Change search
Refine search result
1 - 14 of 14
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Atif, Yacine
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jeusfeld, Manfred A.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Internet of Things Approach to Cloud-Based Smart Car Parking2016In: The 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2016)/The 6th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2016)/Affiliated Workshops / [ed] Elhadi Shakshuki, Elsevier , 2016, p. 193-198Conference paper (Refereed)
    Abstract [en]

    Concerns for parking are becoming imminent to best support the urban core. These persistent parking problems could be turned into new opportunities, brought by current trends in meeting the globally connected continuum. This paper reveals a work-in- progress to capitalize on private land properties for parking, in order to relieve stress on public agencies, create new sources of revenue, and enlist new entities in the intermediary market. These intermediaries, labelled as Parking Service Providers (or PSPs) play a broker role through advertising parking lots on a shared cloud platform. To streamline these business collaborations and related processes, physical parking lots are augmented with Internet connectivity allowing cloud-provided applications to congregate these lots into a larger inventory. The Internet of Things (IoT) paradigm expands the scope of cloud-based intelligent car parking services in smart cities, with novel applications that better regulate car-parking related traffic. This paper presents a work-in-progress agenda that contributes to new business solutions and state-of-the-art research impacts. We reveal a multi- layered system of PSP-business model through interdisciplinary research blocks where original results are expected to be made at each layer.

  • 2.
    Atif, Yacine
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Lindström, Birgitta
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jeusfeld, Manfred
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Andler, Sten F.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Yuning, Jiang
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Brax, Christoffer
    CombiTech AB, Skövde, Sweden.
    Gustavsson, Per M.
    CombiTech AB, Skövde, Sweden.
    Cyber-Threat Intelligence Architecture for Smart-Grid Critical Infrastructures Protection2017Conference paper (Refereed)
    Abstract [en]

    Critical infrastructures (CIs) are becoming increasingly sophisticated with embedded cyber-physical systems (CPSs) that provide managerial automation and autonomic controls. Yet these advances expose CI components to new cyber-threats, leading to a chain of dysfunctionalities with catastrophic socio-economical implications. We propose a comprehensive architectural model to support the development of incident management tools that provide situation-awareness and cyber-threats intelligence for CI protection, with a special focus on smart-grid CI. The goal is to unleash forensic data from CPS-based CIs to perform some predictive analytics. In doing so, we use some AI (Artificial Intelligence) paradigms for both data collection, threat detection, and cascade-effects prediction. 

  • 3.
    Atif, Yacine
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jiang, Yuning
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jeusfeld, Manfred A.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Lindström, Birgitta
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Andler, Sten F.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Brax, Christoffer
    Combitech.
    Haglund, Daniel
    Combitech.
    Lindström, Björn
    Combitech.
    Cyber-threat analysis for Cyber-Physical Systems: Technical report for Package 4, Activity 3 of ELVIRA project2018Report (Other academic)
    Abstract [en]

    Smart grid employs ICT infrastructure and network connectivity to optimize efficiency and deliver new functionalities. This evolu- tion is associated with an increased risk for cybersecurity threats that may hamper smart grid operations. Power utility providers need tools for assessing risk of prevailing cyberthreats over ICT infrastructures. The need for frameworks to guide the develop- ment of these tools is essential to define and reveal vulnerability analysis indicators. We propose a data-driven approach for design- ing testbeds to evaluate the vulnerability of cyberphysical systems against cyberthreats. The proposed framework uses data reported from multiple components of cyberphysical system architecture layers, including physical, control, and cyber layers. At the phys- ical layer, we consider component inventory and related physi- cal flows. At the control level, we consider control data, such as SCADA data flows in industrial and critical infrastructure control systems. Finally, at the cyber layer level, we consider existing secu- rity and monitoring data from cyber-incident event management tools, which are increasingly embedded into the control fabrics of cyberphysical systems.

  • 4.
    Atif, Yacine
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jiang, Yuning
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Lindström, Birgitta
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jeusfeld, Manfred
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Andler, Sten
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Nero, Eva
    Combitech, Sweden.
    Brax, Christoffer
    Combitech, Sweden.
    Haglund, Daniel
    Combitech, Sweden.
    Multi-agent Systems for Power Grid Monitoring: Technical report for Package 4.1 of ELVIRA project2018Report (Other academic)
    Abstract [en]

    This document reports a technical description of ELVIRA project results obtained as part of Work- package 4.1 entitled “Multi-agent systems for power Grid monitoring”. ELVIRA project is a collaboration between researchers in School of IT at University of Skövde and Combitech Technical Consulting Company in Sweden, with the aim to design, develop and test a testbed simulator for critical infrastructures cybersecurity. This report outlines intelligent approaches that continuously analyze data flows generated by Supervisory Control And Data Acquisition (SCADA) systems, which monitor contemporary power grid infrastructures. However, cybersecurity threats and security mechanisms cannot be analyzed and tested on actual systems, and thus testbed simulators are necessary to assess vulnerabilities and evaluate the infrastructure resilience against cyberattacks. This report suggests an agent-based model to simulate SCADA- like cyber-components behaviour when facing cyber-infection in order to experiment and test intelligent mitigation mechanisms. 

  • 5.
    Atif, Yacine
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Kharrazi, Sogol
    National Road Transport Research Institute, Linköping, Sweden.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Andler, Sten F.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Internet of Things data analytics for parking availability prediction and guidance2020In: European transactions on telecommunications, ISSN 1124-318X, E-ISSN 2161-3915, Vol. 31, article id e3862Article in journal (Refereed)
    Abstract [en]

    Cutting-edge sensors and devices are increasingly deployed within urban areas to make-up the fabric of transmission control protocol/internet protocol con- nectivity driven by Internet of Things (IoT). This immersion into physical urban environments creates new data streams, which could be exploited to deliver novel cloud-based services. Connected vehicles and road-infrastructure data are leveraged in this article to build applications that alleviate notorious parking and induced traffic-congestion issues. To optimize the utility of parking lots, our proposed SmartPark algorithm employs a discrete Markov-chain model to demystify the future state of a parking lot, by the time a vehicle is expected to reach it. The algorithm features three modular sections. First, a search pro- cess is triggered to identify the expected arrival-time periods to all parking lots in the targeted central business district (CBD) area. This process utilizes smart-pole data streams reporting congestion rates across parking area junc- tions. Then, a predictive analytics phase uses consolidated historical data about past parking dynamics to infer a state-transition matrix, showing the transfor- mation of available spots in a parking lot over short periods of time. Finally, this matrix is projected against similar future seasonal periods to figure out the actual vacancy-expectation of a lot. The performance evaluation over an actual busy CBD area in Stockholm (Sweden) shows increased scalability capa- bilities, when further parking resources are made available, compared to a baseline case algorithm. Using standard urban-mobility simulation packages, the traffic-congestion-aware SmartPark is also shown to minimize the journey duration to the selected parking lot while maximizing the chances to find an available spot at the selected lot.

  • 6.
    Ding, Jianguo
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Atif, Yacine
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Andler, Sten F.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Lindström, Birgitta
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jeusfeld, Manfred
    Högskolan i Skövde, Institutionen för informationsteknologi.
    CPS-based Threat Modeling for Critical Infrastructure Protection2017In: Performance Evaluation Review, ISSN 0163-5999, E-ISSN 1557-9484, Vol. 45, no 2, p. 129-132Article in journal (Refereed)
    Abstract [en]

    Cyber-Physical Systems (CPSs) are augmenting traditionalCritical Infrastructures (CIs) with data-rich operations. Thisintegration creates complex interdependencies that exposeCIs and their components to new threats. A systematicapproach to threat modeling is necessary to assess CIs’ vulnerabilityto cyber, physical, or social attacks. We suggest anew threat modeling approach to systematically synthesizeknowledge about the safety management of complex CIs andsituational awareness that helps understanding the nature ofa threat and its potential cascading-effects implications.

  • 7.
    Jeusfeld, Manfred A.
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jiang, Yuning
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Atif, Yacine
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Haglund, Daniel
    Combitech AB.
    Brax, Christoffer
    Combitech AB.
    Taxonomy of Events and Components in the Power Grid: Technical description for work packages 3.1 and 3.2 of the ELVIRA Project2018Report (Other academic)
    Abstract [en]

    This document reports a technical description of ELVIRA project results obtained as part of Work-package 3.1&3.2 entitled “Taxonomy of Critical Infrastructure (Taxonomy of events + Taxonomy of CI component and relationship)”. ELVIRA project is a collaboration between researchers in School of IT at University of Skövde and Combitech Technical Consulting Company in Sweden, with the aim to design, develop and test a testbed simulator for critical infrastructures cybersecurity.

  • 8.
    Jiang, Yuning
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Atif, Yacine
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Agent Based Testbed Design for Cyber Vulnerability Assessment in Smart-Grids2018Conference paper (Other academic)
    Abstract [en]

    Smart grid employs Information and Communication Technology (ICT) infrastructure and network connectivity to optimize efficiency and deliver new functionalities. This evolution is associated with an increased risk for cybersecurity threats that may hamper smart grid operations. Power utility providers need tools for assessing risk of prevailing cyberthreats over ICT infrastructures. The need for frameworks to guide the development of these tools is essential to define and reveal vulnerability analysis indicators. We propose a data-driven approach for designing testbeds to allow the simulation of cyberattacks in order to evaluate the vulnerability and the impact of cyber threat attacks. The proposed framework uses data reported from multiple smart grid components at different smart grid architecture layers, including physical, control, and cyber layers. The multi-agent based framework proposed in this paper would analyze the conglomeration of these data reports to assert malicious attacks.

  • 9.
    Jiang, Yuning
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Atif, Yacine
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Cyber-Physical Systems Security Based on A Cross-Linked and Correlated Vulnerability Database2019In: Critical Information Infrastructures Security: 14th International Conference, CRITIS 2019, Linköping, Sweden, September 23–25, 2019, Revised Selected Papers / [ed] Simin Nadjm-Tehrani, Springer , 2019, p. 71-82Conference paper (Refereed)
    Abstract [en]

    Recent advances in data analytics prompt dynamic datadriven vulnerability assessments whereby data contained from vulnerabilityalert repositories as well as from Cyber-physical System (CPS) layer networks and standardised enumerations. Yet, current vulnerability assessment processes are mostly conducted manually. However, the huge volume of scanned data requires substantial information processing and analytical reasoning, which could not be satisfied considering the imprecision of manual vulnerability analysis. In this paper, we propose to employ a cross-linked and correlated database to collect, extract, filter and visualise vulnerability data across multiple existing repositories, whereby CPS vulnerability information is inferred. Based on our locally-updated database, we provide an in-depth case study on gathered CPS vulnerability data, to explore the trends of CPS vulnerability. In doing so, we aim to support a higher level of automation in vulnerability awareness and back risk-analysis exercises in critical infrastructures (CIs) protection.

  • 10.
    Jiang, Yuning
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Atif, Yacine
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Data Fusion Framework for Cyber Vulnerability Assessment in Smart Grid2018Other (Other academic)
    Abstract [en]

    Smart grid adopts ICT to enhance power-delivery management. However, these advanced technologies also introduce an increasing amount of cyber threats. Cyber threats occur because of vulnerabilities throughout smart-grid layers. Each layer is distinguished by typical data flows. For example, power-data stream flows along the physical layer; command data are pushed to and pulled from sensor-control devices, such as RTUs and PLCs. Vulnerabilities expose these data flows to cyber threat via communication networks, such as local control network, vendor network, corporate network and the wider internet. Thus, these data could be used to analyse vulnerabilities against cyber threats. After data collection, data analysis and modelling techniques would be used for vulnerability assessment.

  • 11.
    Jiang, Yuning
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Atif, Yacine
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Multi-Level Vulnerability Modeling of Cyber-Physical Systems2018Conference paper (Refereed)
    Abstract [en]

    Vulnerability is defined as ”weakness of an asset or control that can be exploited by a threat” according to ISO/IEC 27000:2009, and it is a vital cyber-security issue to protect cyber-physical systems (CPSs) employed in a range of critical infrastructures (CIs). However, how to quantify both individual and system vulnerability are still not clear. In our proposed poster, we suggest a new procedure to evaluate CPS vulnerability. We reveal a vulnerability-tree model to support the evaluation of CPS-wide vulnerability index, driven by a hierarchy of vulnerability-scenarios resulting synchronously or propagated by tandem vulnerabilities throughout CPS architecture, and that could be exploited by threat agents. Multiple vulnerabilities are linked by boolean operations at each level of the tree. Lower-level vulnerabilities in the tree structure can be exploited by threat agents in order to reach parent vulnerabilities with increasing CPS criticality impacts. At the asset-level, we suggest a novel fuzzy-logic based valuation of vulnerability along standard metrics. Both the procedure and fuzzy-based approach are discussed and illustrated through SCADA-based smart power-grid system as a case study in the poster, with our goal to streamline the process of vulnerability computation at both asset and CPS levels.

  • 12.
    Jiang, Yuning
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Atif, Yacine
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Wang, Wei
    Högskolan i Skövde, Institutionen för ingenjörsvetenskap.
    A Semantic Framework With Humans in the Loop for Vulnerability-Assessment in Cyber-Physical Production Systems2020In: Risks and Security of Internet and Systems: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, Proceedings / [ed] Slim Kallel, Frédéric Cuppens, Nora Cuppens-Boulahia, Ahmed Hadj Kacem, Springer , 2020, p. 128-143Conference paper (Refereed)
    Abstract [en]

    Criticalmanufacturingprocessesinsmartnetworkedsystems such as Cyber-Physical Production Systems (CPPSs) typically require guaranteed quality-of-service performances, which is supported by cyber- security management. Currently, most existing vulnerability-assessment techniques mostly rely on only the security department due to limited communication between di↵erent working groups. This poses a limitation to the security management of CPPSs, as malicious operations may use new exploits that occur between successive analysis milestones or across departmental managerial boundaries. Thus, it is important to study and analyse CPPS networks’ security, in terms of vulnerability analysis that accounts for humans in the production process loop, to prevent potential threats to infiltrate through cross-layer gaps and to reduce the magnitude of their impact. We propose a semantic framework that supports the col- laboration between di↵erent actors in the production process, to improve situation awareness for cyberthreats prevention. Stakeholders with dif- ferent expertise are contributing to vulnerability assessment, which can be further combined with attack-scenario analysis to provide more prac- tical analysis. In doing so, we show through a case study evaluation how our proposed framework leverages crucial relationships between vulner- abilities, threats and attacks, in order to narrow further the risk-window induced by discoverable vulnerabilities.

  • 13.
    Jiang, Yuning
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Atif, Yacine
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jeusfeld, Manfred
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Andler, Sten
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Lindström, Birgitta
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Brax, Christoffer
    Combitech, Sweden.
    Haglund, Daniel
    Combitech, Sweden.
    Complex Dependencies Analysis: Technical Description of Complex Dependencies in Critical Infrastructures, i.e. Smart Grids. Work Package 2.1 of the ELVIRA Project2018Report (Other academic)
    Abstract [en]

    This document reports a technical description of ELVIRA project results obtained as part of Work-package 2.1 entitled “Complex Dependencies Analysis”. In this technical report, we review attempts in recent researches where connections are regarded as influencing factors to  IT systems monitoring critical infrastructure, based on which potential dependencies and resulting disturbances are identified and categorized. Each kind of dependence has been discussed based on our own entity based model. Among those dependencies, logical and functional connections have been analysed with more details on modelling and simulation techniques.

  • 14.
    Jiang, Yuning
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Jeusfeld, Manfred A.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Atif, Yacine
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Brax, Christoffer
    Combitech AB, Skövde, Sweden.
    Nero, Eva
    Combitech AB, Skövde, Sweden.
    A Language and Repository for Cyber Security of Smart Grids2018In: 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC 2018) / [ed] Selmin Nurcan, Pontus Johnson, Los Alamitos, CA: IEEE , 2018, p. 164-170Conference paper (Refereed)
    Abstract [en]

    Power grids form the central critical infrastructure in all developed economies. Disruptions of power supply can cause major effects on the economy and the livelihood of citizens. At the same time, power grids are being targeted by sophisticated cyber attacks. To counter these threats, we propose a domain-specific language and a repository to represent power grids and related IT components that control the power grid. We apply our tool to a standard example used in the literature to assess its expressiveness.

1 - 14 of 14
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf