A. Lautenbach, M. Almgren, T. Olovsson, What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems, in Proceedings of the International Conference on Critical Information Infrastructures Security (CRITIS), Springer, October, 2017.
C.-Y. Lin, S. Nadjm-Tehrani, and M. Asplund, Timing-based Anomaly Detection in SCADA networks, in Proceedings of 12th International Conference on Critical Information Infrastructures Security (CRITIS), Springer, October 2017.
Asif Iqbal, Mathias Ekstedt, Hanan Alobaidli, Digital Forensic Readiness in Critical Infrastructures: A case of substation automation in the power sector. Book Chapter In: Digital Forensics and Cyber Crime (ICDF2C). Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, LNICST series Springer. October 2017.
D. Pereira, C. Hirata, R. Pagliares, and S. Nadjm-Tehrani, Towards Combined Safety and Security Constraints Analysis, in Proceedings of the 5th International Workshop on Assurance Cases for Software-Intensive Systems (ASSURE), SAFECOMP workshop, Springer, September 2017.
C. Stylianopoulos, M. Almgren, O. Landsiedel and M. Papatriantafilou, Multiple Pattern Matching for Network Security Applications: Acceleration through Vectorization, in Proceedings of the 46th International Conference on Parallel Processing (ICPP-2017), IEEE, August 2017.
Matus Korman, Margus Välja, Gunnar Björkman, Mathias Ekstedt, Alexandre Vernotte, Robert Lagerström, Analyzing the Effectiveness of Attack Countermeasures in a SCADA System, 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, April 2017.
V. Botev, M. Almgren, V. Gulisano, O. Landsiedel, M. Papatriantafilou, J. van Rooij, Detecting non-technical energy losses through structural periodic patterns in AMI data. in Proceedings of IEEE International Conference on Big Data (BigData), December 2016.
P. Johnsson, D. Gorton, R.Lagerström, and M. Ekstedt, Time between Vulnerability Disclosures: A Measure of Software Product Vulnerability, Computers and Security, Volume 62, Elsevier, September 2016. dx.doi.org/10.1016/j.cose.2016.08.004
Gundars Kalns, Simin Nadjm-Tehrani, and Maria Vasilevskaya, Trading off Latency against Security in Open Energy Metering Infrastructures, in proceedings of the 4th International Symposium for ICS and SCADA Cyber Security Research, August 2016. dx.doi.org/10.14236/ewic/ICS2016.17, available as PDF.
P. Johnson, M. Ekstedt and R. Lagerström, Automatic Probabilistic Enterprise IT ArchitectureModeling: a Dynamic Bayesian Networks Approach, in Proceedings of the 20th IEEE International Enterprise Distributed Object Computing Conference Workshops, IEEE, 2016.
P. Johnson, A. Vernotte, M. Ekstedt and R. Lagerström, pwnPr3d: an Attack Graph Driven Probabilistic Threat Modeling Approach, in Proceedings of the 11th International Conference on Availability, Reliability and Security (ARES), IEEE, 2016.
V. Gulisano, V. Tudor, M. Almgren, and M. Papatriantafilou, BES – Differentially Private and Distributed Event Aggregation in Advanced Metering Infrastructures, in Proceedings of the 2nd ACM Cyber-Physical System Security Workshop (CPSS), ACM, 2016. doi>10.1145/2899015.2899021
V. Tudor, M. Almgren, and M. Papatriantafilou, Employing Private Data in AMI Applications: Short Term Load Forecasting Using Differentially Private Aggregated Data, in Proceedings of the 13th IEEE International Conference on Advanced and Trusted Computing (ATC), IEEE, 2016.
R. Udd, M. Asplund, S. Nadjm-Tehrani, M. Kazemtabrizi, and M. Ekstedt, Exploiting Bro for Intrusion Detection in a SCADA System, in Proceedings of the 2nd ACM Cyber-Physical System Security Workshop (CPSS), ACM, 2016. doi>10.1145/2899015.2899028, available as PDF.
O. Somarriba, U. Zurutuza, R. Uribeetxeberria, L. Delosiéres, and S. Nadjm-Tehrani, Detection and Visualization of Android Malware Behavior, Journal of Electrical and Computer Engineering, Hindawi, 2016. dx.doi.org/10.1155/2016/8034967
M. Vasilevskaya, Security in Embedded Systems: A Model-Based Approach with Risk Metrics, PhD Thesis, number 1715, Linköping University, December 2015.
M. Vasilevskaya and S. Nadjm-Tehrani, Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design, in International Conference on Computer Safety, Reliability and Security (SAFECOMP), Springer, September 2015. doi:10.1007/978-3-319-24255-2_25. Available as PDF.