<node id="676574">
  <nid>676574</nid>
  <type>news</type>
  <uid>
    <user id="36253"><![CDATA[36253]]></user>
  </uid>
  <created>1725623097</created>
  <changed>1725967857</changed>
  <title><![CDATA[Drone Course Goes Beyond Protecting Our Eyes in the Sky]]></title>
  <body><![CDATA[<p>The skies above the Georgia Tech campus were clear in late spring as a group of graduate students gathered at Couch Park to test their custom-built drones one last time before the semester ended.&nbsp;</p><p>Their instructor, Associate Professor <a href="https://sites.google.com/site/samanzonouz4n6/saman-zonouz"><strong>Saman Zonouz</strong></a>, created this course to teach students to prevent, detect, and respond to common cyberattacks launched against cyber-physical systems.&nbsp;</p><p>According to Zonouz, infrastructure like power grids, water treatment plants, hospitals, and healthcare are all cyber-physical systems, an area of cybersecurity where software and hardware interact with physical processes. These systems are also found in drones, making the course widely applicable to students.&nbsp;</p><p>“This knowledge will be invaluable in their future careers, especially if they work in industries like Tesla, where safeguarding equipment against cybersecurity threats is essential,” Zonouz said. “It’s not feasible to build a power plant in class for students to practice on. Drones are a compact cyber-physical system students can experience firsthand.”&nbsp;</p><p>That day, the students in the park showed just how hands-on the semester had been. Each team had a drone they had spent the semester building, testing, and attacking. Their remote aircraft had open-source auto-pilot software, GPS, altitude sensors, cameras, AI software, and their developed security solutions.</p><p>In one exercise, students had to use their AI software to recover from and play as a surrogate controller against a GPS spoofing cyberattack on their drone in mid-flight.&nbsp;</p><p>“Flights need to be safe regardless of potential cyber-attacks,” he said. “This course combines cybersecurity and drones in a way that specifically targets the drone's operation against cybersecurity threats.”</p><p>This course is part of Georgia Tech’s <a href="https://www.cc.gatech.edu/degree-programs/master-science-cybersecurity">Masters of Cybersecurity—Cyber-Physical Systems</a> track and an instantiation of the <a href="https://www.energy.gov/ceser/cyber-informed-engineering">Department of Energy’s Cyber-Informed Engineering </a>(CIE) initiative, which Zonouz is a co-PI on. Zonouz wants the course to serve as a model for other universities interested in teaching drone cybersecurity. While there are existing courses on power grid security, the emphasis on hands-on experiences sets it apart.&nbsp;</p><p>His lab's research on drones (CPSec: <a href="https://sites.gatech.edu/capcpsec/">Cyber-Physical Systems Security Lab</a>) has also received federal recognition. Last fall, the lab hosted a United States congressional visit in the Klaus Advanced Computing Building.&nbsp;</p><p>On September 24, his lab will welcome <a href="https://www.dhs.gov/person/mary-ellen-callahan"><strong>Mary Ellen Callahan</strong></a>, assistant secretary, DHS Countering Weapons of Mass Destruction Office (CWMD) as a guest lecturer, key note speaker, and panelist. The event will take place in the Coda atrium from 9:30 a.m. – 2 p.m.</p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2024-09-06T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[In order to demonstrate how to protect critical infrastructures from cyberattacks, Associate Professor Saman Zonouz has created a course that uses drones to teach students how to defend power grids, water treatment plants, hospitals, and healthcare.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>This course is part of Georgia Tech’s <a href="https://www.cc.gatech.edu/degree-programs/master-science-cybersecurity">Masters of Cybersecurity—Cyber-Physical Systems</a> track and an instantiation of the <a href="https://www.energy.gov/ceser/cyber-informed-engineering">Department of Energy’s Cyber-Informed Engineering </a>(CIE) initiative, which Zonouz is a co-PI on. Zonouz wants the course to serve as a model for other universities interested in teaching drone cybersecurity. While there are existing courses on power grid security, the emphasis on hands-on experiences sets it apart.&nbsp;</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="674853">
            <nid>674853</nid>
            <type>video</type>
            <title><![CDATA[Video: Drone Course Goes Beyond Protecting our Eyes in the Sky]]></title>
            <body><![CDATA[<div><p>Associate Professor Saman Zonouz speaks about the Cybersecurity of Drones, a unique course he created at Georgia Tech. The class exposes students to fundamental security principles specific to drones and to apply them to a broad range of current and future cyber-physical security challenges. Professor Zonouz developed the course in collaboration with the School of Cybersecurity and Privacy and the School of Electrical and Computer Engineering.</p><p>Video by Kevin Beasley, College of Computing</p></div>]]></body>
            
                          <field_video>
                <item>
                  <youtube_id><![CDATA[]]></youtube_id>
                  <video_width><![CDATA[]]></video_width>
                  <video_height><![CDATA[]]></video_height>
                </item>
                <item>
                  <vimeo_id><![CDATA[]]></vimeo_id>
                  <video_width><![CDATA[]]></video_width>
                  <video_height><![CDATA[]]></video_height>
                </item>
                <item>
                  <video_url><![CDATA[]]></video_url>
                  <video_width><![CDATA[]]></video_width>
                  <video_height><![CDATA[]]></video_height>
                </item>
              </field_video>
              <field_width>
                <item>
                  <value><![CDATA[]]></value>
                </item>
              </field_width>
              <field_height>
                <item>
                  <value><![CDATA[]]></value>
                </item>
              </field_height>
              <field_youtube>
                <item>
                  <value><![CDATA[]]></value>
                </item>
              </field_youtube>
              <field_vimeo>
                <item>
                  <value><![CDATA[]]></value>
                </item>
              </field_vimeo>
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[jpopham3@gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p><strong>JP Popham&nbsp;</strong><br>Communications Officer II | School of Cybersecurity and Privacy<br><a href="https://scp.cc.gatech.edu/" title="https://scp.cc.gatech.edu/">scp.cc.gatech.edu</a></p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
          <item>660373</item>
          <item>660367</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
          <item>
        <![CDATA[Engineering]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
          <item>
        <tid>145</tid>
        <value><![CDATA[Engineering]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
          <term tid="39481"><![CDATA[National Security]]></term>
          <term tid="39501"><![CDATA[People and Technology]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>660373</item>
          <item>660367</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Cybersecurity &amp; Privacy (Do not use)]]></item>
          <item><![CDATA[School of Cybersecurity and Privacy]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>176793</tid>
        <value><![CDATA[awesome video]]></value>
      </item>
          <item>
        <tid>365</tid>
        <value><![CDATA[Research]]></value>
      </item>
          <item>
        <tid>193942</tid>
        <value><![CDATA[faculty promotions (184348]]></value>
      </item>
          <item>
        <tid>182941</tid>
        <value><![CDATA[cc-research; ic-cybersecurity; ic-hcc]]></value>
      </item>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>3322</tid>
        <value><![CDATA[classes]]></value>
      </item>
          <item>
        <tid>174258</tid>
        <value><![CDATA[cool classes]]></value>
      </item>
          <item>
        <tid>177324</tid>
        <value><![CDATA[computer engineering classes]]></value>
      </item>
          <item>
        <tid>191634</tid>
        <value><![CDATA[school of cybersecurity and privacy]]></value>
      </item>
          <item>
        <tid>1868</tid>
        <value><![CDATA[Atlantis; computer science; electrical engineering; ECE; CoC; department of education]]></value>
      </item>
          <item>
        <tid>188776</tid>
        <value><![CDATA[go-research]]></value>
      </item>
          <item>
        <tid>185390</tid>
        <value><![CDATA[go-COE]]></value>
      </item>
          <item>
        <tid>186861</tid>
        <value><![CDATA[go-cyber]]></value>
      </item>
          <item>
        <tid>176095</tid>
        <value><![CDATA[cyber -physical systems]]></value>
      </item>
          <item>
        <tid>543</tid>
        <value><![CDATA[National Security]]></value>
      </item>
          <item>
        <tid>180858</tid>
        <value><![CDATA[Engineering Georgia]]></value>
      </item>
          <item>
        <tid>187915</tid>
        <value><![CDATA[go-researchnews]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
