Bi-annual Newsletters Vol. 4 | Page 8

research highlights Compared with the traditional time-domain simulation that is conducted locally, the outsourcing approach could achieve an order of magnitude speedup. The computational overhead incurred by the outsourcing approach was only about 2% which was absorbed by the total runtime saving due to the faster processing of the cloud. The outsourcing approach can accurately and reliably produce correct computation results, as if it were operating on the original data. Our implementation only requires new software development. In the future, we will enhance the security of the injective mapping-based solution with garbled circuits which guarantee provable security but will increase the computational complexity. We also plan to extend the inter-area oscillation analysis by developing a secure Prony analysis which considers damping and mode shape. Detection, Recognition, and Localization of Multiple Cyber/Physical Attacks through Event Unmixing Probably the best way to summarize the uniqueness of CURENT’s cybersecurity research is that it focuses on “Measurementbased Cyber Physical Security”. The goal of measurement-based cyber-physical security (CPS) is two-fold, to maintain the fidelity (i.e., security and quality) of the measurement in order to facilitate the subsequent data analyses, and to use the measurement data to identify the sources of security