The following projects were approved based on the KPI’s mentioned by PGCIL
| SL.No | Project Name | PI Name | Link |
| SETS | Malware Detection and Defense in OT | Dr. Reshmi TR | Click Here |
| IITM-01 | Dynamic Analysis of embedded firmware of Power Grid IEDs using eTwin | Prof. Chester Rebeiro | Click Here |
| IITM-02 | Dynamic Analysis of embedded firmware of Power Grid IEDs using eTwin | Prof. Chester Rebeiro | Click Here |
| IIITK | Enhancing Security, Redundancy and Reliability in Operational Technology for Transmission and Grid Operations Using Software Defining Networking | Dr. Ajay Nehra | Click Here |
| IITR | Cyber Threat Detection and Mitigation Techniques for Power Transmission Network | Bhaveshkumar R Bhalja | Click Here |
| IITB-01 | A proposal for a secure Indigenous processor” Phase -1 | MP Desai | Click Here |
| IITB-02 | Securing SCADA Infrastructure of Asset Management Centers using PMI-J Data | Shreevardhan Soman | Click Here |
| SL.No | Project Name | PI Name | Link |
| P | Generic Low-overhead Side-Channel Resilient Reference Architecture Design for Intelligent Electronic Devices | Dr. Debayan Das | Click Here |
| NIT-01 | Deceptive Defenses: Exploring the Role of Cyber Deception in Fortifying the Indian Power Grid Against Ransomware Attacks | Dr. Ghanshyam S Bopche | Click Here |
| SL.No | Project Name | PI Name | Link |
| K | Formal Verification of FLISR Algorithms for Smart Substations | Prof. Deepak Dsouza | Click Here |
| L | Development of Security Solutions that Meet the IEC 62351 Standards for Communication Protocols | Prof. Navin Kashyap | Click Here |
| M | Development of high-quality random number generator for cyber security applications | Prof. Kaushik Majumdar | Click Here |
| N | Development of an Unsupervised Learning-based Model for Cyber-attacks detection in Power Grids | Dr. Punit Rathore | Click Here |
| O | Development of a Secure Merging Unit for Digital Substation | Prof. Kaushik Basu | Click Here |
| SL.No | Project Name | PI Name | Link |
| A | Cyber Security Readiness: Framework and Standards | Prof Anjula Gurto | Click Here |
| B | ML based intrusion detection system for Power Grids | Prof Chandramani Singh | Click Here |
| C | Realistic Testbed for evaluation of cyber security of PGCIL operation | Prof Gurunath Gurrala | Click Here |
| D | Cyber Security of IED devices used in Smart Grid Applications | Prof Haresh Dagale | Click Here |
| E | PCB reverse engineering using ML techniques for identification of hardware trojans | Prof Soma Biswas | Click Here |
| F | Physically Unclonable Functions (PUF) for IEDs | Prof T V Prabhakar | Click Here |
| G | Efficient and side-channel-resilient implementation of cryptographic algorithms | Prof Utsav Benerjee | Click Here |
| H | Modelling and Vulnerability Assessment of Power Grids | Prof Vaibhav Katewa | Click Here |
| I | Methods to Analyze IED firmware | Prof Vinod Ganapathy | Click Here |
| J | Fast Classification of Circuit Breaker Tripping Events | Prof Sarasij Das | Click Here |

