Book Chapters & Newsletter

  • [3] Aditya Ashok, Pengyuan Wang, and Manimaran Govindarasu, "Cyber-Physical Security Testbeds for an Attack-resilient Smart Grid",in Suryanarayanan, Hansen and Roche (Ed.): "Cyber-Physical-Social Systems and Constructs in Electric Power Engineering", The IET Press, Under review, 2016.

  • [2] Manimaran Govindarasu and Adam Hahn, "What the Power Industry Has to Learn about Cyber Vulnerability Disclosure", IEEE Smart Grid Newsletter, Jan. 2012.

  • [1] S. Sridhar, G. Manimaran, and C. C. Liu, "Risk Analysis of Coordinated Cyber Attacks on Power Grid," Edited by A. Chakrabortty and M.D. Ilic (eds.), Control and Optimization Methods for Electric Smart Grids, 2012.

Journal Publications & Newsletter

  • [16] A. Ashok, G. Manimaran, and V. Ajjarapu, , "Online detection of cyber attacks in Power System State Estimation" IEEE Trans. on Smart Grid, Accepted for publication, 2016.

  • [15] A. Ashok, A. Hahn, and G. Manimaran, "Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment," Journal of Advanced Research, July 2014.

  • [14] S. Sridhar, and G. Manimaran, "Model-Based Attack Detection and Mitigation for Automatic Generation Control," IEEE Trans. on Smart Grid, March 2014[pdf]

  • [13] A. Hahn, A. Ashok, S. Siddharth, and G. Manimaran, "Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid," IEEE Trans. on Smart Grid, June 2013[pdf]

  • [12] B. Fateh, G. Manimaran, and V. Ajjarapu, "Wireless sensor network for transmission line monitoring in smart grid," IEEE Transactions on Smart Grid, June 2013. [pdf]

  • [11] S. Sridhar, A. Hahn, and G. Manimaran, "Cyber-physical system security for the electric power grid," Proceedings of the IEEE, vol. 100, no. 1, pp. 210-224, Jan. 2012.[pdf]

  • [10] A. Hahn, G. Manimaran, "Cyber Attack Exposure Evaluation Framework for the Smart Grid," IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 835-843, Nov. 2011.[pdf]

  • [9] C.-W. Ten, G. Manimaran, and C.-C. Liu, "Cybersecurity for critical infrastructures: Attack and defense modeling," IEEE Trans. on Systems, Man, and Cybernetics - Part A, vol.40, no.4, pp.853-865, July 2010.[pdf]

  • [8] S. Pudar, G. Manimaran, and C.-C. Liu, "A practical method and tool for integrated modeling of security attacks and counter measures," Computers & Security, vol. 28, no. 8, pp. 754-771, Nov. 2009.[pdf]

  • [7] C.-W. Ten, C.-C. Liu, and G. Manimaran, "Vulnerability assessment of cybersecurity for SCADA systems," IEEE Trans. on Power Systems, vol. 23, no. 4, pp. 1836-1846, Nov. 2008.[pdf]

  • [6] R. A. Leon, V. Vittal, and G. Manimaran, "Application of sensor network for secure electric energy infrastructure," IEEE Trans. on Power Del, vol. 22, no. 2, pp. 1021 - 1028, Apr. 2007[pdf]

  • [5] A. Chakrabarti and G. Manimaran, "Internet infrastructure security: A taxonomy," IEEE Network, vol.16, no.6, pp.13-21, Nov/Dec. 2002. (Acceptance rate: 20%)

  • [4] S. Holeman, G. Manimaran, J. Davis, and A. Chakrabarti, "Differentially secure multicasting and its implementation methods," Computers & Security, vol.21, no.8, pp.736-749, Nov. 2002.

  • [3] Z. Xie, G. Manimaran, V. Vittal, A. G. Phadke, and V. Centeno, "An information architecture for future power systems and its reliability analysis," IEEE Trans. on Power Syst., vol.17, no.3, pp.857-863, Aug. 2002[pdf]

  • [2] D. Basheer and G. Manimaran, "Distributed packet pairing for reflector based DDoS attack mitigation," Computer Communications, vol. 29, no. 12, pp. 2269-2280, Aug. 2006.[pdf]

  • [1] D. Basheer and G. Manimaran, "Novel hybrid schemes employing packet marking and logging for IP traceback," IEEE Trans. on Parallel and Distributed Systems, vol. 17, no. 5, pp. 403-418, May 2006

Conference Publications

  • [26] A. Ashok, S. Sridhar, and D. McKinnon, P. Wang, and M. Govindarasu, "Testbed-based Performance Evaluation of Attack Resilient Control for AGC, " Resilient Week, 2016. [pdf]

  • [25] P. Wang, A. Ashok, and G. Manimaran, "Cyber-physical risk assessment for smart grid System Protection Scheme," Proceedings of Power & Energy Society General Meeting, July 2015.

  • [24] A. Ashok, P. Wang, and G. Manimaran, "Experimental evaluation of cyber attacks on Automatic Generation Control using a CPS Security Testbed," Proceedings of Power & Energy Society General Meeting, July 2015

  • [23] A. Ashok, and G. Manimaran, "Cyber-Physical Risk Modeling and Mitigation for the Smart Grid using a Game-theoretic Approach," To appear in Proceedings of Innovative Smart Grid Technologies (ISGT) conference, 2015 Power and Energy Society, Feb 2015.

  • [22] A. Ashok,and G. Manimaran, "Cyber attacks on power system state estimation through topology errors," Proceedings of Power and Energy Society General Meeting, July 2012.

  • [21] A. Hahn, G. Manimaran, "Cyber vulnerability disclosure policies for the smart grid," Proceedings of IEEE PES General Meeting. July, 2012.

  • [20] Sridhar, S.; Hahn, A.; Govindarasu, M., "Cyber attack-resilient control for smart grid," in Innovative Smart Grid Technologies (ISGT), 2012 IEEE PES , vol., no., pp.1-3, 16-20 Jan. 2012

  • [19] A. Ashok, A. Hahn, and M. Govindarasu, "A cyber-physical security testbed for smart grid: System architecture and studies," in Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research (CSIIR), 2011.

  • [18] S. Sridhar, and G. Manimaran, "Data integrity attack and its impacts on voltage control loop in power grid," Proceedings of IEEE PES General Meeting. July, 2011.

  • [17] A. Hahn, G. Manimaran, "An Evaluation of Cybersecurity Assessment Tools on a SCADA Environment." Proceedings of IEEE PES General Meeting. July, 2011.

  • [16] A, Hahn. G. Manimaran, S. Sriddhar, "Development of the PowerCyber SCADA Security Testbed." in Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, ser. CSIIRW ’10, 2010.

  • [15] S. Sridhar and G. Manimaran, “Data integrity attacks and their impacts on SCADA control system,” in Power and Energy Society General Meeting, 2010 IEEE, Jul. 2010, pp. 1 –6.

  • [14] C.-W. Ten, C.-C. Liu, G. Manimaran, "Cyber-Vulnerability of Power Grid Monitoring and Control systems," Extended abstract for Cyber Security and Information Intelligence Research (CSIIR) workshop at Oak Ridge National Laboratory (ORNL), May 12-14, 2008.

  • [13] C.-W. Ten, G. Manimaran, and C.-C. Liu, "Cybersecurity for electric power control and automation system," Proc. IEEE Intl. Conf. on Systems, Man, and Cybernetics (ISIC), pp. 29-34, Oct. 7-10, 2007.

  • [12] C.-W. Ten, C.-C. Liu, G. Manimaran, "Vulnerability assessment of cybersecurity for SCADA systems using attack trees," IEEE Power Engineering Society General Meeting, Tampa, FL, Jun. 24-28, 2007, pp. 1 - 8.

  • [11] M. Muthuprasanna and G. Manimaran, "Unified defense against denial of service attacks," Proc. 5th IFIP-TC6 Networking Conf., pp. 1-12 , Atlanta, GA, May 2007. (Acceptance rate: 22.5%)

  • [10] M. Muthuprasanna and G. Manimaran, M. Manzor, and V. Kumar, "Coloring the Internet: IP traceback," Proc. IEEE Intl. Conf. on Parallel and Distributed Systems (ICPADS), pp. 589-598, Minneapolis, USA, July 2006. (Acceptance rate: ~35%)

  • [9] M. Muthuprasanna and G. Manimaran, "Secure distance vector routing protocol using factual correctness," in Proc. 5th IFIP-TC6 Networking conference, 6 pages, Coimbra, Portugal, May 2006. (Acceptance rate: 27.5%)

  • [8] M. Muthuprasanna and G. Manimaran,"Space-Time encoding scheme for DDoS attack traceback," in Proc. IEEE Globecom, 5 pages, St. Louis, Nov. 2005.

  • [7] D. Basheer and G. Manimaran,"Victim-assisted mitigation technique for TCP based reflector DDoS attacks," in Proc. 4th IFIP-TC6 Networking conference, pp. 191-204, Waterloo, Canada, May 2005. (Acceptance rate: ~24%)

  • [6] D. Basheer and G. Manimaran,"Intentional dropping: A novel scheme for SYN flooding mitigation," in Proc. IEEE Global Internet Symposium (held in conjunction with INFOCOM 2005), 5 pages, Miami, FL, March 2005. (Acceptance rate: ~32%)

  • [5] M. Muthuprasanna and G. Manimaran,"Traceback assisted denial-of-service mitigation in wireline-wireless networks," Poster paper (3 pages), IEEE INFOCOM, Miami, FL, March 2005.

  • [4] D. Basheer and G. Manimaran, A novel packet marking scheme for IP traceback," in Proc. 10th IEEE Intl. Conf. on Parallel and Distributed Systems, Newport Beach (CA), USA, July 2004. (Acceptance rate: 30.6%)

  • [3] D. Basheer, A. Chakrabarti, and G. Manimaran, An efficient probabilistic packet marking scheme for IP traceback," in Proc. 3rd IFIP-TC6 Networking, pp. 1263-1269, Athens, Greece, May 2004. (Acceptance:: 27%)

  • [2] A. Chakrabarti and G. Manimaran," A scalable method for router attack detection and location in link state routing," in Proc. IEEE Local Computer Networks (LCN), Boon, Germany, Oct. 2003.

  • [1] A. Chakrabarti and G. Manimaran,"An efficient algorithm for malicious update detection and recovery in distance vector protocols," in Proc. IEEE ICC, pp. 1952-1956, Anchorage, Alaska, May 2003. (Acceptance rate: 37.5%)