<node id="681580">
  <nid>681580</nid>
  <type>event</type>
  <uid>
    <user id="28475"><![CDATA[28475]]></user>
  </uid>
  <created>1743712570</created>
  <changed>1743712677</changed>
  <title><![CDATA[Ph.D. Proposal Oral Exam - Abdulmannan Ajabnoor]]></title>
  <body><![CDATA[<p><strong>Title:&nbsp; </strong><em>Cyber-Physical Security of Frequency Control in Dynamic Virtual Power Plant</em></p><p><strong>Committee:</strong></p><p>Dr. Saeedifard, Advisor</p><p>Dr. Gross, Co-Advisor</p><p>Dr. Molzahn, Chair</p><p>Dr. Grijalva</p>]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Cyber-Physical Security of Frequency Control in Dynamic Virtual Power Plant]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>The objective of the proposed research is to analyze an attack strategy targeting secondary frequency control (SFC) in dynamic virtual power plants (DVPPs) and the factors influencing its success. In a traditional power grid, frequency control is primarily managed by large synchronous generators (SGs). As power systems are evolving, DVPPs are becoming an integral part of modern grids to coordinate energy resources for efficient operation and contribute to frequency control. One of the key mechanisms for maintaining frequency within an acceptable range is SFC, which adjusts the set-points of SGs and other energy sources at the transmission level that participate in a DVPP through DVPP centralized control (DVPPCC). This adjustment, facilitated by the communication infrastructure, ensures frequency stability and maintains scheduled power transfer between neighboring areas of power systems. However, due to cyber vulnerabilities in communication networks, the SFC signal is susceptible to attacks, potentially leading to abnormal frequency deviations. This thesis will analyze an attack strategy targeting SFC and the factors influencing its success. First, it will outline the attacker model. Next, it will examine how power system parameters and DVPP operating modes, including grid-following support (GFL-support) and grid-forming (GFM), along with energy source dynamics, impact the likelihood of a successful attack. Then, data-driven algorithms will be implemented to establish guidelines for identifying worst-case scenarios from the system operator’s perspective. Adhering to these guidelines can increase the probability of a successful attack, which will be verified in a two-area system with detailed turbine/governor, energy resource, and protection models. Additionally, the thesis will analyze the attacker’s threat model, which identifies the attack surface required to steer the system frequency to an unsafe state while avoiding the activation of the remedial action scheme (RAS). If attackers gain access, they could prevent the tripping of generator circuit breakers, thereby increasing the risk of system-wide collapse and/or blackout. Finally, the thesis will explore detection and mitigation strategies to reduce the impact of such attacks.</p>]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2025-04-17T11:00:00-04:00]]></value>
      <value2><![CDATA[2025-04-17T13:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[Online]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
          <item>
        <url>https://gatech.zoom.us/j/95872685836</url>
        <link_title><![CDATA[Zoom link]]></link_title>
      </item>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>434371</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[ECE Ph.D. Proposal Oral Exams]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>102851</tid>
        <value><![CDATA[Phd proposal]]></value>
      </item>
          <item>
        <tid>1808</tid>
        <value><![CDATA[graduate students]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
