Texas A&M University College Station - Engineering
Assistant Professor of Electrical and Computer Engineering at Texas A&M University
Higher Education
Katherine Rogers
Davis
Bryan, Texas
Primary research interests cover the use of data to enhance power systems monitoring and control, including data-enhanced modeling, event identification from data, and making algorithms more robust with respect to bad data. Other areas of interest include power grid cyber security and wide-area visualization.
Research Assistant, Dr. Thomas J. Overbye
Currently working on applying data mining techniques to power grid analysis and on the Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project; previous research includes power flow control with distributed flexible AC transmission system (D-FACTS) devices.
Research Scientist - Information Trust Institute
Research includes data-enhanced power system modeling and analysis, security-oriented cyber-physical techniques for analyzing electrical and cyber infrastructures, and making algorithms more robust with respect to untrustworthy inputs.
ECE Adjunct Assistant Professor
Katherine worked at University of Illinois at Urbana-Champaign as a ECE Adjunct Assistant Professor
Instructor, ECE 333, Spring 2011
Taught the Green Electric Energy course, formerly called Renewable Energy Systems (ECE 398 RES). The course covered a range of topics important to sustainable energy integration including wind and solar, distributed generation, engineering economics. The other section was taught by Professor Alejandro Dominguez-Garcia.
Assistant Professor of Electrical and Computer Engineering
Katherine worked at Texas A&M University as a Assistant Professor of Electrical and Computer Engineering
Software Engineer and Senior Consultant
Software development, research, and development for PowerWorld.
Intern
Researched transient stability models, developed code for PowerWorld Simulator, assisted with consulting and other projects.
Founder, Kaedago
Kaedago's mission is to improve the cyber security posture of the electric power industry by providing cyber-physical security analysis and situational awareness (CyPSA). Kaedago is a service company supporting the open service software developed on the DOE ARPA-E funded CyPSA project.
BS
Electrical Engineering
M.S., Ph.D.
Electrical and Computer Engineering
Research Assistant, Dr. Thomas J. Overbye
Currently working on applying data mining techniques to power grid analysis and on the Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project; previous research includes power flow control with distributed flexible AC transmission system (D-FACTS) devices.
Research Scientist - Information Trust Institute
Research includes data-enhanced power system modeling and analysis, security-oriented cyber-physical techniques for analyzing electrical and cyber infrastructures, and making algorithms more robust with respect to untrustworthy inputs.
ECE Adjunct Assistant Professor
Instructor, ECE 333, Spring 2011
Taught the Green Electric Energy course, formerly called Renewable Energy Systems (ECE 398 RES). The course covered a range of topics important to sustainable energy integration including wind and solar, distributed generation, engineering economics. The other section was taught by Professor Alejandro Dominguez-Garcia.
Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS)
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one potential cause of bad data and may have serious consequences. A solution for bad data detection in power systems is proposed in this work, particularly designed to detect malicious data attacks. By applying known perturbations to the sys- tem and measuring the changes elsewhere, the ap- proach ’probes’ the system for unexpected responses in terms of measurement values. Using a developed ’keyspace’ approach, the perturbation used is rendered unpredictable to the attacker, making it difficult for the attacker to adapt his attacks. Thus, unexpected measurement values after a probe provide an indication of both bad and malicious data. The proposed approach is analyzed for sample systems using MATLAB.
Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS)
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one potential cause of bad data and may have serious consequences. A solution for bad data detection in power systems is proposed in this work, particularly designed to detect malicious data attacks. By applying known perturbations to the sys- tem and measuring the changes elsewhere, the ap- proach ’probes’ the system for unexpected responses in terms of measurement values. Using a developed ’keyspace’ approach, the perturbation used is rendered unpredictable to the attacker, making it difficult for the attacker to adapt his attacks. Thus, unexpected measurement values after a probe provide an indication of both bad and malicious data. The proposed approach is analyzed for sample systems using MATLAB.
IEEE Transactions on Smart Grid
Preserving the availability and integrity of the power grid critical infrastructures in the face of fast-spreading intrusions requires advances in detection techniques specialized for such large-scale cyber-physical systems. In this paper, we present a security-oriented cyber-physical state estimation (SCPSE) system, which, at each time instant, identifies the compromised set of hosts in the cyber network and the maliciously modified set of measurements obtained from power system sensors. SCPSE fuses uncertain information from different types of distributed sensors, such as power system meters and cyber-side intrusion detectors, to detect the malicious activities within the cyber-physical system. We implemented a working prototype of SCPSE and evaluated it using the IEEE 24-bus benchmark system. The experimental results show that SCPSE significantly improves on the scalability of traditional intrusion detection techniques by using information from both cyber and power sensors. Furthermore, SCPSE was able to detect all the attacks against the control network in our experiments.
Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS)
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one potential cause of bad data and may have serious consequences. A solution for bad data detection in power systems is proposed in this work, particularly designed to detect malicious data attacks. By applying known perturbations to the sys- tem and measuring the changes elsewhere, the ap- proach ’probes’ the system for unexpected responses in terms of measurement values. Using a developed ’keyspace’ approach, the perturbation used is rendered unpredictable to the attacker, making it difficult for the attacker to adapt his attacks. Thus, unexpected measurement values after a probe provide an indication of both bad and malicious data. The proposed approach is analyzed for sample systems using MATLAB.
IEEE Transactions on Smart Grid
Preserving the availability and integrity of the power grid critical infrastructures in the face of fast-spreading intrusions requires advances in detection techniques specialized for such large-scale cyber-physical systems. In this paper, we present a security-oriented cyber-physical state estimation (SCPSE) system, which, at each time instant, identifies the compromised set of hosts in the cyber network and the maliciously modified set of measurements obtained from power system sensors. SCPSE fuses uncertain information from different types of distributed sensors, such as power system meters and cyber-side intrusion detectors, to detect the malicious activities within the cyber-physical system. We implemented a working prototype of SCPSE and evaluated it using the IEEE 24-bus benchmark system. The experimental results show that SCPSE significantly improves on the scalability of traditional intrusion detection techniques by using information from both cyber and power sensors. Furthermore, SCPSE was able to detect all the attacks against the control network in our experiments.
IEEE SmartGridComm 2012
In this paper, we present two contributions to false data injection attacks and mitigation in electric power systems. First, we introduce a method of creating unobservable attacks on the AC power flow equations. The attack strategy details how an adversary can launch a stealthy attack to achieve a goal. Then, we introduce a proactive defense strategy that is capable of detecting attacks. The defense strategy introduces known perturbations by deliberately probing the system in a specific, structured manner. We show that the proposed approach, under certain conditions, is able to detect the presence of false data injection attacks, as well the attack locations and information about the manipulated data values
Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS)
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one potential cause of bad data and may have serious consequences. A solution for bad data detection in power systems is proposed in this work, particularly designed to detect malicious data attacks. By applying known perturbations to the sys- tem and measuring the changes elsewhere, the ap- proach ’probes’ the system for unexpected responses in terms of measurement values. Using a developed ’keyspace’ approach, the perturbation used is rendered unpredictable to the attacker, making it difficult for the attacker to adapt his attacks. Thus, unexpected measurement values after a probe provide an indication of both bad and malicious data. The proposed approach is analyzed for sample systems using MATLAB.
IEEE Transactions on Smart Grid
Preserving the availability and integrity of the power grid critical infrastructures in the face of fast-spreading intrusions requires advances in detection techniques specialized for such large-scale cyber-physical systems. In this paper, we present a security-oriented cyber-physical state estimation (SCPSE) system, which, at each time instant, identifies the compromised set of hosts in the cyber network and the maliciously modified set of measurements obtained from power system sensors. SCPSE fuses uncertain information from different types of distributed sensors, such as power system meters and cyber-side intrusion detectors, to detect the malicious activities within the cyber-physical system. We implemented a working prototype of SCPSE and evaluated it using the IEEE 24-bus benchmark system. The experimental results show that SCPSE significantly improves on the scalability of traditional intrusion detection techniques by using information from both cyber and power sensors. Furthermore, SCPSE was able to detect all the attacks against the control network in our experiments.
IEEE SmartGridComm 2012
In this paper, we present two contributions to false data injection attacks and mitigation in electric power systems. First, we introduce a method of creating unobservable attacks on the AC power flow equations. The attack strategy details how an adversary can launch a stealthy attack to achieve a goal. Then, we introduce a proactive defense strategy that is capable of detecting attacks. The defense strategy introduces known perturbations by deliberately probing the system in a specific, structured manner. We show that the proposed approach, under certain conditions, is able to detect the presence of false data injection attacks, as well the attack locations and information about the manipulated data values
IEEE Transactions on Smart Grid
Existing and forthcoming devices at the residential level have the ability to provide reactive power support. Inverters which connect distributed generation such as solar panels and pluggable hybrid electric vehicles (PHEVs) to the grid are an example. Such devices are not currently utilized by the power system. We investigate the integration of these end-user reactive-power-capable devices to provide voltage support to the grid via a secure communications infrastructure. We determine effective locations in the transmission system and show how reactive power resources connected at those buses can be controlled. Buses belong to reactive support groups which parallel the regions of the secure communications architecture that is presented. Ultimately, our goal is to present how the smart grid can enable the utilization of available end-user devices as a resource to mitigate power system problems such as voltage collapse.
Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS)
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one potential cause of bad data and may have serious consequences. A solution for bad data detection in power systems is proposed in this work, particularly designed to detect malicious data attacks. By applying known perturbations to the sys- tem and measuring the changes elsewhere, the ap- proach ’probes’ the system for unexpected responses in terms of measurement values. Using a developed ’keyspace’ approach, the perturbation used is rendered unpredictable to the attacker, making it difficult for the attacker to adapt his attacks. Thus, unexpected measurement values after a probe provide an indication of both bad and malicious data. The proposed approach is analyzed for sample systems using MATLAB.
IEEE Transactions on Smart Grid
Preserving the availability and integrity of the power grid critical infrastructures in the face of fast-spreading intrusions requires advances in detection techniques specialized for such large-scale cyber-physical systems. In this paper, we present a security-oriented cyber-physical state estimation (SCPSE) system, which, at each time instant, identifies the compromised set of hosts in the cyber network and the maliciously modified set of measurements obtained from power system sensors. SCPSE fuses uncertain information from different types of distributed sensors, such as power system meters and cyber-side intrusion detectors, to detect the malicious activities within the cyber-physical system. We implemented a working prototype of SCPSE and evaluated it using the IEEE 24-bus benchmark system. The experimental results show that SCPSE significantly improves on the scalability of traditional intrusion detection techniques by using information from both cyber and power sensors. Furthermore, SCPSE was able to detect all the attacks against the control network in our experiments.
IEEE SmartGridComm 2012
In this paper, we present two contributions to false data injection attacks and mitigation in electric power systems. First, we introduce a method of creating unobservable attacks on the AC power flow equations. The attack strategy details how an adversary can launch a stealthy attack to achieve a goal. Then, we introduce a proactive defense strategy that is capable of detecting attacks. The defense strategy introduces known perturbations by deliberately probing the system in a specific, structured manner. We show that the proposed approach, under certain conditions, is able to detect the presence of false data injection attacks, as well the attack locations and information about the manipulated data values
IEEE Transactions on Smart Grid
Existing and forthcoming devices at the residential level have the ability to provide reactive power support. Inverters which connect distributed generation such as solar panels and pluggable hybrid electric vehicles (PHEVs) to the grid are an example. Such devices are not currently utilized by the power system. We investigate the integration of these end-user reactive-power-capable devices to provide voltage support to the grid via a secure communications infrastructure. We determine effective locations in the transmission system and show how reactive power resources connected at those buses can be controlled. Buses belong to reactive support groups which parallel the regions of the secure communications architecture that is presented. Ultimately, our goal is to present how the smart grid can enable the utilization of available end-user devices as a resource to mitigate power system problems such as voltage collapse.
IEEE Transactions on Power Systems
Market power gives certain market participants the ability to manipulate the market to their advantage when their product is not substitutable by competitors. Identification of generators which have the potential for market power either individually or within a small group is performed using sensitivity information from the linear programming optimal power flow (LP OPF). The impact of network constraints on admissible price perturbations are used to group generators that have the potential to exhibit local market power. Specific price perturbation vectors are found that highlight a constraint-induced locational advantage for these suppliers. In practice, this is most commonly observed in “load pockets,” for which ISO policies mitigate market power.
The following profiles may or may not be the same professor:
The following profiles may or may not be the same professor: