<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CYVET | Kalyan Perumalla</title>
    <link>https://kalper.net/kp/tag/cyvet/</link>
      <atom:link href="https://kalper.net/kp/tag/cyvet/index.xml" rel="self" type="application/rss+xml" />
    <description>CYVET</description>
    <generator>Wowchemy (https://wowchemy.com)</generator><language>en-us</language><lastBuildDate>Fri, 01 Sep 2023 00:00:00 +0000</lastBuildDate>
    <image>
      <url>https://kalper.net/kp/media/logo_hu7c4e9283a16f91dce013794dd725bda5_36458_300x300_fit_lanczos_3.png</url>
      <title>CYVET</title>
      <link>https://kalper.net/kp/tag/cyvet/</link>
    </image>
    
    <item>
      <title>CYVET</title>
      <link>https://kalper.net/kp/items/projects/cyvet/</link>
      <pubDate>Sat, 01 Jan 2022 00:00:00 +0000</pubDate>
      <guid>https://kalper.net/kp/items/projects/cyvet/</guid>
      <description>&lt;p&gt;Our new &lt;strong&gt;Cyber-Physical Security Assurance Framework based on Semi-Supervised Vetting&lt;/strong&gt; applies the latest AI/ML and NLP technologies on hardware testbeds to advance the resilience of critical cyber-physical assets including electric grids and gas pipelines.&lt;/p&gt;
&lt;figure  id=&#34;figure-cyvet-pipeline&#34;&gt;
  &lt;div class=&#34;d-flex justify-content-center&#34;&gt;
    &lt;div class=&#34;w-100&#34; &gt;&lt;img alt=&#34;CYVET Pipeline&#34; srcset=&#34;
               /kp/items/projects/cyvet/featured_hu49e5c033aceb1ecec1d2f8884dcf0b24_559404_14032cac5a2d742f7219da0c2cdf3edb.png 400w,
               /kp/items/projects/cyvet/featured_hu49e5c033aceb1ecec1d2f8884dcf0b24_559404_c93b18b1e487971e43c1d606cef55935.png 760w,
               /kp/items/projects/cyvet/featured_hu49e5c033aceb1ecec1d2f8884dcf0b24_559404_1200x1200_fit_lanczos_3.png 1200w&#34;
               src=&#34;https://kalper.net/kp/kp/items/projects/cyvet/featured_hu49e5c033aceb1ecec1d2f8884dcf0b24_559404_14032cac5a2d742f7219da0c2cdf3edb.png&#34;
               width=&#34;760&#34;
               height=&#34;158&#34;
               loading=&#34;lazy&#34; data-zoomable /&gt;&lt;/div&gt;
  &lt;/div&gt;&lt;figcaption&gt;
      CYVET Pipeline
    &lt;/figcaption&gt;&lt;/figure&gt;
&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;

&lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;
  &lt;iframe src=&#34;https://www.youtube.com/embed/xP4t4LYcbDY&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; allowfullscreen title=&#34;YouTube Video&#34;&gt;&lt;/iframe&gt;
&lt;/div&gt;

&lt;h2 id=&#34;organization&#34;&gt;Organization&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Sponsor&lt;/strong&gt;: US Department of Energy (DOE)
&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Office&lt;/em&gt;: Cybersecurity, Energy Security, and Emergency Response (CESER)&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Program&lt;/em&gt;: Cybersecurity for Energy Delivery Systems (CEDS)&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Award&lt;/em&gt;: &lt;a href=&#34;https://www.energy.gov/ceser/cybersecurity-energy-delivery-systems-2019-research-call-awardees&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;CESER&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Prime&lt;/strong&gt;: Oak Ridge National Laboratory (ORNL)
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Subcontract&lt;/strong&gt;: University of Nebraska-Lincoln (UNL)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Period&lt;/strong&gt;: 2019-2023&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;gallery&#34;&gt;Gallery&lt;/h2&gt;








    


&lt;div class=&#34;gallery&#34; style=&#34;text-align: center;&#34;&gt;
    
        
        

        

        
        

        &lt;a data-fancybox=&#34;gallery-cyvet&#34; href=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Hardware-Testbed.png&#34; &gt;
            &lt;img src=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Hardware-Testbed_huafd5a1b847903cded1f365747f3bff19_325867_500x0_resize_q90_lanczos_3.png&#34; loading=&#34;lazy&#34; alt=&#34;CYVET-Hardware-Testbed.png&#34; width=&#34;500&#34; height=&#34;226&#34;&gt;
        &lt;/a&gt;
    
        
        

        

        
        

        &lt;a data-fancybox=&#34;gallery-cyvet&#34; href=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Kickoff-1.jpg&#34; &gt;
            &lt;img src=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Kickoff-1_huc033fc03d3453cc56a45fe024cb34c2e_1287958_500x0_resize_q90_lanczos.jpg&#34; loading=&#34;lazy&#34; alt=&#34;CYVET-Kickoff-1.jpg&#34; width=&#34;500&#34; height=&#34;375&#34;&gt;
        &lt;/a&gt;
    
        
        

        

        
        

        &lt;a data-fancybox=&#34;gallery-cyvet&#34; href=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Kickoff-2.jpg&#34; &gt;
            &lt;img src=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Kickoff-2_hub9a1940b8b7b5cf06d7f7be35316fc66_1613997_500x0_resize_q90_lanczos.jpg&#34; loading=&#34;lazy&#34; alt=&#34;CYVET-Kickoff-2.jpg&#34; width=&#34;500&#34; height=&#34;375&#34;&gt;
        &lt;/a&gt;
    
        
        

        

        
        

        &lt;a data-fancybox=&#34;gallery-cyvet&#34; href=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Kickoff-3.jpg&#34; &gt;
            &lt;img src=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Kickoff-3_hu5be72667d9b92d9e8f718782d20c469e_1364219_500x0_resize_q90_lanczos.jpg&#34; loading=&#34;lazy&#34; alt=&#34;CYVET-Kickoff-3.jpg&#34; width=&#34;500&#34; height=&#34;375&#34;&gt;
        &lt;/a&gt;
    
        
        

        

        
        

        &lt;a data-fancybox=&#34;gallery-cyvet&#34; href=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Kickoff-4.jpg&#34; &gt;
            &lt;img src=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Kickoff-4_hu0356f55777deafade49c6695fceca509_1102778_500x0_resize_q90_lanczos.jpg&#34; loading=&#34;lazy&#34; alt=&#34;CYVET-Kickoff-4.jpg&#34; width=&#34;500&#34; height=&#34;336&#34;&gt;
        &lt;/a&gt;
    
        
        

        

        
        

        &lt;a data-fancybox=&#34;gallery-cyvet&#34; href=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Kickoff-5.jpg&#34; &gt;
            &lt;img src=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Kickoff-5_hu907dc728428ecf5fb7395a7712534466_2021004_500x0_resize_q90_lanczos.jpg&#34; loading=&#34;lazy&#34; alt=&#34;CYVET-Kickoff-5.jpg&#34; width=&#34;500&#34; height=&#34;237&#34;&gt;
        &lt;/a&gt;
    
        
        

        

        
        

        &lt;a data-fancybox=&#34;gallery-cyvet&#34; href=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Kickoff-6.jpg&#34; &gt;
            &lt;img src=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Kickoff-6_hu3a6dcd62c7918154487b4fe7ae02b3e1_2327727_500x0_resize_q90_lanczos.jpg&#34; loading=&#34;lazy&#34; alt=&#34;CYVET-Kickoff-6.jpg&#34; width=&#34;500&#34; height=&#34;300&#34;&gt;
        &lt;/a&gt;
    
        
        

        

        
        

        &lt;a data-fancybox=&#34;gallery-cyvet&#34; href=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Kickoff.jpg&#34; &gt;
            &lt;img src=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Kickoff_hu2b04d0bf111cddd97793b87f75aa790e_1087743_500x0_resize_q90_lanczos.jpg&#34; loading=&#34;lazy&#34; alt=&#34;CYVET-Kickoff.jpg&#34; width=&#34;500&#34; height=&#34;334&#34;&gt;
        &lt;/a&gt;
    
        
        

        

        
        

        &lt;a data-fancybox=&#34;gallery-cyvet&#34; href=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Pipeline.png&#34; &gt;
            &lt;img src=&#34;https://kalper.net/kp/kp/items/projects/cyvet/images/CYVET-Pipeline_hu49e5c033aceb1ecec1d2f8884dcf0b24_559404_500x0_resize_q90_lanczos_3.png&#34; loading=&#34;lazy&#34; alt=&#34;CYVET-Pipeline.png&#34; width=&#34;500&#34; height=&#34;104&#34;&gt;
        &lt;/a&gt;
    
&lt;/div&gt;

&lt;h2 id=&#34;related-publications&#34;&gt;Related Publications&lt;/h2&gt;
&lt;p&gt;OSTI.gov: &lt;a href=&#34;https://www.osti.gov/servlets/purl/1661247&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://www.osti.gov/servlets/purl/1661247&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;






  
    







  







  


&lt;div class=&#34;media stream-item&#34;&gt;
  &lt;div class=&#34;media-body&#34;&gt;

    &lt;div class=&#34;section-subheading article-title mb-0 mt-0&#34;&gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/publication/2021-11-04-jcp-cybert/&#34; &gt;CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model&lt;/a&gt;
    &lt;/div&gt;

    
    &lt;a href=&#34;https://kalper.net/kp/kp/publication/2021-11-04-jcp-cybert/&#34;  class=&#34;summary-link&#34;&gt;
      &lt;div class=&#34;article-style&#34;&gt;
        We introduce CyBERT, a cybersecurity feature claims classifier based on bidirectional encoder representations from transformers and a key component in our semi-automated cybersecurity vetting for industrial control systems (ICS)&amp;hellip;The results showed that CyBERT outperforms these models on the validation accuracy and the F1 score, validating CyBERT’s robustness and accuracy as a cybersecurity feature claims classifier.
      &lt;/div&gt;
    &lt;/a&gt;
    

    &lt;div class=&#34;stream-meta article-metadata&#34;&gt;

      

      
      &lt;div&gt;
        

  &lt;span &gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/kimia-ameri/&#34;&gt;Kimia Ameri&lt;/a&gt;&lt;/span&gt;, &lt;span &gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/michael-hempel/&#34;&gt;Michael Hempel&lt;/a&gt;&lt;/span&gt;, &lt;span &gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/hamid-sharif/&#34;&gt;Hamid Sharif&lt;/a&gt;&lt;/span&gt;, &lt;span &gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/juan-lopez/&#34;&gt;Juan Lopez&lt;/a&gt;&lt;/span&gt;, &lt;span class=&#34;author-highlighted&#34;&gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/kalyan-perumalla/&#34;&gt;Kalyan Perumalla&lt;/a&gt;&lt;/span&gt;
      &lt;/div&gt;
      
    &lt;/div&gt;

    
    &lt;div class=&#34;btn-links&#34;&gt;
      








  



&lt;a class=&#34;btn btn-outline-primary btn-page-header btn-sm&#34; href=&#34;https://kalper.net/kp/kp/publication/2021-11-04-jcp-cybert/2021-11-04-JCP-CyBERT.pdf&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;
  PDF
&lt;/a&gt;



&lt;a href=&#34;#&#34; class=&#34;btn btn-outline-primary btn-page-header btn-sm js-cite-modal&#34;
        data-filename=&#34;/kp/publication/2021-11-04-jcp-cybert/cite.bib&#34;&gt;
  Cite
&lt;/a&gt;













&lt;a class=&#34;btn btn-outline-primary btn-page-header btn-sm&#34; href=&#34;https://doi.org/10.3390/jcp1040031&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;
  DOI
&lt;/a&gt;



    &lt;/div&gt;
    

  &lt;/div&gt;
  &lt;div class=&#34;ml-3&#34;&gt;
    
    
    
    &lt;a href=&#34;https://kalper.net/kp/kp/publication/2021-11-04-jcp-cybert/&#34; &gt;
      &lt;img src=&#34;https://kalper.net/kp/kp/publication/2021-11-04-jcp-cybert/featured_hu808f2ae97b1b8d10a6e1d39b9814a7be_1124331_150x0_resize_lanczos_3.png&#34; alt=&#34;CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model&#34; loading=&#34;lazy&#34;&gt;
    &lt;/a&gt;
    
  &lt;/div&gt;
&lt;/div&gt;

  









  
    







  







  


&lt;div class=&#34;media stream-item&#34;&gt;
  &lt;div class=&#34;media-body&#34;&gt;

    &lt;div class=&#34;section-subheading article-title mb-0 mt-0&#34;&gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/publication/2021-04-28-satcps-trust/&#34; &gt;Trust-but-Verify in Cyber-Physical Systems&lt;/a&gt;
    &lt;/div&gt;

    
    &lt;a href=&#34;https://kalper.net/kp/kp/publication/2021-04-28-satcps-trust/&#34;  class=&#34;summary-link&#34;&gt;
      &lt;div class=&#34;article-style&#34;&gt;
        Cyber-physical systems span a wide spectrum, from long-lived legacy systems to more modern installations. Trust is an issue that arises across the spectrum, albeit with different variants of goals and constraints. On the one end of the spectrum, legacy systems are characterized by function-based designs in which trust is an implicitly in-built concept&amp;hellip;
      &lt;/div&gt;
    &lt;/a&gt;
    

    &lt;div class=&#34;stream-meta article-metadata&#34;&gt;

      

      
      &lt;div&gt;
        

  &lt;span class=&#34;author-highlighted&#34;&gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/kalyan-perumalla/&#34;&gt;Kalyan Perumalla&lt;/a&gt;&lt;/span&gt;&lt;i class=&#34;author-notes fas fa-info-circle&#34; data-toggle=&#34;tooltip&#34; title=&#34;Keynote&#34;&gt;&lt;/i&gt;
      &lt;/div&gt;
      
    &lt;/div&gt;

    
    &lt;div class=&#34;btn-links&#34;&gt;
      








  



&lt;a class=&#34;btn btn-outline-primary btn-page-header btn-sm&#34; href=&#34;https://kalper.net/kp/kp/publication/2021-04-28-satcps-trust/2021-04-28-SaTCPS-Trust.pdf&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;
  PDF
&lt;/a&gt;



&lt;a href=&#34;#&#34; class=&#34;btn btn-outline-primary btn-page-header btn-sm js-cite-modal&#34;
        data-filename=&#34;/kp/publication/2021-04-28-satcps-trust/cite.bib&#34;&gt;
  Cite
&lt;/a&gt;









  
  
    
  
&lt;a class=&#34;btn btn-outline-primary btn-page-header btn-sm&#34; href=&#34;https://kalper.net/kp/pubdocs/perumalla-acm-sat-cps-2021-08-18-PTS.pdf&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;
  Slides
&lt;/a&gt;





&lt;a class=&#34;btn btn-outline-primary btn-page-header btn-sm&#34; href=&#34;https://doi.org/10.1145/3445969.3450434&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;
  DOI
&lt;/a&gt;



    &lt;/div&gt;
    

  &lt;/div&gt;
  &lt;div class=&#34;ml-3&#34;&gt;
    
    
    
    &lt;a href=&#34;https://kalper.net/kp/kp/publication/2021-04-28-satcps-trust/&#34; &gt;
      &lt;img src=&#34;https://kalper.net/kp/kp/publication/2021-04-28-satcps-trust/featured_hu86cc9740721728098d325e877b0cbe6d_7865224_150x0_resize_lanczos_3.png&#34; alt=&#34;Trust-but-Verify in Cyber-Physical Systems&#34; loading=&#34;lazy&#34;&gt;
    &lt;/a&gt;
    
  &lt;/div&gt;
&lt;/div&gt;

  









  
    







  







  


&lt;div class=&#34;media stream-item&#34;&gt;
  &lt;div class=&#34;media-body&#34;&gt;

    &lt;div class=&#34;section-subheading article-title mb-0 mt-0&#34;&gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/publication/2021-02-01-iccws-tallyvet/&#34; &gt;Smart Semi-Supervised Accumulation of Large Repositories for Industrial Control Systems Device Information&lt;/a&gt;
    &lt;/div&gt;

    
    &lt;a href=&#34;https://kalper.net/kp/kp/publication/2021-02-01-iccws-tallyvet/&#34;  class=&#34;summary-link&#34;&gt;
      &lt;div class=&#34;article-style&#34;&gt;
        A solution is needed for vetting the vendor-supplied feature claims and their adherence to cybersecurity requirements and standards. We are presently engaged in an effort to develop such a system. This paper demonstrates one vital aspect of this effort in proposing an end-to-end framework to accumulate a large repository of ICS device information for this vetting system, curate the dataset, and conduct extensive processing. This framework is designed to use web scraping, data analytics and Natural Language Processing (NLP) techniques to identify vendor websites, automate the collection of website-accessible documents and automatically derive metadata from them for identification of product documents relevant to the repository&amp;hellip;
      &lt;/div&gt;
    &lt;/a&gt;
    

    &lt;div class=&#34;stream-meta article-metadata&#34;&gt;

      

      
      &lt;div&gt;
        

  &lt;span &gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/kimia-ameri/&#34;&gt;Kimia Ameri&lt;/a&gt;&lt;/span&gt;, &lt;span &gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/michael-hempel/&#34;&gt;Michael Hempel&lt;/a&gt;&lt;/span&gt;, &lt;span &gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/hamid-sharif/&#34;&gt;Hamid Sharif&lt;/a&gt;&lt;/span&gt;, &lt;span &gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/juan-lopez/&#34;&gt;Juan Lopez&lt;/a&gt;&lt;/span&gt;, &lt;span class=&#34;author-highlighted&#34;&gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/kalyan-perumalla/&#34;&gt;Kalyan Perumalla&lt;/a&gt;&lt;/span&gt;
      &lt;/div&gt;
      
    &lt;/div&gt;

    
    &lt;div class=&#34;btn-links&#34;&gt;
      








  



&lt;a class=&#34;btn btn-outline-primary btn-page-header btn-sm&#34; href=&#34;https://kalper.net/kp/kp/publication/2021-02-01-iccws-tallyvet/2021-02-01-ICCWS-TallyVet.pdf&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;
  PDF
&lt;/a&gt;

















    &lt;/div&gt;
    

  &lt;/div&gt;
  &lt;div class=&#34;ml-3&#34;&gt;
    
    
    
    &lt;a href=&#34;https://kalper.net/kp/kp/publication/2021-02-01-iccws-tallyvet/&#34; &gt;
      &lt;img src=&#34;https://kalper.net/kp/kp/publication/2021-02-01-iccws-tallyvet/featured_hu5d766d05d0f1726f60e134f155135032_568822_150x0_resize_lanczos_3.png&#34; alt=&#34;Smart Semi-Supervised Accumulation of Large Repositories for Industrial Control Systems Device Information&#34; loading=&#34;lazy&#34;&gt;
    &lt;/a&gt;
    
  &lt;/div&gt;
&lt;/div&gt;

  









  
    







  







  


&lt;div class=&#34;media stream-item&#34;&gt;
  &lt;div class=&#34;media-body&#34;&gt;

    &lt;div class=&#34;section-subheading article-title mb-0 mt-0&#34;&gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/publication/2020-07-13-kpec-cyvet/&#34; &gt;A Novel Vetting Approach to Cybersecurity Verification in Energy Grid Systems&lt;/a&gt;
    &lt;/div&gt;

    
    &lt;a href=&#34;https://kalper.net/kp/kp/publication/2020-07-13-kpec-cyvet/&#34;  class=&#34;summary-link&#34;&gt;
      &lt;div class=&#34;article-style&#34;&gt;
        The cybersecurity auditing for Operation Technology is critical and has been largely missing from the cybersecurity research, especially in the energy sector. In this paper, we present a novel “cybersecurity vetting” approach (CYVET) to the problem of verification and validation of cybersecurity in complex cyber-physical installations underlying modern energy grid systems.
      &lt;/div&gt;
    &lt;/a&gt;
    

    &lt;div class=&#34;stream-meta article-metadata&#34;&gt;

      

      
      &lt;div&gt;
        

  &lt;span class=&#34;author-highlighted&#34;&gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/kalyan-perumalla/&#34;&gt;Kalyan Perumalla&lt;/a&gt;&lt;/span&gt;, &lt;span &gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/juan-lopez/&#34;&gt;Juan Lopez&lt;/a&gt;&lt;/span&gt;, &lt;span &gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/maksudul-alam/&#34;&gt;Maksudul Alam&lt;/a&gt;&lt;/span&gt;, &lt;span &gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/olivera-kotevska/&#34;&gt;Olivera Kotevska&lt;/a&gt;&lt;/span&gt;, &lt;span &gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/michael-hempel/&#34;&gt;Michael Hempel&lt;/a&gt;&lt;/span&gt;, &lt;span &gt;
      &lt;a href=&#34;https://kalper.net/kp/kp/author/hamid-sharif/&#34;&gt;Hamid Sharif&lt;/a&gt;&lt;/span&gt;
      &lt;/div&gt;
      
    &lt;/div&gt;

    
    &lt;div class=&#34;btn-links&#34;&gt;
      








  



&lt;a class=&#34;btn btn-outline-primary btn-page-header btn-sm&#34; href=&#34;https://kalper.net/kp/kp/publication/2020-07-13-kpec-cyvet/2020-07-13-KPEC-CYVET.pdf&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;
  PDF
&lt;/a&gt;















&lt;a class=&#34;btn btn-outline-primary btn-page-header btn-sm&#34; href=&#34;https://doi.org/10.1109/KPEC47870.2020.9167562&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;
  DOI
&lt;/a&gt;



    &lt;/div&gt;
    

  &lt;/div&gt;
  &lt;div class=&#34;ml-3&#34;&gt;
    
    
    
    &lt;a href=&#34;https://kalper.net/kp/kp/publication/2020-07-13-kpec-cyvet/&#34; &gt;
      &lt;img src=&#34;https://kalper.net/kp/kp/publication/2020-07-13-kpec-cyvet/featured_hucde365530fd60c0c79e4592fd7c0816b_696569_150x0_resize_lanczos_3.png&#34; alt=&#34;A Novel Vetting Approach to Cybersecurity Verification in Energy Grid Systems&#34; loading=&#34;lazy&#34;&gt;
    &lt;/a&gt;
    
  &lt;/div&gt;
&lt;/div&gt;

  

&lt;/p&gt;
&lt;h2 id=&#34;additional-background&#34;&gt;Additional Background&lt;/h2&gt;
&lt;p&gt;The cybersecurity auditing for Operation Technology (OT) is critical and has been largely missing from the cybersecurity research, especially in the energy sector. CYVET is a novel &amp;ldquo;cybersecurity vetting&amp;rdquo; approach (CYVET) to the problem of verification and validation of cybersecurity in complex cyber-physical installations underlying modern energy grid systems.&lt;/p&gt;
&lt;p&gt;In Information Technology (IT), cybersecurity auditing is a widespread practice to ensure privacy, security, and trust.  However, for the field of Operation Technology (OT) as used in electric energy systems, this is a relatively novel concept. In fact, OT itself only recently began to embrace IT principles, with the push for automation and centralized control driving this development. OT operators are simply not yet used to the idea of cybersecurity. To ameliorate the gap, product vendors for field devices are advancing the field by incorporating more and more security features into their products. However, customers are often either unaware of them, or do not use them, or cannot use them because of unsatisfied device ecosystem dependencies.  There is thus a disconnect between what is offered, what is possible post-deployment, and what the customer expects.&lt;/p&gt;
&lt;p&gt;There is a vast lack of cybersecurity oversight and insight, from a certification and a customer perspective alike, for OT systems in the energy sector. With new features constantly being added to new and existing products, customers are predominantly unaware what their purchased solutions are capable of, or not capable of. They often do not know if their current systems meet their own cybersecurity requirements as well as industry standards. Many of these facets not only indirectly depend on device capabilities, but also on device deployment decisions – Does a newly added feature work in an existing context? Can it be used as envisioned? Does it interfere with other cybersecurity requirements? Does it produce side effects that may interfere with other requirements?&lt;/p&gt;
&lt;p&gt;Hence, what is needed is a security vetting system designed to provide insight into deployed systems, the match of capabilities to requirements, adherence to certification requirements, and so forth. There are few systems currently available that provide these energy grid security capabilities. OT systems are increasingly cyber-enabled, increasingly complex, and increasingly interdependent. This rapidly accelerating trend poses a clear risk for asset owners to lose confidence and for cybersecurity risk to go undiscovered until exploited by malicious parties.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>A Flexible OT Testbed for Evaluating On-Device Implementations of IEC-61850 GOOSE</title>
      <link>https://kalper.net/kp/publication/2023-09-ijcip/</link>
      <pubDate>Fri, 01 Sep 2023 00:00:00 +0000</pubDate>
      <guid>https://kalper.net/kp/publication/2023-09-ijcip/</guid>
      <description>&lt;ul&gt;
&lt;li&gt;Open Access:
&lt;ul&gt;
&lt;li&gt;Journal: &lt;a href=&#34;https://www.sciencedirect.com/science/article/pii/S1874548223000318&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://www.sciencedirect.com/science/article/pii/S1874548223000318&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;PDF: &lt;a href=&#34;https://www.sciencedirect.com/science/article/pii/S1874548223000318/pdfft?md5=4606c01cd9fbd3efc0e6b73a074b8910&amp;amp;pid=1-s2.0-S1874548223000318-main.pdf&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://www.sciencedirect.com/science/article/pii/S1874548223000318/pdfft?md5=4606c01cd9fbd3efc0e6b73a074b8910&amp;amp;pid=1-s2.0-S1874548223000318-main.pdf&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
</description>
    </item>
    
    <item>
      <title>A Testbed for Evaluating Performance and Cybersecurity Implications of IEC-61850 GOOSE Hardware Implementations</title>
      <link>https://kalper.net/kp/publication/2023-01-08-ccnc/</link>
      <pubDate>Sun, 08 Jan 2023 00:00:00 +0000</pubDate>
      <guid>https://kalper.net/kp/publication/2023-01-08-ccnc/</guid>
      <description></description>
    </item>
    
    <item>
      <title>Survey of Cybersecurity Governance, Threats, and Countermeasures for the Power Grid </title>
      <link>https://kalper.net/kp/publication/2022-10-mdpi-survey/</link>
      <pubDate>Thu, 20 Oct 2022 00:00:00 +0000</pubDate>
      <guid>https://kalper.net/kp/publication/2022-10-mdpi-survey/</guid>
      <description></description>
    </item>
    
    <item>
      <title>Design of a Novel Information System for Semi-Automated Management of Cybersecurity in Industrial Control Systems</title>
      <link>https://kalper.net/kp/publication/2022-06-22-tmis-cyvet/</link>
      <pubDate>Wed, 22 Jun 2022 00:00:00 +0000</pubDate>
      <guid>https://kalper.net/kp/publication/2022-06-22-tmis-cyvet/</guid>
      <description>&lt;p&gt;Article is &lt;a href=&#34;https://doi.acm.org?doi=3546580&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;available as Open Access&lt;/a&gt;&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>An Accuracy-Maximization Approach for Claims Classifiers in Document Content Analytics for Cybersecurity</title>
      <link>https://kalper.net/kp/publication/2022-06-15-jcp-cyvet/</link>
      <pubDate>Wed, 15 Jun 2022 00:00:00 +0000</pubDate>
      <guid>https://kalper.net/kp/publication/2022-06-15-jcp-cyvet/</guid>
      <description>&lt;ul&gt;
&lt;li&gt;Open Access: &lt;a href=&#34;https://www.mdpi.com/2624-800X/2/2/22&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://www.mdpi.com/2624-800X/1/4/31&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
</description>
    </item>
    
    <item>
      <title>CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model</title>
      <link>https://kalper.net/kp/publication/2021-11-04-jcp-cybert/</link>
      <pubDate>Thu, 04 Nov 2021 00:00:00 +0000</pubDate>
      <guid>https://kalper.net/kp/publication/2021-11-04-jcp-cybert/</guid>
      <description>&lt;ul&gt;
&lt;li&gt;Open Access: &lt;a href=&#34;https://www.mdpi.com/2624-800X/1/4/31&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://www.mdpi.com/2624-800X/1/4/31&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;This article belongs to the &lt;a href=&#34;https://www.mdpi.com/journal/jcp/special_issues/MachineLearning_Cybersecurity&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Special Issue Machine Learning and Data Analytics for Cyber Security&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
</description>
    </item>
    
    <item>
      <title>Trust-but-Verify in Cyber-Physical Systems</title>
      <link>https://kalper.net/kp/publication/2021-04-28-satcps-trust/</link>
      <pubDate>Wed, 28 Apr 2021 00:00:00 +0000</pubDate>
      <guid>https://kalper.net/kp/publication/2021-04-28-satcps-trust/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://dl.acm.org/doi/abs/10.1145/3445969.3450434&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://dl.acm.org/doi/abs/10.1145/3445969.3450434&lt;/a&gt;&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>Smart Semi-Supervised Accumulation of Large Repositories for Industrial Control Systems Device Information</title>
      <link>https://kalper.net/kp/publication/2021-02-01-iccws-tallyvet/</link>
      <pubDate>Mon, 01 Feb 2021 00:00:00 +0000</pubDate>
      <guid>https://kalper.net/kp/publication/2021-02-01-iccws-tallyvet/</guid>
      <description></description>
    </item>
    
    <item>
      <title>A Novel Vetting Approach to Cybersecurity Verification in Energy Grid Systems</title>
      <link>https://kalper.net/kp/publication/2020-07-13-kpec-cyvet/</link>
      <pubDate>Mon, 13 Jul 2020 00:00:00 +0000</pubDate>
      <guid>https://kalper.net/kp/publication/2020-07-13-kpec-cyvet/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://www.osti.gov/servlets/purl/1661247&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://www.osti.gov/servlets/purl/1661247&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://ieeexplore.ieee.org/abstract/document/9167562&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;https://ieeexplore.ieee.org/abstract/document/9167562&lt;/a&gt;&lt;/p&gt;
</description>
    </item>
    
  </channel>
</rss>
