Sereyvathana Ty

Learn More
Securing the power grid is one of the top priorities in our nation due to its critical importance. As critical infrastructure security of the grid is vulnerable to both cyber and physical attacks, a wellcoordinated synchronized attack can lead to cascading outages, damage major physical components such as generators, and financially devastate our country.(More)
MOTIVATION Fluorescence in situ hybridization (FISH) is used to study the organization and the positioning of specific DNA sequences within the cell nucleus. Analyzing the data from FISH images is a tedious process that invokes an element of subjectivity. Automated FISH image analysis offers savings in time as well as gaining the benefit of objective data(More)
The transmission of bulk power within a zone of an interconnected region of an electricity grid is controlled by substation automation systems. The substations are where electricity is routed throughout the grid, as well as the control and communication nodes of the network grid. It is crucial for the security of the electricity grid that there should be no(More)
Most critical infrastructures can be modeled as cyber-physical systems whose cyber components control physical processes so as to optimize specific system objectives. Protecting such systems from malicious threats (including insider threats) is particularly challenging. One solution, based on Trusted Computing technologies such as the Trusted Platform(More)
  • 1