U.S. - Israel Energy Center

Energy Cyber

Graphic featuring the outline of a wire tower

Publications

Task 4: Multi-level threat intelligence knowledge base

  • Dekel, L., Leybovich, I., Zilberman, P., & Puzis, R. (2022). MABAT: A Multi-Armed Bandit Approach for Threat-Hunting. IEEE Transactions on Information Forensics and Security, 18, 477-490.
  • Kaiser, F. K., Dardik, U., Elitzur, A., Zilberman, P., Daniel, N., Wiens, M., ... & Puzis, R. (2023). Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph. IEEE Transactions on Dependable and Secure Computing. 20 (6), 4793- 4809
  • Nir Daniel, Florian Klaus Kaiser, Anton Dzega, Aviad Elyashar, Rami Puzis, "Labeling NIDS Rules with MITRE ATT&CK Techniques using ChatGPT", CPS4CIP 2023
  • Ofir Cohen, Ron Bitton, Asaf Shabtai, Rami Puzis,"ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment", ESORICS(2023),.
  • Adir Solomon, Michael Haim Michaelshvili, Ron Bitton, Bracha Shapira, Lior Rokach, Asaf Shabtai, Rami Puzis,"Contextual Security Awareness: A Context-Based Approach for Assessing the Security Awareness of Users", 108709, Knowledge- Based Systems, 241,108709, 2022
  • Adi Offer, Aviram Zilberman, Asaf Shabtai, Yuval Elovici, Rami Puzis,"CDGeB: Cloud Data Geolocation Benchmark", CCSW (2024)


  • Task 5: GANs for generating adversarial attacks

  • O. Bahwal, L. Sankar, and O. Kosut, “An adversarial approach for evaluating the - robustness of event identification models”, IEEE PES GM (submitted), 2024.
  • Bazargani, N.T., Dasarathy, G., Sankar, L. and Kosut, O. (2022). A Machine Learning Framework for Event Identification via Modal Analysis of PMU Data. arXiv preprint arXiv:2202.06836.
  • Anguluri R, Kosut O, Sankar L. Localization and estimation of unknown forced inputs: A group LASSO approach[J]. IEEE Transactions on Control of Network Systems, 2023.


  • Task 7: Malware threats mitigation

  • Mirsky Y, Macon G, Brown M, et al. VulChecker: Graph-based Vulnerability Localization in Source Code[C]//32nd USENIX Security Symposium (USENIX Security 23). 2023: 6557-6574.
  • M. Ike, K. Phan, K. Sadoski, R. Valme and W. Lee, "Scaphy: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical," 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2023, pp. 20-37
  • Mirsky Y, Demontis A, Kotak J, et al. The threat of offensive ai to organizations[J]. Computers & Security, 2023, 124: 103006.
  • Landen M, Chung K, Ike M, et al. DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection[C]//Proceedings of the 38th Annual Computer Security Applications Conference. 2022: 13-27.
  • Yagemann C, Chung S P, Saltaformaggio B, et al. Automated bug hunting with data-driven symbolic root cause analysis[C]//Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 2021: 320-336.


  • Task 8: Detect event mimicking attacks

  • Taghipourbazargani N, Sankar L, Kosut O. A Semi-Supervised Approach for Power System Event Identification[J]. arXiv preprint arXiv:2309.10095, 2023.
  • Bazargani, N.T., Dasarathy, G., Sankar, L. and Kosut, O. (2022). A Machine Learning Framework for Event Identification via Modal Analysis of PMU Data. arXiv preprint arXiv:2202.06836.
  • J. Mathias, R. Anguluri, O. Kosut, and L. Sankar. "Model Predictive Control for Joint Regulation and Dispatch of Distributed Energy Resources,” IEEE PES GM (accepted), 2024.
  • Anguluri R, Kosut O, Sankar L. Localization and estimation of unknown forced inputs: A group LASSO approach[J]. IEEE Transactions on Control of Network Systems, 2023.
  • Anguluri R, Taghipourbazargani N, Kosut O, et al. Source Localization in Linear Dynamical Systems using Subspace Model Identification[C]//2023 IEEE Conference on Control Technology and Applications (CCTA). IEEE, 2023: 1016-1021.


  • Task 10: Multi-layer anomaly detection framework

  • Harel O D, Moskovitch R. Complete closed time intervals-related patterns mining[C]//Proceedings of the AAAI conference on artificial intelligence. 2021, 35(5): 4098-4105.
  • Sarafian Ben Ari N, Moskovitch R. Predictive temporal patterns discovery[J]. 2023.
  • Harel O D, Moskovitch R. INSTINCT: Inception-based Symbolic Time Intervals series classification[J]. Information Sciences, 2023, 642: 119147.
  • Shitrit G, Tractinsky N, Moskovitch R. Visualization of frequent temporal patterns in single or two populations[J]. Journal of Biomedical Informatics, 2022, 134: 104169.
  • Itzhak N, Jaroszewicz S, Moskovitch R. Continuous prediction of a time intervals-related pattern’s completion[J]. Knowledge and Information Systems, 2023, 65(11): 4797-4846.
  • Nevo Itzhak, Szymon Jaroszewicz, Robert Moskovitch, Early Multiple Temporal Patterns Based Event Prediction in Heterogeneous Multivariate Temporal Data, Siam Data Mining (SDM), Houston, USA, 2024. Rank A


  • Task 11: AI based Intrusion detection

  • Frankovits G, Mirsky Y. Discussion Paper: The Threat of Real Time Deepfakes[C]//Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes. 2023: 20-23.
  • Yasur L, Frankovits G, Grabovski F M, et al. Deepfake captcha: A method for preventing fake calls[C]//Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security. 2023: 608-622.


  • Task 13: Firmware verification

  • Amar M, Navanesan L, Sayakkara A P, et al. Waves of Knowledge: A Comparative Study of Electromagnetic and Power Side-Channel Monitoring in Embedded Systems[C]//International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles. Cham: Springer Nature Switzerland, 2023: 158-170.


  • Task 14: Cyberattack tolerance

  • Keppler D R, Karim M F, Mickelson M S, et al. Experimentation and Implementation of BFT++ Cyber-attack Resilience Mechanism for Cyber Physical Systems[J]. ACM Transactions on Cyber-Physical Systems, 2023.
  • Al Maruf A, Niu L, Clark A, et al. A timing-based framework for designing resilient cyber-physical systems under safety constraint[J]. ACM Transactions on Cyber-Physical Systems, 2023, 7(3): 1-25.
  • J.S. Mertoguno, G Briskin, J.H. Li, K Kwak, Lessons Learned and Future Directions for Security, Resilience and Artificial Intelligence in Cyber Physical Systems, Network Security Empowered by Artificial Intelligence, Springer Cham, June 2024.
  • Niu L, Maruf A A, Clark A, et al. POSTER: A Common Framework for Resilient and Safe Cyber-Physical System Design[C]//Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security. 2023: 1025-1027.
  • Niu L, Al Maruf A, Clark A, et al. An analytical framework for control synthesis of cyber-physical systems with safety guarantee[C]//2022 IEEE 61st Conference on Decision and Control (CDC). IEEE, 2022: 1533-1540.
  • Al Maruf A, Niu L, Clark A, et al. A compositional approach to safety-critical resilient control for systems with coupled dynamics[C]//2022 IEEE 61st Conference on Decision and Control (CDC). IEEE, 2022: 910-917.


  • Task 15: Self-healing and auto-remediation

  • Tayouri D, Baum N, Shabtai A, et al. A survey of mulval extensions and their attack scenarios coverage[J]. IEEE Access, 2023.
  • Olswang A, Gonda T, Puzis R, et al. Prioritizing vulnerability patches in large networks[J]. Expert Systems with Applications, 2022, 193: 116467.


  • Task 16: Reinforcement learning control for cyber physical systems

  • Moradi, M., Weng, Y., Lai, Y. C. (2022, October 10). Defending Smart Electrical Power Grids against Cyberattacks with Deep Q-Learning. PRX Energy (2022)
  • Kong L W, Weng Y, Glaz B, et al. Reservoir computing as digital twins for nonlinear dynamical systems[J]. Chaos: An Interdisciplinary Journal of Nonlinear Science, 2023, 33(3).
  • Kong, L. W., Weng, Y., Glaz, B., Haile, M., & Lai, Y. C. (2022). Digital twins of nonlinear dynamical systems. arXiv preprint arXiv:2210.06144.
  • Moradi M, Weng Y, Dirkman J, et al. Preferential cyber defense for power grids[J]. PRX Energy, 2023, 2(4): 043007.
  • Mohammadamin Moradi, Shirin Panahi, Zheng-Meng Zhai, Yang Weng, John Dirkman, and Ying-Cheng Lai, "Heterogeneous reinforcement learning for defending power grids against attacks," submitted.


  • Task 17: ICS security by design

  • Shirtz D, Koberman I, Elyashar A, et al. Enhancing Energy Sector Resilience: Integrating Security by Design Principles[J]. arXiv preprint arXiv:2402.11543, 2024.