Change search
Refine search result
1 - 7 of 7
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Atif, Yacine
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Lindström, Birgitta
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jeusfeld, Manfred
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Andler, Sten F.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Yuning, Jiang
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Brax, Christoffer
    CombiTech AB, Skövde, Sweden.
    Gustavsson, Per M.
    CombiTech AB, Skövde, Sweden.
    Cyber-Threat Intelligence Architecture for Smart-Grid Critical Infrastructures Protection2017Conference paper (Refereed)
    Abstract [en]

    Critical infrastructures (CIs) are becoming increasingly sophisticated with embedded cyber-physical systems (CPSs) that provide managerial automation and autonomic controls. Yet these advances expose CI components to new cyber-threats, leading to a chain of dysfunctionalities with catastrophic socio-economical implications. We propose a comprehensive architectural model to support the development of incident management tools that provide situation-awareness and cyber-threats intelligence for CI protection, with a special focus on smart-grid CI. The goal is to unleash forensic data from CPS-based CIs to perform some predictive analytics. In doing so, we use some AI (Artificial Intelligence) paradigms for both data collection, threat detection, and cascade-effects prediction. 

  • 2.
    Atif, Yacine
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jiang, Yuning
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jeusfeld, Manfred A.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Lindström, Birgitta
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Andler, Sten F.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Brax, Christoffer
    Combitech.
    Haglund, Daniel
    Combitech.
    Lindström, Björn
    Combitech.
    Cyber-threat analysis for Cyber-Physical Systems: Technical report for Package 4, Activity 3 of ELVIRA project2018Report (Other academic)
    Abstract [en]

    Smart grid employs ICT infrastructure and network connectivity to optimize efficiency and deliver new functionalities. This evolu- tion is associated with an increased risk for cybersecurity threats that may hamper smart grid operations. Power utility providers need tools for assessing risk of prevailing cyberthreats over ICT infrastructures. The need for frameworks to guide the develop- ment of these tools is essential to define and reveal vulnerability analysis indicators. We propose a data-driven approach for design- ing testbeds to evaluate the vulnerability of cyberphysical systems against cyberthreats. The proposed framework uses data reported from multiple components of cyberphysical system architecture layers, including physical, control, and cyber layers. At the phys- ical layer, we consider component inventory and related physi- cal flows. At the control level, we consider control data, such as SCADA data flows in industrial and critical infrastructure control systems. Finally, at the cyber layer level, we consider existing secu- rity and monitoring data from cyber-incident event management tools, which are increasingly embedded into the control fabrics of cyberphysical systems.

  • 3.
    Atif, Yacine
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jiang, Yuning
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Lindström, Birgitta
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jeusfeld, Manfred
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Andler, Sten
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Nero, Eva
    Combitech, Sweden.
    Brax, Christoffer
    Combitech, Sweden.
    Haglund, Daniel
    Combitech, Sweden.
    Multi-agent Systems for Power Grid Monitoring: Technical report for Package 4.1 of ELVIRA project2018Report (Other academic)
    Abstract [en]

    This document reports a technical description of ELVIRA project results obtained as part of Work- package 4.1 entitled “Multi-agent systems for power Grid monitoring”. ELVIRA project is a collaboration between researchers in School of IT at University of Skövde and Combitech Technical Consulting Company in Sweden, with the aim to design, develop and test a testbed simulator for critical infrastructures cybersecurity. This report outlines intelligent approaches that continuously analyze data flows generated by Supervisory Control And Data Acquisition (SCADA) systems, which monitor contemporary power grid infrastructures. However, cybersecurity threats and security mechanisms cannot be analyzed and tested on actual systems, and thus testbed simulators are necessary to assess vulnerabilities and evaluate the infrastructure resilience against cyberattacks. This report suggests an agent-based model to simulate SCADA- like cyber-components behaviour when facing cyber-infection in order to experiment and test intelligent mitigation mechanisms. 

  • 4.
    Atif, Yacine
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Kharrazi, Sogol
    National Road Transport Research Institute, Linköping, Sweden.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Andler, Sten F.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Internet of Things data analytics for parking availability prediction and guidance2020In: European transactions on telecommunications, ISSN 1124-318X, E-ISSN 2161-3915, Vol. 31, article id e3862Article in journal (Refereed)
    Abstract [en]

    Cutting-edge sensors and devices are increasingly deployed within urban areas to make-up the fabric of transmission control protocol/internet protocol con- nectivity driven by Internet of Things (IoT). This immersion into physical urban environments creates new data streams, which could be exploited to deliver novel cloud-based services. Connected vehicles and road-infrastructure data are leveraged in this article to build applications that alleviate notorious parking and induced traffic-congestion issues. To optimize the utility of parking lots, our proposed SmartPark algorithm employs a discrete Markov-chain model to demystify the future state of a parking lot, by the time a vehicle is expected to reach it. The algorithm features three modular sections. First, a search pro- cess is triggered to identify the expected arrival-time periods to all parking lots in the targeted central business district (CBD) area. This process utilizes smart-pole data streams reporting congestion rates across parking area junc- tions. Then, a predictive analytics phase uses consolidated historical data about past parking dynamics to infer a state-transition matrix, showing the transfor- mation of available spots in a parking lot over short periods of time. Finally, this matrix is projected against similar future seasonal periods to figure out the actual vacancy-expectation of a lot. The performance evaluation over an actual busy CBD area in Stockholm (Sweden) shows increased scalability capa- bilities, when further parking resources are made available, compared to a baseline case algorithm. Using standard urban-mobility simulation packages, the traffic-congestion-aware SmartPark is also shown to minimize the journey duration to the selected parking lot while maximizing the chances to find an available spot at the selected lot.

  • 5.
    Ding, Jianguo
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Atif, Yacine
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Andler, Sten F.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Lindström, Birgitta
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jeusfeld, Manfred
    Högskolan i Skövde, Institutionen för informationsteknologi.
    CPS-based Threat Modeling for Critical Infrastructure Protection2017In: Performance Evaluation Review, ISSN 0163-5999, E-ISSN 1557-9484, Vol. 45, no 2, p. 129-132Article in journal (Refereed)
    Abstract [en]

    Cyber-Physical Systems (CPSs) are augmenting traditionalCritical Infrastructures (CIs) with data-rich operations. Thisintegration creates complex interdependencies that exposeCIs and their components to new threats. A systematicapproach to threat modeling is necessary to assess CIs’ vulnerabilityto cyber, physical, or social attacks. We suggest anew threat modeling approach to systematically synthesizeknowledge about the safety management of complex CIs andsituational awareness that helps understanding the nature ofa threat and its potential cascading-effects implications.

  • 6.
    Ding, Jianguo
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Lindström, Birgitta
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Mathiason, Gunnar
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Andler, Sten F.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Towards Threat Modeling for CPS-based Critical Infrastructure Protection2015In: Proceedings of the International Emergency Management Society (TIEMS), 22nd TIEMS Annual Conference: Evolving threats and vulnerability landscape: new challenges for the emergency management / [ed] Snjezana Knezic & Meen Poudyal Chhetri, Brussels: TIEMS, The International Emergency Management Society , 2015Conference paper (Refereed)
    Abstract [en]

    With the evolution of modern Critical Infrastructures (CI), more Cyber-Physical systems are integrated into the traditional CIs. This makes the CIs a multidimensional complex system, which is characterized by integrating cyber-physical systems into CI sectors (e.g., transportation, energy or food & agriculture). This integration creates complex interdependencies and dynamics among the system and its components. We suggest using a model with a multi-dimensional operational specification to allow detection of operational threats. Embedded (and distributed) information systems are critical parts of the CI where disruption can lead to serious consequences. Embedded information system protection is therefore crucial. As there are many different stakeholders of a CI, comprehensive protection must be viewed as a cross-sector activity to identify and monitor the critical elements, evaluate and determine the threat, and eliminate potential vulnerabilities in the CI. A systematic approach to threat modeling is necessary to support the CI threat and vulnerability assessment. We suggest a Threat Graph Model (TGM) to systematically model the complex CIs. Such modeling is expected to help the understanding of the nature of a threat and its impact on throughout the system. In order to handle threat cascading, the model must capture local vulnerabilities as well as how a threat might propagate to other components. The model can be used for improving the resilience of the CI by encouraging a design that enhances the system's ability to predict threats and mitigate their damages. This paper surveys and investigates the various threats and current approaches to threat modeling of CI. We suggest integrating both a vulnerability model and an attack model, and we incorporate the interdependencies within CI cross CI sectors. Finally, we present a multi-dimensional threat modeling approach for critical infrastructure protection.

  • 7.
    Jiang, Yuning
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Atif, Yacine
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jeusfeld, Manfred
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Andler, Sten
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Lindström, Birgitta
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Brax, Christoffer
    Combitech, Sweden.
    Haglund, Daniel
    Combitech, Sweden.
    Complex Dependencies Analysis: Technical Description of Complex Dependencies in Critical Infrastructures, i.e. Smart Grids. Work Package 2.1 of the ELVIRA Project2018Report (Other academic)
    Abstract [en]

    This document reports a technical description of ELVIRA project results obtained as part of Work-package 2.1 entitled “Complex Dependencies Analysis”. In this technical report, we review attempts in recent researches where connections are regarded as influencing factors to  IT systems monitoring critical infrastructure, based on which potential dependencies and resulting disturbances are identified and categorized. Each kind of dependence has been discussed based on our own entity based model. Among those dependencies, logical and functional connections have been analysed with more details on modelling and simulation techniques.

1 - 7 of 7
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf