Jairo Alonso Giraldo

Learn More
While attacks on information systems have for most practical purposes binary outcomes (information was manipulated/eavesdropped, or not), attacks manipulating the sensor or control signals of Industrial Control Systems (ICS) can be tuned by the attacker to cause a continuous spectrum in damages. Attackers that want to remain undetected can attempt to hide(More)
— The consensus algorithm can represent many problems in cooperative behavior, and has been widely used in engineering and social sciences. In this work we prove that the consensus model where the information that each agent receives from its neighbors has time-varying asynchronous delays and sampling, converges to an agreement independent of these(More)
The vulnerability of false data injection attacks on real-time electricity pricing for the power grid market has been recently explored. Previous work has focused on the impact caused by attackers that compromise pricing signals and send false prices to a subset of consumers. In this paper we extend previous work by considering a more powerful and general(More)
— The Kuramoto oscillator has been widely studied because it can model biological, social, chemical, and engineering problems. Conditions for frequency synchronization of a network of Kuramoto oscillators have been well established, but it depends on the connectivity of the network and on the natural frequencies. In this work we propose a consensus-based(More)
Networked Control Systems (NCS) has been one of the main research areas in the last few years, due to the benefits of the insertion of a communication network in distributed systems, and the widely area of applications such as tele-operations, robotics, UAVs, power systems, among others, and new growing areas like smart grids and Cyber-Physiscal Systems.(More)
Monitoring the " physics " of control systems to detect attacks is a growing area of research. In its basic form a security monitor creates time-series models of sensor readings for an industrial control system and identifies anomalies in these measurements in order to identify potentially false control commands or false sensor readings. In this paper, we(More)
  • 1