Projects
Self-learning intelligent monitoring of cyber-physical system fleet KU Leuven
The PhD candidate will work on machine-learning and artificial-intelligence methods for self-learning and self-monitoring cyber-physical systems. A framework based on novelty detection will be established using dynamically updated clustering methodologies, capturing the transition of the system between multiple steady and time-varying operating modes. Moreover, self-organizing model methods will be investigated and further developed. ESR2 ...
Cyber-physical security of the bulk electric energy supply system KU Leuven
Electric energy supply systems are transitioning towards strongly interlinked, smarter systems that heavily rely on information and communication systems. Security will be a critical requirement of these systems. Within this PhD, the cyber-physical security of the electric energy supply system and its embedded components will be evaluated. Next, the corresponding countermeasures to mitigate the identified security threats will be ...
Trustworthy sAfety & seCurity cOntrol for cyber-physical Systems KU Leuven
The TACOS project aims to facilitate the transition to online and secure reconfiguration of CPS (Cyber-Physical System) -
controllers by defining generic, reusable security middleware that will control the configuration and
enables maintenance of Trusted Execution Environments (TEE). To achieve this, TACOS will focus on three
innovation goals:
• The definition and validation of generic, cross-platform interfaces, services ...
Nexor - Cyber-Physical Systems for the Industry 4.0 era University of Antwerp
Cyber-Physical Risk of the bulk Electric Energy Supply System (CYPRESS) KU Leuven
The energy transition leads to smarter electrical systems taking the form of cyber-physical systems in which power grids are strongly linked to a growing number of information and communication systems.
The project aims to develop new knowledge, methods and tools necessary to guarantee security of supply via the transport network, while taking into account the specific nature of cyber threats and integrating them into a coherent approach ...