evaluating risk based on the security of both the physical power applications and the supporting cyber infrastructure.
Journal ArticleDOI
Model-Based Attack Detection and Mitigation for Automatic Generation Control
TL;DR: A general framework to the application of attack resilient control to power systems as a composition of smart attack detection and mitigation is proposed and a model-based anomaly detection and attack mitigation algorithm is developed for AGC.
Journal ArticleDOI
Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid
TL;DR: This paper provides an overview of a smart grid security testbed, including the set of control, communication, and physical system components required to provide an accurate cyber-physical environment, and introduces the PowerCyber testbed at Iowa State University.
Proceedings ArticleDOI
Data integrity attacks and their impacts on SCADA control system
Siddharth Sridhar,G. Manimaran +1 more
TL;DR: Impact on the physical system is estimated by magnitude of load-generation imbalance and frequency deviation after a successful attack on the Automatic Generation Control (AGC) loop.
Proceedings ArticleDOI
Development of the PowerCyber SCADA security testbed
Adam Hahn,Ben Kregel,Manimaran Govindarasu,Justin Fitzpatrick,Rafi Adnan,Siddharth Sridhar,Michael Higdon +6 more
TL;DR: The design and implementation of the testbed are documents while proposing cyber attack scenarios which will negatively affect grid operations and the results of an initial cyber vulnerability assessment are documents to evaluate the security posture of the current design.